You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.
The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)."
mend-for-github.aaakk.us.kgbot
changed the title
swig-1.4.2.tgz: 2 vulnerabilities (highest severity is: 7.8)
swig-1.4.2.tgz: 4 vulnerabilities (highest severity is: 9.8)
Jun 9, 2022
mend-for-github.aaakk.us.kgbot
changed the title
swig-1.4.2.tgz: 4 vulnerabilities (highest severity is: 9.8)
swig-1.4.2.tgz: 3 vulnerabilities (highest severity is: 7.5)
Jun 29, 2022
mend-for-github.aaakk.us.kgbot
changed the title
swig-1.4.2.tgz: 3 vulnerabilities (highest severity is: 7.5)
swig-1.4.2.tgz: 3 vulnerabilities (highest severity is: 9.8)
Sep 22, 2022
mend-for-github.aaakk.us.kgbot
changed the title
swig-1.4.2.tgz: 3 vulnerabilities (highest severity is: 9.8)
swig-1.4.2.tgz: 4 vulnerabilities (highest severity is: 9.8)
Oct 5, 2022
mend-for-github.aaakk.us.kgbot
changed the title
swig-1.4.2.tgz: 4 vulnerabilities (highest severity is: 9.8)
swig-1.4.2.tgz: 3 vulnerabilities (highest severity is: 9.8)
Dec 26, 2022
Vulnerable Library - swig-1.4.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/uglify-js/package.json
Found in HEAD commit: 56e7acff59b9f3414f84b7fcdf7bdf62d3f6ec0d
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
CVE-2021-44906
Vulnerable Library - minimist-0.0.10.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/minimist/package.json
Dependency Hierarchy:
Found in HEAD commit: 56e7acff59b9f3414f84b7fcdf7bdf62d3f6ec0d
Found in base branch: main
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: 2022-03-17
URL: CVE-2021-44906
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2022-03-17
Fix Resolution: minimist - 1.2.6
CVE-2015-8858
Vulnerable Library - uglify-js-2.4.24.tgz
JavaScript parser, mangler/compressor and beautifier toolkit
Library home page: https://registry.npmjs.org/uglify-js/-/uglify-js-2.4.24.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/uglify-js/package.json
Dependency Hierarchy:
Found in HEAD commit: 56e7acff59b9f3414f84b7fcdf7bdf62d3f6ec0d
Found in base branch: main
Vulnerability Details
The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)."
Publish Date: 2017-01-23
URL: CVE-2015-8858
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858
Release Date: 2017-01-23
Fix Resolution: v2.6.0
CVE-2020-7598
Vulnerable Library - minimist-0.0.10.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/minimist/package.json
Dependency Hierarchy:
Found in HEAD commit: 56e7acff59b9f3414f84b7fcdf7bdf62d3f6ec0d
Found in base branch: main
Vulnerability Details
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "proto" payload.
Publish Date: 2020-03-11
URL: CVE-2020-7598
CVSS 3 Score Details (5.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2020-03-11
Fix Resolution: minimist - 0.2.1,1.2.3
The text was updated successfully, but these errors were encountered: