You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2019-0217
Vulnerable Library - constantinople-3.0.2.tgz
Determine whether a JavaScript expression evaluates to a constant (using UglifyJS)
The uglify-js package before 2.4.24 for Node.js does not properly account for non-boolean values when rewriting boolean expressions, which might allow attackers to bypass security mechanisms or possibly have unspecified other impact by leveraging improperly rewritten Javascript.
The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)."
Version of clean-css prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
Vulnerable Library - jade-1.11.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/constantinople/package.json
Found in HEAD commit: 4f595e42e10bed67fd2ee22dd972e8ca3838e03b
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2019-0217
Vulnerable Library - constantinople-3.0.2.tgz
Determine whether a JavaScript expression evaluates to a constant (using UglifyJS)
Library home page: https://registry.npmjs.org/constantinople/-/constantinople-3.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/constantinople/package.json
Dependency Hierarchy:
Found in HEAD commit: 4f595e42e10bed67fd2ee22dd972e8ca3838e03b
Found in base branch: main
Vulnerability Details
constantinople before 3.1.1 affected by a sandbox bypass.
Publish Date: 2018-02-09
URL: WS-2019-0217
Threat Assessment
Exploit Maturity: Not Defined
EPSS:
CVSS 3 Score Details (10.0)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/568
Release Date: 2018-02-09
Fix Resolution: 3.1.1
WS-2018-0068
Vulnerable Library - constantinople-3.0.2.tgz
Determine whether a JavaScript expression evaluates to a constant (using UglifyJS)
Library home page: https://registry.npmjs.org/constantinople/-/constantinople-3.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/constantinople/package.json
Dependency Hierarchy:
Found in HEAD commit: 4f595e42e10bed67fd2ee22dd972e8ca3838e03b
Found in base branch: main
Vulnerability Details
Versions of constantinople prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution.
Publish Date: 2018-04-21
URL: WS-2018-0068
Threat Assessment
Exploit Maturity: Not Defined
EPSS:
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/568
Release Date: 2018-01-24
Fix Resolution: 3.1.1
CVE-2021-44906
Vulnerable Library - minimist-0.0.8.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/minimist/package.json
Dependency Hierarchy:
Found in HEAD commit: 4f595e42e10bed67fd2ee22dd972e8ca3838e03b
Found in base branch: main
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: 2022-03-17
URL: CVE-2021-44906
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 2.3%
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-xvch-5gv4-984h
Release Date: 2022-03-17
Fix Resolution: minimist - 0.2.4,1.2.6
CVE-2015-8857
Vulnerable Library - uglify-js-2.2.5.tgz
JavaScript parser, mangler/compressor and beautifier toolkit
Library home page: https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/transformers/node_modules/uglify-js/package.json
Dependency Hierarchy:
Found in HEAD commit: 4f595e42e10bed67fd2ee22dd972e8ca3838e03b
Found in base branch: main
Vulnerability Details
The uglify-js package before 2.4.24 for Node.js does not properly account for non-boolean values when rewriting boolean expressions, which might allow attackers to bypass security mechanisms or possibly have unspecified other impact by leveraging improperly rewritten Javascript.
Publish Date: 2017-01-23
URL: CVE-2015-8857
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.5%
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858
Release Date: 2017-01-23
Fix Resolution: v2.4.24
CVE-2015-8858
Vulnerable Library - uglify-js-2.2.5.tgz
JavaScript parser, mangler/compressor and beautifier toolkit
Library home page: https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/transformers/node_modules/uglify-js/package.json
Dependency Hierarchy:
Found in HEAD commit: 4f595e42e10bed67fd2ee22dd972e8ca3838e03b
Found in base branch: main
Vulnerability Details
The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)."
Publish Date: 2017-01-23
URL: CVE-2015-8858
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.2%
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858
Release Date: 2017-01-23
Fix Resolution: v2.6.0
CVE-2020-7598
Vulnerable Library - minimist-0.0.8.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/minimist/package.json
Dependency Hierarchy:
Found in HEAD commit: 4f595e42e10bed67fd2ee22dd972e8ca3838e03b
Found in base branch: main
Vulnerability Details
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "proto" payload.
Publish Date: 2020-03-11
URL: CVE-2020-7598
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.1%
CVSS 3 Score Details (5.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2020-03-11
Fix Resolution: minimist - 0.2.1,1.2.3
WS-2019-0017
Vulnerable Library - clean-css-3.4.28.tgz
A well-tested CSS minifier
Library home page: https://registry.npmjs.org/clean-css/-/clean-css-3.4.28.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/clean-css/package.json
Dependency Hierarchy:
Found in HEAD commit: 4f595e42e10bed67fd2ee22dd972e8ca3838e03b
Found in base branch: main
Vulnerability Details
Version of clean-css prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
Publish Date: 2018-03-06
URL: WS-2019-0017
Threat Assessment
Exploit Maturity: Not Defined
EPSS:
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-wxhq-pm8v-cw75
Release Date: 2018-03-06
Fix Resolution: clean-css - 4.1.11
The text was updated successfully, but these errors were encountered: