ansi-regex |
CVE-2021-3807 |
HIGH |
3.0.0 |
6.0.1, 5.0.1, 4.1.1, 3.0.1 |
https://access.redhat.com/errata/RHSA-2022:6595
https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://bugzilla.redhat.com/1907444
https://bugzilla.redhat.com/1945459
https://bugzilla.redhat.com/1964461
https://bugzilla.redhat.com/2007557
https://bugzilla.redhat.com/2098556
https://bugzilla.redhat.com/2102001
https://bugzilla.redhat.com/2105422
https://bugzilla.redhat.com/2105426
https://bugzilla.redhat.com/2105428
https://bugzilla.redhat.com/2105430
https://errata.almalinux.org/9/ALSA-2022-6595.html
https://github.com/chalk/ansi-regex
https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1
https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-6595.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://security.netapp.com/advisory/ntap-20221014-0002
https://security.netapp.com/advisory/ntap-20221014-0002/
https://www.cve.org/CVERecord?id=CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
|
ansi-regex |
CVE-2021-3807 |
HIGH |
3.0.0 |
6.0.1, 5.0.1, 4.1.1, 3.0.1 |
https://access.redhat.com/errata/RHSA-2022:6595
https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://bugzilla.redhat.com/1907444
https://bugzilla.redhat.com/1945459
https://bugzilla.redhat.com/1964461
https://bugzilla.redhat.com/2007557
https://bugzilla.redhat.com/2098556
https://bugzilla.redhat.com/2102001
https://bugzilla.redhat.com/2105422
https://bugzilla.redhat.com/2105426
https://bugzilla.redhat.com/2105428
https://bugzilla.redhat.com/2105430
https://errata.almalinux.org/9/ALSA-2022-6595.html
https://github.com/chalk/ansi-regex
https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1
https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-6595.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://security.netapp.com/advisory/ntap-20221014-0002
https://security.netapp.com/advisory/ntap-20221014-0002/
https://www.cve.org/CVERecord?id=CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
|
body-parser |
CVE-2024-45590 |
HIGH |
1.20.2 |
1.20.3 |
https://access.redhat.com/security/cve/CVE-2024-45590
https://github.com/expressjs/body-parser
https://github.com/expressjs/body-parser/commit/b2695c4450f06ba3b0ccf48d872a229bb41c9bce
https://github.com/expressjs/body-parser/security/advisories/GHSA-qwcr-r2fm-qrc7
https://nvd.nist.gov/vuln/detail/CVE-2024-45590
https://www.cve.org/CVERecord?id=CVE-2024-45590
|
braces |
CVE-2024-4068 |
HIGH |
2.3.2 |
3.0.3 |
https://access.redhat.com/security/cve/CVE-2024-4068
https://devhub.checkmarx.com/cve-details/CVE-2024-4068
https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
https://github.com/micromatch/braces
https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
https://github.com/micromatch/braces/issues/35
https://github.com/micromatch/braces/pull/37
https://github.com/micromatch/braces/pull/40
https://nvd.nist.gov/vuln/detail/CVE-2024-4068
https://www.cve.org/CVERecord?id=CVE-2024-4068
|
cookie |
CVE-2024-47764 |
LOW |
0.4.0 |
0.7.0 |
https://access.redhat.com/security/cve/CVE-2024-47764
https://github.com/jshttp/cookie
https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c
https://github.com/jshttp/cookie/pull/167
https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x
https://nvd.nist.gov/vuln/detail/CVE-2024-47764
https://www.cve.org/CVERecord?id=CVE-2024-47764
|
cookie |
CVE-2024-47764 |
LOW |
0.4.2 |
0.7.0 |
https://access.redhat.com/security/cve/CVE-2024-47764
https://github.com/jshttp/cookie
https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c
https://github.com/jshttp/cookie/pull/167
https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x
https://nvd.nist.gov/vuln/detail/CVE-2024-47764
https://www.cve.org/CVERecord?id=CVE-2024-47764
|
cookie |
CVE-2024-47764 |
LOW |
0.6.0 |
0.7.0 |
https://access.redhat.com/security/cve/CVE-2024-47764
https://github.com/jshttp/cookie
https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c
https://github.com/jshttp/cookie/pull/167
https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x
https://nvd.nist.gov/vuln/detail/CVE-2024-47764
https://www.cve.org/CVERecord?id=CVE-2024-47764
|
cross-spawn |
CVE-2024-21538 |
HIGH |
6.0.5 |
7.0.5, 6.0.6 |
https://access.redhat.com/security/cve/CVE-2024-21538
https://github.com/moxystudio/node-cross-spawn
https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff
https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f
https://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8dd
https://github.com/moxystudio/node-cross-spawn/issues/165
https://github.com/moxystudio/node-cross-spawn/pull/160
https://nvd.nist.gov/vuln/detail/CVE-2024-21538
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349
https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230
https://www.cve.org/CVERecord?id=CVE-2024-21538
|
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://access.redhat.com/security/cve/CVE-2024-21538
https://github.com/moxystudio/node-cross-spawn
https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff
https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f
https://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8dd
https://github.com/moxystudio/node-cross-spawn/issues/165
https://github.com/moxystudio/node-cross-spawn/pull/160
https://nvd.nist.gov/vuln/detail/CVE-2024-21538
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349
https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230
https://www.cve.org/CVERecord?id=CVE-2024-21538
|
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://access.redhat.com/security/cve/CVE-2024-21538
https://github.com/moxystudio/node-cross-spawn
https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff
https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f
https://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8dd
https://github.com/moxystudio/node-cross-spawn/issues/165
https://github.com/moxystudio/node-cross-spawn/pull/160
https://nvd.nist.gov/vuln/detail/CVE-2024-21538
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349
https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230
https://www.cve.org/CVERecord?id=CVE-2024-21538
|
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://access.redhat.com/security/cve/CVE-2024-21538
https://github.com/moxystudio/node-cross-spawn
https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff
https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f
https://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8dd
https://github.com/moxystudio/node-cross-spawn/issues/165
https://github.com/moxystudio/node-cross-spawn/pull/160
https://nvd.nist.gov/vuln/detail/CVE-2024-21538
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349
https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230
https://www.cve.org/CVERecord?id=CVE-2024-21538
|
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://access.redhat.com/security/cve/CVE-2024-21538
https://github.com/moxystudio/node-cross-spawn
https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff
https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f
https://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8dd
https://github.com/moxystudio/node-cross-spawn/issues/165
https://github.com/moxystudio/node-cross-spawn/pull/160
https://nvd.nist.gov/vuln/detail/CVE-2024-21538
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349
https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230
https://www.cve.org/CVERecord?id=CVE-2024-21538
|
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://access.redhat.com/security/cve/CVE-2024-21538
https://github.com/moxystudio/node-cross-spawn
https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff
https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f
https://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8dd
https://github.com/moxystudio/node-cross-spawn/issues/165
https://github.com/moxystudio/node-cross-spawn/pull/160
https://nvd.nist.gov/vuln/detail/CVE-2024-21538
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349
https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230
https://www.cve.org/CVERecord?id=CVE-2024-21538
|
debug |
CVE-2017-16137 |
LOW |
3.2.6 |
2.6.9, 3.1.0, 3.2.7, 4.3.1 |
https://access.redhat.com/security/cve/CVE-2017-16137
https://github.com/debug-js/debug/commit/4e2150207c568adb9ead8f4c4528016081c88020
https://github.com/debug-js/debug/commit/71169065b5262f9858ac78cc0b688c84a438f290
https://github.com/debug-js/debug/commit/b6d12fdbc63b483e5c969da33ea6adc09946b5ac
https://github.com/debug-js/debug/commit/f53962e944a87e6ca9bb622a2a12dffc22a9bb5a
https://github.com/debug-js/debug/issues/797
https://github.com/visionmedia/debug
https://github.com/visionmedia/debug/issues/501
https://github.com/visionmedia/debug/pull/504
https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3E
https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E
https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3E
https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E
https://nodesecurity.io/advisories/534
https://nvd.nist.gov/vuln/detail/CVE-2017-16137
https://www.cve.org/CVERecord?id=CVE-2017-16137
|
debug |
CVE-2017-16137 |
LOW |
4.1.1 |
2.6.9, 3.1.0, 3.2.7, 4.3.1 |
https://access.redhat.com/security/cve/CVE-2017-16137
https://github.com/debug-js/debug/commit/4e2150207c568adb9ead8f4c4528016081c88020
https://github.com/debug-js/debug/commit/71169065b5262f9858ac78cc0b688c84a438f290
https://github.com/debug-js/debug/commit/b6d12fdbc63b483e5c969da33ea6adc09946b5ac
https://github.com/debug-js/debug/commit/f53962e944a87e6ca9bb622a2a12dffc22a9bb5a
https://github.com/debug-js/debug/issues/797
https://github.com/visionmedia/debug
https://github.com/visionmedia/debug/issues/501
https://github.com/visionmedia/debug/pull/504
https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3E
https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E
https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3E
https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E
https://nodesecurity.io/advisories/534
https://nvd.nist.gov/vuln/detail/CVE-2017-16137
https://www.cve.org/CVERecord?id=CVE-2017-16137
|
debug |
CVE-2017-16137 |
LOW |
4.1.1 |
2.6.9, 3.1.0, 3.2.7, 4.3.1 |
https://access.redhat.com/security/cve/CVE-2017-16137
https://github.com/debug-js/debug/commit/4e2150207c568adb9ead8f4c4528016081c88020
https://github.com/debug-js/debug/commit/71169065b5262f9858ac78cc0b688c84a438f290
https://github.com/debug-js/debug/commit/b6d12fdbc63b483e5c969da33ea6adc09946b5ac
https://github.com/debug-js/debug/commit/f53962e944a87e6ca9bb622a2a12dffc22a9bb5a
https://github.com/debug-js/debug/issues/797
https://github.com/visionmedia/debug
https://github.com/visionmedia/debug/issues/501
https://github.com/visionmedia/debug/pull/504
https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3E
https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E
https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3E
https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E
https://nodesecurity.io/advisories/534
https://nvd.nist.gov/vuln/detail/CVE-2017-16137
https://www.cve.org/CVERecord?id=CVE-2017-16137
|
elliptic |
CVE-2024-42459 |
LOW |
6.5.4 |
6.5.7 |
https://access.redhat.com/security/cve/CVE-2024-42459
https://github.com/indutny/elliptic
https://github.com/indutny/elliptic/commit/accb61e9c1a005e5c8ff96a8b33893100bb42d11
https://github.com/indutny/elliptic/commit/c0690b36be043ee73c1780ae4b7df48632b11cf9
https://github.com/indutny/elliptic/pull/317
https://nvd.nist.gov/vuln/detail/CVE-2024-42459
https://www.cve.org/CVERecord?id=CVE-2024-42459
|
elliptic |
CVE-2024-42460 |
LOW |
6.5.4 |
6.5.7 |
https://access.redhat.com/security/cve/CVE-2024-42460
https://github.com/indutny/elliptic
https://github.com/indutny/elliptic/commit/accb61e9c1a005e5c8ff96a8b33893100bb42d11
https://github.com/indutny/elliptic/commit/b6ff1758d9a6d1a7aec177ff6df9f586492a6315
https://github.com/indutny/elliptic/pull/317
https://nvd.nist.gov/vuln/detail/CVE-2024-42460
https://www.cve.org/CVERecord?id=CVE-2024-42460
|
elliptic |
CVE-2024-42461 |
LOW |
6.5.4 |
6.5.7 |
https://access.redhat.com/security/cve/CVE-2024-42461
https://github.com/indutny/elliptic
https://github.com/indutny/elliptic/commit/accb61e9c1a005e5c8ff96a8b33893100bb42d11
https://github.com/indutny/elliptic/pull/317
https://nvd.nist.gov/vuln/detail/CVE-2024-42461
https://www.cve.org/CVERecord?id=CVE-2024-42461
|
elliptic |
CVE-2024-48948 |
LOW |
6.5.4 |
6.6.0 |
https://access.redhat.com/security/cve/CVE-2024-48948
https://github.com/indutny/elliptic
https://github.com/indutny/elliptic/commit/34c853478cec1be4e37260ed2cb12cdbdc6402cf
https://github.com/indutny/elliptic/issues/321
https://github.com/indutny/elliptic/pull/322
https://nvd.nist.gov/vuln/detail/CVE-2024-48948
https://www.cve.org/CVERecord?id=CVE-2024-48948
|
elliptic |
CVE-2024-48949 |
LOW |
6.5.4 |
6.5.6 |
https://access.redhat.com/security/cve/CVE-2024-48949
https://github.com/indutny/elliptic
https://github.com/indutny/elliptic/commit/7ac5360118f74eb02da73bdf9f24fd0c72ff5281
https://github.com/indutny/elliptic/compare/v6.5.5...v6.5.6
https://nvd.nist.gov/vuln/detail/CVE-2024-48949
https://www.cve.org/CVERecord?id=CVE-2024-48949
|
engine.io |
CVE-2022-21676 |
HIGH |
5.0.0 |
4.1.2, 5.2.1, 6.1.1 |
https://github.com/socketio/engine.io
https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab
https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db
https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c
https://github.com/socketio/engine.io/releases/tag/4.1.2
https://github.com/socketio/engine.io/releases/tag/5.2.1
https://github.com/socketio/engine.io/releases/tag/6.1.1
https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f
https://nvd.nist.gov/vuln/detail/CVE-2022-21676
https://security.netapp.com/advisory/ntap-20220209-0002
https://security.netapp.com/advisory/ntap-20220209-0002/
|
engine.io |
CVE-2022-21676 |
HIGH |
5.0.0 |
4.1.2, 5.2.1, 6.1.1 |
https://github.com/socketio/engine.io
https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab
https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db
https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c
https://github.com/socketio/engine.io/releases/tag/4.1.2
https://github.com/socketio/engine.io/releases/tag/5.2.1
https://github.com/socketio/engine.io/releases/tag/6.1.1
https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f
https://nvd.nist.gov/vuln/detail/CVE-2022-21676
https://security.netapp.com/advisory/ntap-20220209-0002
https://security.netapp.com/advisory/ntap-20220209-0002/
|
engine.io |
CVE-2022-41940 |
MEDIUM |
5.0.0 |
3.6.1, 6.2.1 |
https://access.redhat.com/security/cve/CVE-2022-41940
https://github.com/socketio/engine.io
https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6
https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085
https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w
https://nvd.nist.gov/vuln/detail/CVE-2022-41940
https://www.cve.org/CVERecord?id=CVE-2022-41940
|
engine.io |
CVE-2022-41940 |
MEDIUM |
5.0.0 |
3.6.1, 6.2.1 |
https://access.redhat.com/security/cve/CVE-2022-41940
https://github.com/socketio/engine.io
https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6
https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085
https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w
https://nvd.nist.gov/vuln/detail/CVE-2022-41940
https://www.cve.org/CVERecord?id=CVE-2022-41940
|
express |
CVE-2024-43796 |
LOW |
4.19.2 |
4.20.0, 5.0.0 |
https://access.redhat.com/security/cve/CVE-2024-43796
https://github.com/expressjs/express
https://github.com/expressjs/express/commit/54271f69b511fea198471e6ff3400ab805d6b553
https://github.com/expressjs/express/security/advisories/GHSA-qw6h-vgh9-j6wx
https://nvd.nist.gov/vuln/detail/CVE-2024-43796
https://www.cve.org/CVERecord?id=CVE-2024-43796
|
flat |
CVE-2020-36632 |
CRITICAL |
4.1.1 |
5.0.1 |
https://github.com/hughsk/flat
https://github.com/hughsk/flat/commit/20ef0ef55dfa028caddaedbcb33efbdb04d18e13
https://github.com/hughsk/flat/issues/105
https://github.com/hughsk/flat/pull/106
https://github.com/hughsk/flat/releases/tag/5.0.1
https://nvd.nist.gov/vuln/detail/CVE-2020-36632
https://vuldb.com/?ctiid.216777
https://vuldb.com/?id.216777
|
follow-redirects |
CVE-2023-26159 |
MEDIUM |
1.15.2 |
1.15.4 |
https://access.redhat.com/security/cve/CVE-2023-26159
https://github.com/follow-redirects/follow-redirects
https://github.com/follow-redirects/follow-redirects/commit/7a6567e16dfa9ad18a70bfe91784c28653fbf19d
https://github.com/follow-redirects/follow-redirects/issues/235
https://github.com/follow-redirects/follow-redirects/pull/236
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZ425BFKNBQ6AK7I5SAM56TWON5OF2XM
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZ425BFKNBQ6AK7I5SAM56TWON5OF2XM/
https://nvd.nist.gov/vuln/detail/CVE-2023-26159
https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137
https://www.cve.org/CVERecord?id=CVE-2023-26159
|
follow-redirects |
CVE-2024-28849 |
MEDIUM |
1.15.2 |
1.15.6 |
https://access.redhat.com/security/cve/CVE-2024-28849
https://fetch.spec.whatwg.org/#authentication-entries
https://github.com/follow-redirects/follow-redirects
https://github.com/follow-redirects/follow-redirects/commit/c4f847f85176991f95ab9c88af63b1294de8649b
https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp
https://github.com/psf/requests/issues/1885
https://hackerone.com/reports/2390009
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOIF4EPQUCKDBEVTGRQDZ3CGTYQHPO7Z
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOIF4EPQUCKDBEVTGRQDZ3CGTYQHPO7Z/
https://nvd.nist.gov/vuln/detail/CVE-2024-28849
https://www.cve.org/CVERecord?id=CVE-2024-28849
|
get-func-name |
CVE-2023-43646 |
HIGH |
2.0.0 |
2.0.1 |
https://access.redhat.com/security/cve/CVE-2023-43646
https://github.com/advisories/GHSA-4q6p-r6v2-jvc5
https://github.com/chaijs/get-func-name
https://github.com/chaijs/get-func-name/blob/78ad756441a83f3dc203e50f76c113ae3ac017dc/index.js#L15
https://github.com/chaijs/get-func-name/commit/f934b228b5e2cb94d6c8576d3aac05493f667c69
https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5
https://nvd.nist.gov/vuln/detail/CVE-2023-43646
https://www.cve.org/CVERecord?id=CVE-2023-43646
|
got |
CVE-2022-33987 |
MEDIUM |
8.3.2 |
12.1.0, 11.8.5 |
https://access.redhat.com/errata/RHSA-2022:6595
https://access.redhat.com/security/cve/CVE-2022-33987
https://bugzilla.redhat.com/1907444
https://bugzilla.redhat.com/1945459
https://bugzilla.redhat.com/1964461
https://bugzilla.redhat.com/2007557
https://bugzilla.redhat.com/2098556
https://bugzilla.redhat.com/2102001
https://bugzilla.redhat.com/2105422
https://bugzilla.redhat.com/2105426
https://bugzilla.redhat.com/2105428
https://bugzilla.redhat.com/2105430
https://errata.almalinux.org/9/ALSA-2022-6595.html
https://github.com/sindresorhus/got
https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc
https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0
https://github.com/sindresorhus/got/pull/2047
https://github.com/sindresorhus/got/releases/tag/v11.8.5
https://github.com/sindresorhus/got/releases/tag/v12.1.0
https://linux.oracle.com/cve/CVE-2022-33987.html
https://linux.oracle.com/errata/ELSA-2022-6595.html
https://nvd.nist.gov/vuln/detail/CVE-2022-33987
https://www.cve.org/CVERecord?id=CVE-2022-33987
|
hosted-git-info |
CVE-2021-23362 |
MEDIUM |
2.8.8 |
2.8.9, 3.0.8 |
https://access.redhat.com/security/cve/CVE-2021-23362
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://errata.almalinux.org/8/ALSA-2021-3074.html
https://github.com/npm/hosted-git-info
https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7
https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01
https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3
https://github.com/npm/hosted-git-info/commits/v2
https://github.com/npm/hosted-git-info/pull/76
https://linux.oracle.com/cve/CVE-2021-23362.html
https://linux.oracle.com/errata/ELSA-2021-3074.html
https://nvd.nist.gov/vuln/detail/CVE-2021-23362
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356
https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355
https://www.cve.org/CVERecord?id=CVE-2021-23362
|
http-cache-semantics |
CVE-2022-25881 |
HIGH |
3.8.1 |
4.1.1 |
https://access.redhat.com/errata/RHSA-2023:2655
https://access.redhat.com/security/cve/CVE-2022-25881
https://bugzilla.redhat.com/2165824
https://bugzilla.redhat.com/2168631
https://bugzilla.redhat.com/2171935
https://bugzilla.redhat.com/2172190
https://bugzilla.redhat.com/2172204
https://bugzilla.redhat.com/2172217
https://bugzilla.redhat.com/show_bug.cgi?id=2165824
https://bugzilla.redhat.com/show_bug.cgi?id=2168631
https://bugzilla.redhat.com/show_bug.cgi?id=2171935
https://bugzilla.redhat.com/show_bug.cgi?id=2172190
https://bugzilla.redhat.com/show_bug.cgi?id=2172204
https://bugzilla.redhat.com/show_bug.cgi?id=2172217
https://bugzilla.redhat.com/show_bug.cgi?id=2178076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24807
https://errata.almalinux.org/9/ALSA-2023-2655.html
https://errata.rockylinux.org/RLSA-2023:2655
https://github.com/kornelski/http-cache-semantics
https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83
https://github.com/kornelski/http-cache-semantics/commit/560b2d8ef452bbba20ffed69dc155d63ac757b74
https://linux.oracle.com/cve/CVE-2022-25881.html
https://linux.oracle.com/errata/ELSA-2023-2655.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25881
https://security.netapp.com/advisory/ntap-20230622-0008
https://security.netapp.com/advisory/ntap-20230622-0008/
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332
https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783
https://www.cve.org/CVERecord?id=CVE-2022-25881
|
http-proxy-middleware |
CVE-2024-21536 |
HIGH |
2.0.6 |
2.0.7, 3.0.3 |
https://access.redhat.com/security/cve/CVE-2024-21536
https://gist.github.com/mhassan1/28be67266d82a53708ed59ce5dc3c94a
https://github.com/chimurai/http-proxy-middleware
https://github.com/chimurai/http-proxy-middleware/commit/0b4274e8cc9e9a2c5a06f35fbf456ccfcebc55a5
https://github.com/chimurai/http-proxy-middleware/commit/788b21e4aff38332d6319557d4a5b1b13b1f9a22
https://nvd.nist.gov/vuln/detail/CVE-2024-21536
https://security.snyk.io/vuln/SNYK-JS-HTTPPROXYMIDDLEWARE-8229906
https://www.cve.org/CVERecord?id=CVE-2024-21536
|
loader-utils |
CVE-2022-37601 |
CRITICAL |
1.4.0 |
2.0.3, 1.4.1 |
http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs2022.pdf
https://access.redhat.com/security/cve/CVE-2022-37601
https://dl.acm.org/doi/abs/10.1145/3488932.3497769
https://dl.acm.org/doi/pdf/10.1145/3488932.3497769
https://github.com/webpack/loader-utils
https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L11
https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L47
https://github.com/webpack/loader-utils/commit/4504e34c4796a5836ef70458327351675aed48a5
https://github.com/webpack/loader-utils/commit/a93cf6f4702012030f6b5ee8340d5c95ec1c7d4c
https://github.com/webpack/loader-utils/commit/f4e48a232fae900237c3e5ff7b57ce9e1c734de1
https://github.com/webpack/loader-utils/issues/212
https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884
https://github.com/webpack/loader-utils/pull/217
https://github.com/webpack/loader-utils/pull/220
https://github.com/webpack/loader-utils/releases/tag/v1.4.1
https://github.com/webpack/loader-utils/releases/tag/v2.0.3
https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826
https://lists.debian.org/debian-lts-announce/2022/12/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2022-37601
https://www.cve.org/CVERecord?id=CVE-2022-37601
|
loader-utils |
CVE-2022-37599 |
HIGH |
1.4.0 |
1.4.2, 2.0.4, 3.2.1 |
https://access.redhat.com/security/cve/CVE-2022-37599
https://github.com/advisories/GHSA-hhq3-ff78-jv3g
https://github.com/webpack/loader-utils
https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/interpolateName.js#L38
https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/interpolateName.js#L83
https://github.com/webpack/loader-utils/commit/17cbf8fa8989c1cb45bdd2997aa524729475f1fa
https://github.com/webpack/loader-utils/commit/ac09944dfacd7c4497ef692894b09e63e09a5eeb
https://github.com/webpack/loader-utils/commit/d2d752d59629daee38f34b24307221349c490eb1
https://github.com/webpack/loader-utils/issues/211
https://github.com/webpack/loader-utils/issues/216
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/
https://nvd.nist.gov/vuln/detail/CVE-2022-37599
https://www.cve.org/CVERecord?id=CVE-2022-37599
|
loader-utils |
CVE-2022-37603 |
HIGH |
1.4.0 |
1.4.2, 2.0.4, 3.2.1 |
https://access.redhat.com/security/cve/CVE-2022-37603
https://github.com/webpack/loader-utils
https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/interpolateName.js#L107
https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/interpolateName.js#L38
https://github.com/webpack/loader-utils/commit/17cbf8fa8989c1cb45bdd2997aa524729475f1fa
https://github.com/webpack/loader-utils/commit/ac09944dfacd7c4497ef692894b09e63e09a5eeb
https://github.com/webpack/loader-utils/commit/d2d752d59629daee38f34b24307221349c490eb1
https://github.com/webpack/loader-utils/issues/213
https://github.com/webpack/loader-utils/issues/216
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU
https://nvd.nist.gov/vuln/detail/CVE-2022-37603
https://www.cve.org/CVERecord?id=CVE-2022-37603
|
micromatch |
CVE-2024-4067 |
MEDIUM |
3.1.10 |
4.0.8 |
https://access.redhat.com/security/cve/CVE-2024-4067
https://advisory.checkmarx.net/advisory/CVE-2024-4067
https://advisory.checkmarx.net/advisory/CVE-2024-4067/
https://devhub.checkmarx.com/cve-details/CVE-2024-4067
https://devhub.checkmarx.com/cve-details/CVE-2024-4067/
https://github.com/micromatch/micromatch
https://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448
https://github.com/micromatch/micromatch/commit/03aa8052171e878897eee5d7bb2ae0ae83ec2ade
https://github.com/micromatch/micromatch/commit/500d5d6f42f0e8dfa1cb5464c6cb420b1b6aaaa0
https://github.com/micromatch/micromatch/issues/243
https://github.com/micromatch/micromatch/pull/247
https://github.com/micromatch/micromatch/pull/266
https://github.com/micromatch/micromatch/releases/tag/4.0.8
https://nvd.nist.gov/vuln/detail/CVE-2024-4067
https://www.cve.org/CVERecord?id=CVE-2024-4067
|
micromatch |
CVE-2024-4067 |
MEDIUM |
4.0.6 |
4.0.8 |
https://access.redhat.com/security/cve/CVE-2024-4067
https://advisory.checkmarx.net/advisory/CVE-2024-4067
https://advisory.checkmarx.net/advisory/CVE-2024-4067/
https://devhub.checkmarx.com/cve-details/CVE-2024-4067
https://devhub.checkmarx.com/cve-details/CVE-2024-4067/
https://github.com/micromatch/micromatch
https://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448
https://github.com/micromatch/micromatch/commit/03aa8052171e878897eee5d7bb2ae0ae83ec2ade
https://github.com/micromatch/micromatch/commit/500d5d6f42f0e8dfa1cb5464c6cb420b1b6aaaa0
https://github.com/micromatch/micromatch/issues/243
https://github.com/micromatch/micromatch/pull/247
https://github.com/micromatch/micromatch/pull/266
https://github.com/micromatch/micromatch/releases/tag/4.0.8
https://nvd.nist.gov/vuln/detail/CVE-2024-4067
https://www.cve.org/CVERecord?id=CVE-2024-4067
|
minimatch |
CVE-2022-3517 |
HIGH |
3.0.4 |
3.0.5 |
https://access.redhat.com/errata/RHSA-2023:0321
https://access.redhat.com/security/cve/CVE-2022-3517
https://bugzilla.redhat.com/2066009
https://bugzilla.redhat.com/2130518
https://bugzilla.redhat.com/2134609
https://bugzilla.redhat.com/2140911
https://bugzilla.redhat.com/show_bug.cgi?id=2066009
https://bugzilla.redhat.com/show_bug.cgi?id=2130518
https://bugzilla.redhat.com/show_bug.cgi?id=2134609
https://bugzilla.redhat.com/show_bug.cgi?id=2140911
https://bugzilla.redhat.com/show_bug.cgi?id=2142808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548
https://errata.almalinux.org/9/ALSA-2023-0321.html
https://errata.rockylinux.org/RLSA-2023:0321
https://github.com/grafana/grafana-image-renderer/issues/329
https://github.com/isaacs/minimatch
https://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6
https://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6 (v3.0.5)
https://github.com/nodejs/node/issues/42510
https://linux.oracle.com/cve/CVE-2022-3517.html
https://linux.oracle.com/errata/ELSA-2023-1743.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK
https://nvd.nist.gov/vuln/detail/CVE-2022-3517
https://ubuntu.com/security/notices/USN-6086-1
https://www.cve.org/CVERecord?id=CVE-2022-3517
|
minimist |
CVE-2021-44906 |
CRITICAL |
0.0.8 |
1.2.6, 0.2.4 |
https://access.redhat.com/errata/RHSA-2023:0321
https://access.redhat.com/security/cve/CVE-2021-44906
https://bugzilla.redhat.com/2066009
https://bugzilla.redhat.com/2130518
https://bugzilla.redhat.com/2134609
https://bugzilla.redhat.com/2140911
https://bugzilla.redhat.com/show_bug.cgi?id=2066009
https://bugzilla.redhat.com/show_bug.cgi?id=2130518
https://bugzilla.redhat.com/show_bug.cgi?id=2134609
https://bugzilla.redhat.com/show_bug.cgi?id=2140911
https://bugzilla.redhat.com/show_bug.cgi?id=2142808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548
https://errata.almalinux.org/9/ALSA-2023-0321.html
https://errata.rockylinux.org/RLSA-2023:0321
https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://github.com/minimistjs/minimist/commit/34e20b8461118608703d6485326abbb8e35e1703
https://github.com/minimistjs/minimist/commit/bc8ecee43875261f4f17eb20b1243d3ed15e70eb
https://github.com/minimistjs/minimist/commit/c2b981977fa834b223b408cfb860f933c9811e4d
https://github.com/minimistjs/minimist/commit/ef9153fc52b6cea0744b2239921c5dcae4697f11
https://github.com/minimistjs/minimist/commits/v0.2.4
https://github.com/minimistjs/minimist/issues/11
https://github.com/minimistjs/minimist/pull/24
https://github.com/substack/minimist
https://github.com/substack/minimist/blob/master/index.js#L69
https://github.com/substack/minimist/issues/164
https://linux.oracle.com/cve/CVE-2021-44906.html
https://linux.oracle.com/errata/ELSA-2023-0321.html
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://security.netapp.com/advisory/ntap-20240621-0006
https://security.netapp.com/advisory/ntap-20240621-0006/
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068
https://www.cve.org/CVERecord?id=CVE-2021-44906
|
minimist |
CVE-2020-7598 |
MEDIUM |
0.0.8 |
0.2.1, 1.2.3 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-7598
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/minimistjs/minimist/commit/10bd4cdf49d9686d48214be9d579a9cdfda37c68
https://github.com/minimistjs/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab
https://github.com/minimistjs/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95
https://github.com/minimistjs/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94
https://github.com/substack/minimist
https://linux.oracle.com/cve/CVE-2020-7598.html
https://linux.oracle.com/errata/ELSA-2020-2852.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7598
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://www.cve.org/CVERecord?id=CVE-2020-7598
https://www.npmjs.com/advisories/1179
|
nth-check |
CVE-2021-3803 |
HIGH |
1.0.2 |
2.0.1 |
https://access.redhat.com/security/cve/CVE-2021-3803
https://github.com/advisories/GHSA-rp65-9cf3-cjxr
https://github.com/fb55/nth-check
https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726
https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726 (v2.0.1)
https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0
https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0/
https://lists.debian.org/debian-lts-announce/2023/05/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3803
https://ubuntu.com/security/notices/USN-6114-1
https://www.cve.org/CVERecord?id=CVE-2021-3803
|
path-to-regexp |
CVE-2024-45296 |
HIGH |
0.1.7 |
1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 |
https://access.redhat.com/security/cve/CVE-2024-45296
https://github.com/pillarjs/path-to-regexp
https://github.com/pillarjs/path-to-regexp/commit/29b96b4a1de52824e1ca0f49a701183cc4ed476f
https://github.com/pillarjs/path-to-regexp/commit/60f2121e9b66b7b622cc01080df0aabda9eedee6
https://github.com/pillarjs/path-to-regexp/commit/925ac8e3c5780b02f58cbd4e52f95da8ad2ac485
https://github.com/pillarjs/path-to-regexp/commit/d31670ae8f6e69cbfd56e835742195b7d10942ef
https://github.com/pillarjs/path-to-regexp/commit/f1253b47b347dcb909e3e80b0eb2649109e59894
https://github.com/pillarjs/path-to-regexp/releases/tag/v6.3.0
https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598j
https://nvd.nist.gov/vuln/detail/CVE-2024-45296
https://www.cve.org/CVERecord?id=CVE-2024-45296
|
phin |
GHSA-x565-32qp-m3vf |
MEDIUM |
2.9.3 |
3.7.1 |
https://github.com/ethanent/phin
https://github.com/ethanent/phin/commit/c071f95336a987dad9332fd388adeb249925cc57
https://github.com/ethanent/phin/security/advisories/GHSA-x565-32qp-m3vf
|
semver |
CVE-2022-25883 |
HIGH |
7.3.2 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363
https://access.redhat.com/security/cve/CVE-2022-25883
https://bugzilla.redhat.com/2216475
https://bugzilla.redhat.com/2230948
https://bugzilla.redhat.com/2230955
https://bugzilla.redhat.com/2230956
https://errata.almalinux.org/9/ALSA-2023-5363.html
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
https://github.com/npm/node-semver
https://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104
https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104
https://github.com/npm/node-semver/blob/main/internal/re.js#L138
https://github.com/npm/node-semver/blob/main/internal/re.js#L160
https://github.com/npm/node-semver/blob/main/internal/re.js%23L138
https://github.com/npm/node-semver/blob/main/internal/re.js%23L160
https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0
https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441
https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920c
https://github.com/npm/node-semver/pull/564
https://github.com/npm/node-semver/pull/585
https://github.com/npm/node-semver/pull/593
https://linux.oracle.com/cve/CVE-2022-25883.html
https://linux.oracle.com/errata/ELSA-2023-5363.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25883
https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795
https://www.cve.org/CVERecord?id=CVE-2022-25883
|
semver |
CVE-2022-25883 |
HIGH |
7.3.2 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363
https://access.redhat.com/security/cve/CVE-2022-25883
https://bugzilla.redhat.com/2216475
https://bugzilla.redhat.com/2230948
https://bugzilla.redhat.com/2230955
https://bugzilla.redhat.com/2230956
https://errata.almalinux.org/9/ALSA-2023-5363.html
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
https://github.com/npm/node-semver
https://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104
https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104
https://github.com/npm/node-semver/blob/main/internal/re.js#L138
https://github.com/npm/node-semver/blob/main/internal/re.js#L160
