-
Notifications
You must be signed in to change notification settings - Fork 97
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
High severity vulnerabilities / serve-handler / path-to-regexp path-to-regexp-2.2.1.tgz #212
Comments
Adding this to package.json appears to resolve the issue
|
Should also be fixed in path-to-regexp 3.3.0 - might be less "agressive" |
This is a duplicate of #211. @SrideviE50254 Please take the time to check open issues before creating a new one. |
Hi @cylewaitforit, Thank you for informing me about the duplicate issue. In the future, I will check the existing tickets before creating a new one. I referred to the issue you linked, #211. I am using the same versions of Serve and Serve Handler: └─┬ [email protected] However, Mend Bolt is suggesting version 0.1.10 or 8.0.0 for This still doesn't resolve my problem. Should I continue the discussion here or in the reference task you mentioned? Thank you |
Hello Team,
Mend Bolt tool is showing vulnerability in package "path-to-regexp-2.2.1.tgz" with [CVE-2024-45296]
Vulnerability is raised from the [email protected] module which is used as a transitive dependency. The recommended version of this is 8.1.0
Running npm list path-to-regexp returns the following:
└─┬ [email protected]
└─┬ [email protected]
└── [email protected]
Could you please upgrade the path-to-regexp transitive dependency to 8.1.0 to fix it at asap.
Regards,
Sridevi G
The text was updated successfully, but these errors were encountered: