🚀starRTC,即时通讯(IM)系统,免费IM系统(含单聊,群聊,聊天室,文件传输),免费一对一视频聊天,VOIP,语音对讲(回音消除),直播连麦,视频直播,RTSP拉流,RTMP推流,webRTC服务端,在线教育,白板,小班课,在线会议,视频会议,视频监控,局域网直连(无需服务器),兼容webRTC, 支持webRTC加速,P2P高清传输,安卓、iOS、web互通,支持门禁对讲,可视对讲,电视盒子,树莓派,海思,全志,任天堂switch,云游戏,OTT设备,物联网平台,C语言自研方案,支持二次开发成类微信,类映客等APP,✨万水千山总是情,来个star行不行✨,更多示例请访问:

Security

Vulnerabilities
1 High
2 Medium
3 Low
high

CVE-2021-23337

Prototype pollution vulnerability in lodash before 4.17.21 allows attackers to modify object properties via the set, setWith, and update functions.

lodash 4.17.154.17.21
medium

CVE-2022-24999

The express package before 4.17.3 for Node.js has a Regular Expression Denial of Service vulnerability via the req.fresh property.

express 4.17.14.17.3
Security Policies
Security policy
Enabled
Dependabot alerts
Enabled
Code scanning
Disabled
Secret scanning
Enabled
Security Score
78Grade B

Dependency Analysis

lodash4.17.15
1 issues
65/100
express4.17.1
1 issues
72/100
Security Recommendations

Based on the repository's security profile, here are some recommendations:

  • Update lodash to version 4.17.21 to fix a high severity vulnerability
  • Update express to version 4.17.3 to fix a medium severity vulnerability
  • Enable code scanning to detect security vulnerabilities in your code