https://github.com/npm/node-semver/blob/main/internal/re.js%23L138
https://github.com/npm/node-semver/blob/main/internal/re.js%23L160
https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0
https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441
https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920c
https://github.com/npm/node-semver/pull/564
https://github.com/npm/node-semver/pull/585
https://github.com/npm/node-semver/pull/593
https://linux.oracle.com/cve/CVE-2022-25883.html
https://linux.oracle.com/errata/ELSA-2023-5363.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25883
https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795
https://www.cve.org/CVERecord?id=CVE-2022-25883
|
semver |
CVE-2022-25883 |
HIGH |
7.3.2 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363
https://access.redhat.com/security/cve/CVE-2022-25883
https://bugzilla.redhat.com/2216475
https://bugzilla.redhat.com/2230948
https://bugzilla.redhat.com/2230955
https://bugzilla.redhat.com/2230956
https://errata.almalinux.org/9/ALSA-2023-5363.html
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
https://github.com/npm/node-semver
https://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104
https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104
https://github.com/npm/node-semver/blob/main/internal/re.js#L138
https://github.com/npm/node-semver/blob/main/internal/re.js#L160
https://github.com/npm/node-semver/blob/main/internal/re.js%23L138
https://github.com/npm/node-semver/blob/main/internal/re.js%23L160
https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0
https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441
https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920c
https://github.com/npm/node-semver/pull/564
https://github.com/npm/node-semver/pull/585
https://github.com/npm/node-semver/pull/593
https://linux.oracle.com/cve/CVE-2022-25883.html
https://linux.oracle.com/errata/ELSA-2023-5363.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25883
https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795
https://www.cve.org/CVERecord?id=CVE-2022-25883
|
semver |
CVE-2022-25883 |
HIGH |
7.3.2 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363
https://access.redhat.com/security/cve/CVE-2022-25883
https://bugzilla.redhat.com/2216475
https://bugzilla.redhat.com/2230948
https://bugzilla.redhat.com/2230955
https://bugzilla.redhat.com/2230956
https://errata.almalinux.org/9/ALSA-2023-5363.html
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
https://github.com/npm/node-semver
https://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104
https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104
https://github.com/npm/node-semver/blob/main/internal/re.js#L138
https://github.com/npm/node-semver/blob/main/internal/re.js#L160
https://github.com/npm/node-semver/blob/main/internal/re.js%23L138
https://github.com/npm/node-semver/blob/main/internal/re.js%23L160
https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0
https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441
https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920c
https://github.com/npm/node-semver/pull/564
https://github.com/npm/node-semver/pull/585
https://github.com/npm/node-semver/pull/593
https://linux.oracle.com/cve/CVE-2022-25883.html
https://linux.oracle.com/errata/ELSA-2023-5363.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25883
https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795
https://www.cve.org/CVERecord?id=CVE-2022-25883
|
semver |
CVE-2022-25883 |
HIGH |
7.3.5 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363
https://access.redhat.com/security/cve/CVE-2022-25883
https://bugzilla.redhat.com/2216475
https://bugzilla.redhat.com/2230948
https://bugzilla.redhat.com/2230955
https://bugzilla.redhat.com/2230956
https://errata.almalinux.org/9/ALSA-2023-5363.html
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
https://github.com/npm/node-semver
https://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104
https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104
https://github.com/npm/node-semver/blob/main/internal/re.js#L138
https://github.com/npm/node-semver/blob/main/internal/re.js#L160
https://github.com/npm/node-semver/blob/main/internal/re.js%23L138
https://github.com/npm/node-semver/blob/main/internal/re.js%23L160
https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0
https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441
https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920c
https://github.com/npm/node-semver/pull/564
https://github.com/npm/node-semver/pull/585
https://github.com/npm/node-semver/pull/593
https://linux.oracle.com/cve/CVE-2022-25883.html
https://linux.oracle.com/errata/ELSA-2023-5363.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25883
https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795
https://www.cve.org/CVERecord?id=CVE-2022-25883
|
25 other vulnerabilities found... |
No Misconfigurations found |