ansi-regex |
CVE-2021-3807 |
HIGH |
3.0.0 |
6.0.1, 5.0.1, 4.1.1, 3.0.1 |
https://access.redhat.com/errata/RHSA-2022:6595https://access.redhat.com/security/cve/CVE-2021-3807more links (toggle)https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908https://bugzilla.redhat.com/1907444https://bugzilla.redhat.com/1945459https://bugzilla.redhat.com/1964461https://bugzilla.redhat.com/2007557https://bugzilla.redhat.com/2098556https://bugzilla.redhat.com/2102001https://bugzilla.redhat.com/2105422https://bugzilla.redhat.com/2105426https://bugzilla.redhat.com/2105428https://bugzilla.redhat.com/2105430https://errata.almalinux.org/9/ALSA-2022-6595.htmlhttps://github.com/chalk/ansi-regexhttps://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9ahttps://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774https://github.com/chalk/ansi-regex/releases/tag/v6.0.1https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994https://linux.oracle.com/cve/CVE-2021-3807.htmlhttps://linux.oracle.com/errata/ELSA-2022-6595.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2021-3807https://security.netapp.com/advisory/ntap-20221014-0002https://security.netapp.com/advisory/ntap-20221014-0002/https://www.cve.org/CVERecord?id=CVE-2021-3807https://www.oracle.com/security-alerts/cpuapr2022.html |
ansi-regex |
CVE-2021-3807 |
HIGH |
3.0.0 |
6.0.1, 5.0.1, 4.1.1, 3.0.1 |
https://access.redhat.com/errata/RHSA-2022:6595https://access.redhat.com/security/cve/CVE-2021-3807more links (toggle)https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908https://bugzilla.redhat.com/1907444https://bugzilla.redhat.com/1945459https://bugzilla.redhat.com/1964461https://bugzilla.redhat.com/2007557https://bugzilla.redhat.com/2098556https://bugzilla.redhat.com/2102001https://bugzilla.redhat.com/2105422https://bugzilla.redhat.com/2105426https://bugzilla.redhat.com/2105428https://bugzilla.redhat.com/2105430https://errata.almalinux.org/9/ALSA-2022-6595.htmlhttps://github.com/chalk/ansi-regexhttps://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9ahttps://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774https://github.com/chalk/ansi-regex/releases/tag/v6.0.1https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994https://linux.oracle.com/cve/CVE-2021-3807.htmlhttps://linux.oracle.com/errata/ELSA-2022-6595.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2021-3807https://security.netapp.com/advisory/ntap-20221014-0002https://security.netapp.com/advisory/ntap-20221014-0002/https://www.cve.org/CVERecord?id=CVE-2021-3807https://www.oracle.com/security-alerts/cpuapr2022.html |
body-parser |
CVE-2024-45590 |
HIGH |
1.20.2 |
1.20.3 |
https://access.redhat.com/security/cve/CVE-2024-45590https://github.com/expressjs/body-parsermore links (toggle)https://github.com/expressjs/body-parser/commit/b2695c4450f06ba3b0ccf48d872a229bb41c9bcehttps://github.com/expressjs/body-parser/security/advisories/GHSA-qwcr-r2fm-qrc7https://nvd.nist.gov/vuln/detail/CVE-2024-45590https://www.cve.org/CVERecord?id=CVE-2024-45590 |
braces |
CVE-2024-4068 |
HIGH |
2.3.2 |
3.0.3 |
https://access.redhat.com/security/cve/CVE-2024-4068https://devhub.checkmarx.com/cve-details/CVE-2024-4068more links (toggle)https://devhub.checkmarx.com/cve-details/CVE-2024-4068/https://github.com/micromatch/braceshttps://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ffhttps://github.com/micromatch/braces/issues/35https://github.com/micromatch/braces/pull/37https://github.com/micromatch/braces/pull/40https://nvd.nist.gov/vuln/detail/CVE-2024-4068https://www.cve.org/CVERecord?id=CVE-2024-4068 |
cookie |
CVE-2024-47764 |
LOW |
0.4.0 |
0.7.0 |
https://access.redhat.com/security/cve/CVE-2024-47764https://github.com/jshttp/cookiemore links (toggle)https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5chttps://github.com/jshttp/cookie/pull/167https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8xhttps://nvd.nist.gov/vuln/detail/CVE-2024-47764https://www.cve.org/CVERecord?id=CVE-2024-47764 |
cookie |
CVE-2024-47764 |
LOW |
0.4.2 |
0.7.0 |
https://access.redhat.com/security/cve/CVE-2024-47764https://github.com/jshttp/cookiemore links (toggle)https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5chttps://github.com/jshttp/cookie/pull/167https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8xhttps://nvd.nist.gov/vuln/detail/CVE-2024-47764https://www.cve.org/CVERecord?id=CVE-2024-47764 |
cookie |
CVE-2024-47764 |
LOW |
0.6.0 |
0.7.0 |
https://access.redhat.com/security/cve/CVE-2024-47764https://github.com/jshttp/cookiemore links (toggle)https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5chttps://github.com/jshttp/cookie/pull/167https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8xhttps://nvd.nist.gov/vuln/detail/CVE-2024-47764https://www.cve.org/CVERecord?id=CVE-2024-47764 |
cross-spawn |
CVE-2024-21538 |
HIGH |
6.0.5 |
7.0.5, 6.0.6 |
https://github.com/moxystudio/node-cross-spawnhttps://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ffmore links (toggle)https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374fhttps://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8ddhttps://github.com/moxystudio/node-cross-spawn/issues/165https://github.com/moxystudio/node-cross-spawn/pull/160https://nvd.nist.gov/vuln/detail/CVE-2024-21538https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230 |
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://github.com/moxystudio/node-cross-spawnhttps://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ffmore links (toggle)https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374fhttps://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8ddhttps://github.com/moxystudio/node-cross-spawn/issues/165https://github.com/moxystudio/node-cross-spawn/pull/160https://nvd.nist.gov/vuln/detail/CVE-2024-21538https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230 |
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://github.com/moxystudio/node-cross-spawnhttps://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ffmore links (toggle)https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374fhttps://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8ddhttps://github.com/moxystudio/node-cross-spawn/issues/165https://github.com/moxystudio/node-cross-spawn/pull/160https://nvd.nist.gov/vuln/detail/CVE-2024-21538https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230 |
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://github.com/moxystudio/node-cross-spawnhttps://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ffmore links (toggle)https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374fhttps://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8ddhttps://github.com/moxystudio/node-cross-spawn/issues/165https://github.com/moxystudio/node-cross-spawn/pull/160https://nvd.nist.gov/vuln/detail/CVE-2024-21538https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230 |
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://github.com/moxystudio/node-cross-spawnhttps://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ffmore links (toggle)https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374fhttps://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8ddhttps://github.com/moxystudio/node-cross-spawn/issues/165https://github.com/moxystudio/node-cross-spawn/pull/160https://nvd.nist.gov/vuln/detail/CVE-2024-21538https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230 |
cross-spawn |
CVE-2024-21538 |
HIGH |
7.0.3 |
7.0.5, 6.0.6 |
https://github.com/moxystudio/node-cross-spawnhttps://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ffmore links (toggle)https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374fhttps://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8ddhttps://github.com/moxystudio/node-cross-spawn/issues/165https://github.com/moxystudio/node-cross-spawn/pull/160https://nvd.nist.gov/vuln/detail/CVE-2024-21538https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230 |
debug |
CVE-2017-16137 |
LOW |
3.2.6 |
2.6.9, 3.1.0, 3.2.7, 4.3.1 |
https://access.redhat.com/security/cve/CVE-2017-16137https://github.com/debug-js/debug/commit/4e2150207c568adb9ead8f4c4528016081c88020more links (toggle)https://github.com/debug-js/debug/commit/71169065b5262f9858ac78cc0b688c84a438f290https://github.com/debug-js/debug/commit/b6d12fdbc63b483e5c969da33ea6adc09946b5achttps://github.com/debug-js/debug/commit/f53962e944a87e6ca9bb622a2a12dffc22a9bb5ahttps://github.com/debug-js/debug/issues/797https://github.com/visionmedia/debughttps://github.com/visionmedia/debug/issues/501https://github.com/visionmedia/debug/pull/504https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3Ehttps://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3Ehttps://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3Ehttps://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3Ehttps://nodesecurity.io/advisories/534https://nvd.nist.gov/vuln/detail/CVE-2017-16137https://www.cve.org/CVERecord?id=CVE-2017-16137 |
debug |
CVE-2017-16137 |
LOW |
4.1.1 |
2.6.9, 3.1.0, 3.2.7, 4.3.1 |
https://access.redhat.com/security/cve/CVE-2017-16137https://github.com/debug-js/debug/commit/4e2150207c568adb9ead8f4c4528016081c88020more links (toggle)https://github.com/debug-js/debug/commit/71169065b5262f9858ac78cc0b688c84a438f290https://github.com/debug-js/debug/commit/b6d12fdbc63b483e5c969da33ea6adc09946b5achttps://github.com/debug-js/debug/commit/f53962e944a87e6ca9bb622a2a12dffc22a9bb5ahttps://github.com/debug-js/debug/issues/797https://github.com/visionmedia/debughttps://github.com/visionmedia/debug/issues/501https://github.com/visionmedia/debug/pull/504https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3Ehttps://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3Ehttps://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3Ehttps://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3Ehttps://nodesecurity.io/advisories/534https://nvd.nist.gov/vuln/detail/CVE-2017-16137https://www.cve.org/CVERecord?id=CVE-2017-16137 |
debug |
CVE-2017-16137 |
LOW |
4.1.1 |
2.6.9, 3.1.0, 3.2.7, 4.3.1 |
https://access.redhat.com/security/cve/CVE-2017-16137https://github.com/debug-js/debug/commit/4e2150207c568adb9ead8f4c4528016081c88020more links (toggle)https://github.com/debug-js/debug/commit/71169065b5262f9858ac78cc0b688c84a438f290https://github.com/debug-js/debug/commit/b6d12fdbc63b483e5c969da33ea6adc09946b5achttps://github.com/debug-js/debug/commit/f53962e944a87e6ca9bb622a2a12dffc22a9bb5ahttps://github.com/debug-js/debug/issues/797https://github.com/visionmedia/debughttps://github.com/visionmedia/debug/issues/501https://github.com/visionmedia/debug/pull/504https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3Ehttps://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3Ehttps://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3Ehttps://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3Ehttps://nodesecurity.io/advisories/534https://nvd.nist.gov/vuln/detail/CVE-2017-16137https://www.cve.org/CVERecord?id=CVE-2017-16137 |
elliptic |
CVE-2024-42459 |
LOW |
6.5.4 |
6.5.7 |
https://access.redhat.com/security/cve/CVE-2024-42459https://github.com/indutny/ellipticmore links (toggle)https://github.com/indutny/elliptic/commit/accb61e9c1a005e5c8ff96a8b33893100bb42d11https://github.com/indutny/elliptic/commit/c0690b36be043ee73c1780ae4b7df48632b11cf9https://github.com/indutny/elliptic/pull/317https://nvd.nist.gov/vuln/detail/CVE-2024-42459https://www.cve.org/CVERecord?id=CVE-2024-42459 |
elliptic |
CVE-2024-42460 |
LOW |
6.5.4 |
6.5.7 |
https://access.redhat.com/security/cve/CVE-2024-42460https://github.com/indutny/ellipticmore links (toggle)https://github.com/indutny/elliptic/commit/accb61e9c1a005e5c8ff96a8b33893100bb42d11https://github.com/indutny/elliptic/commit/b6ff1758d9a6d1a7aec177ff6df9f586492a6315https://github.com/indutny/elliptic/pull/317https://nvd.nist.gov/vuln/detail/CVE-2024-42460https://www.cve.org/CVERecord?id=CVE-2024-42460 |
elliptic |
CVE-2024-42461 |
LOW |
6.5.4 |
6.5.7 |
https://access.redhat.com/security/cve/CVE-2024-42461https://github.com/indutny/ellipticmore links (toggle)https://github.com/indutny/elliptic/commit/accb61e9c1a005e5c8ff96a8b33893100bb42d11https://github.com/indutny/elliptic/pull/317https://nvd.nist.gov/vuln/detail/CVE-2024-42461https://www.cve.org/CVERecord?id=CVE-2024-42461 |
elliptic |
CVE-2024-48948 |
LOW |
6.5.4 |
6.6.0 |
https://access.redhat.com/security/cve/CVE-2024-48948https://github.com/indutny/ellipticmore links (toggle)https://github.com/indutny/elliptic/commit/34c853478cec1be4e37260ed2cb12cdbdc6402cfhttps://github.com/indutny/elliptic/issues/321https://github.com/indutny/elliptic/pull/322https://nvd.nist.gov/vuln/detail/CVE-2024-48948https://www.cve.org/CVERecord?id=CVE-2024-48948 |
elliptic |
CVE-2024-48949 |
LOW |
6.5.4 |
6.5.6 |
https://access.redhat.com/security/cve/CVE-2024-48949https://github.com/indutny/ellipticmore links (toggle)https://github.com/indutny/elliptic/commit/7ac5360118f74eb02da73bdf9f24fd0c72ff5281https://github.com/indutny/elliptic/compare/v6.5.5...v6.5.6https://nvd.nist.gov/vuln/detail/CVE-2024-48949https://www.cve.org/CVERecord?id=CVE-2024-48949 |
engine.io |
CVE-2022-21676 |
HIGH |
5.0.0 |
4.1.2, 5.2.1, 6.1.1 |
https://github.com/socketio/engine.iohttps://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874abmore links (toggle)https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659dbhttps://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098chttps://github.com/socketio/engine.io/releases/tag/4.1.2https://github.com/socketio/engine.io/releases/tag/5.2.1https://github.com/socketio/engine.io/releases/tag/6.1.1https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34fhttps://nvd.nist.gov/vuln/detail/CVE-2022-21676https://security.netapp.com/advisory/ntap-20220209-0002https://security.netapp.com/advisory/ntap-20220209-0002/ |
engine.io |
CVE-2022-21676 |
HIGH |
5.0.0 |
4.1.2, 5.2.1, 6.1.1 |
https://github.com/socketio/engine.iohttps://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874abmore links (toggle)https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659dbhttps://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098chttps://github.com/socketio/engine.io/releases/tag/4.1.2https://github.com/socketio/engine.io/releases/tag/5.2.1https://github.com/socketio/engine.io/releases/tag/6.1.1https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34fhttps://nvd.nist.gov/vuln/detail/CVE-2022-21676https://security.netapp.com/advisory/ntap-20220209-0002https://security.netapp.com/advisory/ntap-20220209-0002/ |
engine.io |
CVE-2022-41940 |
MEDIUM |
5.0.0 |
3.6.1, 6.2.1 |
https://access.redhat.com/security/cve/CVE-2022-41940https://github.com/socketio/engine.iomore links (toggle)https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84whttps://nvd.nist.gov/vuln/detail/CVE-2022-41940https://www.cve.org/CVERecord?id=CVE-2022-41940 |
engine.io |
CVE-2022-41940 |
MEDIUM |
5.0.0 |
3.6.1, 6.2.1 |
https://access.redhat.com/security/cve/CVE-2022-41940https://github.com/socketio/engine.iomore links (toggle)https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84whttps://nvd.nist.gov/vuln/detail/CVE-2022-41940https://www.cve.org/CVERecord?id=CVE-2022-41940 |
express |
CVE-2024-43796 |
LOW |
4.19.2 |
4.20.0, 5.0.0 |
https://access.redhat.com/security/cve/CVE-2024-43796https://github.com/expressjs/expressmore links (toggle)https://github.com/expressjs/express/commit/54271f69b511fea198471e6ff3400ab805d6b553https://github.com/expressjs/express/security/advisories/GHSA-qw6h-vgh9-j6wxhttps://nvd.nist.gov/vuln/detail/CVE-2024-43796https://www.cve.org/CVERecord?id=CVE-2024-43796 |
flat |
CVE-2020-36632 |
CRITICAL |
4.1.1 |
5.0.1 |
https://github.com/hughsk/flathttps://github.com/hughsk/flat/commit/20ef0ef55dfa028caddaedbcb33efbdb04d18e13more links (toggle)https://github.com/hughsk/flat/issues/105https://github.com/hughsk/flat/pull/106https://github.com/hughsk/flat/releases/tag/5.0.1https://nvd.nist.gov/vuln/detail/CVE-2020-36632https://vuldb.com/?ctiid.216777https://vuldb.com/?id.216777 |
follow-redirects |
CVE-2023-26159 |
MEDIUM |
1.15.2 |
1.15.4 |
https://access.redhat.com/security/cve/CVE-2023-26159https://github.com/follow-redirects/follow-redirectsmore links (toggle)https://github.com/follow-redirects/follow-redirects/commit/7a6567e16dfa9ad18a70bfe91784c28653fbf19dhttps://github.com/follow-redirects/follow-redirects/issues/235https://github.com/follow-redirects/follow-redirects/pull/236https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZ425BFKNBQ6AK7I5SAM56TWON5OF2XMhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZ425BFKNBQ6AK7I5SAM56TWON5OF2XM/https://nvd.nist.gov/vuln/detail/CVE-2023-26159https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137https://www.cve.org/CVERecord?id=CVE-2023-26159 |
follow-redirects |
CVE-2024-28849 |
MEDIUM |
1.15.2 |
1.15.6 |
https://access.redhat.com/security/cve/CVE-2024-28849https://fetch.spec.whatwg.org/#authentication-entriesmore links (toggle)https://github.com/follow-redirects/follow-redirectshttps://github.com/follow-redirects/follow-redirects/commit/c4f847f85176991f95ab9c88af63b1294de8649bhttps://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfphttps://github.com/psf/requests/issues/1885https://hackerone.com/reports/2390009https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOIF4EPQUCKDBEVTGRQDZ3CGTYQHPO7Zhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOIF4EPQUCKDBEVTGRQDZ3CGTYQHPO7Z/https://nvd.nist.gov/vuln/detail/CVE-2024-28849https://www.cve.org/CVERecord?id=CVE-2024-28849 |
get-func-name |
CVE-2023-43646 |
HIGH |
2.0.0 |
2.0.1 |
https://access.redhat.com/security/cve/CVE-2023-43646https://github.com/advisories/GHSA-4q6p-r6v2-jvc5more links (toggle)https://github.com/chaijs/get-func-namehttps://github.com/chaijs/get-func-name/blob/78ad756441a83f3dc203e50f76c113ae3ac017dc/index.js#L15https://github.com/chaijs/get-func-name/commit/f934b228b5e2cb94d6c8576d3aac05493f667c69https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5https://nvd.nist.gov/vuln/detail/CVE-2023-43646https://www.cve.org/CVERecord?id=CVE-2023-43646 |
got |
CVE-2022-33987 |
MEDIUM |
8.3.2 |
12.1.0, 11.8.5 |
https://access.redhat.com/errata/RHSA-2022:6595https://access.redhat.com/security/cve/CVE-2022-33987more links (toggle)https://bugzilla.redhat.com/1907444https://bugzilla.redhat.com/1945459https://bugzilla.redhat.com/1964461https://bugzilla.redhat.com/2007557https://bugzilla.redhat.com/2098556https://bugzilla.redhat.com/2102001https://bugzilla.redhat.com/2105422https://bugzilla.redhat.com/2105426https://bugzilla.redhat.com/2105428https://bugzilla.redhat.com/2105430https://errata.almalinux.org/9/ALSA-2022-6595.htmlhttps://github.com/sindresorhus/gothttps://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dchttps://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0https://github.com/sindresorhus/got/pull/2047https://github.com/sindresorhus/got/releases/tag/v11.8.5https://github.com/sindresorhus/got/releases/tag/v12.1.0https://linux.oracle.com/cve/CVE-2022-33987.htmlhttps://linux.oracle.com/errata/ELSA-2022-6595.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2022-33987https://www.cve.org/CVERecord?id=CVE-2022-33987 |
hosted-git-info |
CVE-2021-23362 |
MEDIUM |
2.8.8 |
2.8.9, 3.0.8 |
https://access.redhat.com/security/cve/CVE-2021-23362https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfmore links (toggle)https://errata.almalinux.org/8/ALSA-2021-3074.htmlhttps://github.com/npm/hosted-git-infohttps://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3https://github.com/npm/hosted-git-info/commits/v2https://github.com/npm/hosted-git-info/pull/76https://linux.oracle.com/cve/CVE-2021-23362.htmlhttps://linux.oracle.com/errata/ELSA-2021-3074.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2021-23362https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355https://www.cve.org/CVERecord?id=CVE-2021-23362 |
http-cache-semantics |
CVE-2022-25881 |
HIGH |
3.8.1 |
4.1.1 |
https://access.redhat.com/errata/RHSA-2023:2655https://access.redhat.com/security/cve/CVE-2022-25881more links (toggle)https://bugzilla.redhat.com/2165824https://bugzilla.redhat.com/2168631https://bugzilla.redhat.com/2171935https://bugzilla.redhat.com/2172190https://bugzilla.redhat.com/2172204https://bugzilla.redhat.com/2172217https://bugzilla.redhat.com/show_bug.cgi?id=2165824https://bugzilla.redhat.com/show_bug.cgi?id=2168631https://bugzilla.redhat.com/show_bug.cgi?id=2171935https://bugzilla.redhat.com/show_bug.cgi?id=2172190https://bugzilla.redhat.com/show_bug.cgi?id=2172204https://bugzilla.redhat.com/show_bug.cgi?id=2172217https://bugzilla.redhat.com/show_bug.cgi?id=2178076https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25881https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23936https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24807https://errata.almalinux.org/9/ALSA-2023-2655.htmlhttps://errata.rockylinux.org/RLSA-2023:2655https://github.com/kornelski/http-cache-semanticshttps://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83https://github.com/kornelski/http-cache-semantics/commit/560b2d8ef452bbba20ffed69dc155d63ac757b74https://linux.oracle.com/cve/CVE-2022-25881.htmlhttps://linux.oracle.com/errata/ELSA-2023-2655.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2022-25881https://security.netapp.com/advisory/ntap-20230622-0008https://security.netapp.com/advisory/ntap-20230622-0008/https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783https://www.cve.org/CVERecord?id=CVE-2022-25881 |
http-proxy-middleware |
CVE-2024-21536 |
HIGH |
2.0.6 |
2.0.7, 3.0.3 |
https://access.redhat.com/security/cve/CVE-2024-21536https://gist.github.com/mhassan1/28be67266d82a53708ed59ce5dc3c94amore links (toggle)https://github.com/chimurai/http-proxy-middlewarehttps://github.com/chimurai/http-proxy-middleware/commit/0b4274e8cc9e9a2c5a06f35fbf456ccfcebc55a5https://github.com/chimurai/http-proxy-middleware/commit/788b21e4aff38332d6319557d4a5b1b13b1f9a22https://nvd.nist.gov/vuln/detail/CVE-2024-21536https://security.snyk.io/vuln/SNYK-JS-HTTPPROXYMIDDLEWARE-8229906https://www.cve.org/CVERecord?id=CVE-2024-21536 |
loader-utils |
CVE-2022-37601 |
CRITICAL |
1.4.0 |
2.0.3, 1.4.1 |
http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs2022.pdfhttps://access.redhat.com/security/cve/CVE-2022-37601more links (toggle)https://dl.acm.org/doi/abs/10.1145/3488932.3497769https://dl.acm.org/doi/pdf/10.1145/3488932.3497769https://github.com/webpack/loader-utilshttps://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L11https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L47https://github.com/webpack/loader-utils/commit/4504e34c4796a5836ef70458327351675aed48a5https://github.com/webpack/loader-utils/commit/a93cf6f4702012030f6b5ee8340d5c95ec1c7d4chttps://github.com/webpack/loader-utils/commit/f4e48a232fae900237c3e5ff7b57ce9e1c734de1https://github.com/webpack/loader-utils/issues/212https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884https://github.com/webpack/loader-utils/pull/217https://github.com/webpack/loader-utils/pull/220https://github.com/webpack/loader-utils/releases/tag/v1.4.1https://github.com/webpack/loader-utils/releases/tag/v2.0.3https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826https://lists.debian.org/debian-lts-announce/2022/12/msg00044.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2022-37601https://www.cve.org/CVERecord?id=CVE-2022-37601 |
loader-utils |
CVE-2022-37599 |
HIGH |
1.4.0 |
1.4.2, 2.0.4, 3.2.1 |
https://access.redhat.com/security/cve/CVE-2022-37599https://github.com/advisories/GHSA-hhq3-ff78-jv3gmore links (toggle)https://github.com/webpack/loader-utilshttps://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/interpolateName.js#L38https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/interpolateName.js#L83https://github.com/webpack/loader-utils/commit/17cbf8fa8989c1cb45bdd2997aa524729475f1fahttps://github.com/webpack/loader-utils/commit/ac09944dfacd7c4497ef692894b09e63e09a5eebhttps://github.com/webpack/loader-utils/commit/d2d752d59629daee38f34b24307221349c490eb1https://github.com/webpack/loader-utils/issues/211https://github.com/webpack/loader-utils/issues/216https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/https://nvd.nist.gov/vuln/detail/CVE-2022-37599https://www.cve.org/CVERecord?id=CVE-2022-37599 |
loader-utils |
CVE-2022-37603 |
HIGH |
1.4.0 |
1.4.2, 2.0.4, 3.2.1 |
https://access.redhat.com/security/cve/CVE-2022-37603https://github.com/webpack/loader-utilsmore links (toggle)https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/interpolateName.js#L107https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/interpolateName.js#L38https://github.com/webpack/loader-utils/commit/17cbf8fa8989c1cb45bdd2997aa524729475f1fahttps://github.com/webpack/loader-utils/commit/ac09944dfacd7c4497ef692894b09e63e09a5eebhttps://github.com/webpack/loader-utils/commit/d2d752d59629daee38f34b24307221349c490eb1https://github.com/webpack/loader-utils/issues/213https://github.com/webpack/loader-utils/issues/216https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU/https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SMhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSUhttps://nvd.nist.gov/vuln/detail/CVE-2022-37603https://www.cve.org/CVERecord?id=CVE-2022-37603 |
micromatch |
CVE-2024-4067 |
MEDIUM |
3.1.10 |
4.0.8 |
https://access.redhat.com/security/cve/CVE-2024-4067https://advisory.checkmarx.net/advisory/CVE-2024-4067more links (toggle)https://advisory.checkmarx.net/advisory/CVE-2024-4067/https://devhub.checkmarx.com/cve-details/CVE-2024-4067https://devhub.checkmarx.com/cve-details/CVE-2024-4067/https://github.com/micromatch/micromatchhttps://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448https://github.com/micromatch/micromatch/commit/03aa8052171e878897eee5d7bb2ae0ae83ec2adehttps://github.com/micromatch/micromatch/commit/500d5d6f42f0e8dfa1cb5464c6cb420b1b6aaaa0https://github.com/micromatch/micromatch/issues/243https://github.com/micromatch/micromatch/pull/247https://github.com/micromatch/micromatch/pull/266https://github.com/micromatch/micromatch/releases/tag/4.0.8https://nvd.nist.gov/vuln/detail/CVE-2024-4067https://www.cve.org/CVERecord?id=CVE-2024-4067 |
micromatch |
CVE-2024-4067 |
MEDIUM |
4.0.6 |
4.0.8 |
https://access.redhat.com/security/cve/CVE-2024-4067https://advisory.checkmarx.net/advisory/CVE-2024-4067more links (toggle)https://advisory.checkmarx.net/advisory/CVE-2024-4067/https://devhub.checkmarx.com/cve-details/CVE-2024-4067https://devhub.checkmarx.com/cve-details/CVE-2024-4067/https://github.com/micromatch/micromatchhttps://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448https://github.com/micromatch/micromatch/commit/03aa8052171e878897eee5d7bb2ae0ae83ec2adehttps://github.com/micromatch/micromatch/commit/500d5d6f42f0e8dfa1cb5464c6cb420b1b6aaaa0https://github.com/micromatch/micromatch/issues/243https://github.com/micromatch/micromatch/pull/247https://github.com/micromatch/micromatch/pull/266https://github.com/micromatch/micromatch/releases/tag/4.0.8https://nvd.nist.gov/vuln/detail/CVE-2024-4067https://www.cve.org/CVERecord?id=CVE-2024-4067 |
minimatch |
CVE-2022-3517 |
HIGH |
3.0.4 |
3.0.5 |
https://access.redhat.com/errata/RHSA-2023:0321https://access.redhat.com/security/cve/CVE-2022-3517more links (toggle)https://bugzilla.redhat.com/2066009https://bugzilla.redhat.com/2130518https://bugzilla.redhat.com/2134609https://bugzilla.redhat.com/2140911https://bugzilla.redhat.com/show_bug.cgi?id=2066009https://bugzilla.redhat.com/show_bug.cgi?id=2130518https://bugzilla.redhat.com/show_bug.cgi?id=2134609https://bugzilla.redhat.com/show_bug.cgi?id=2140911https://bugzilla.redhat.com/show_bug.cgi?id=2142808https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548https://errata.almalinux.org/9/ALSA-2023-0321.htmlhttps://errata.rockylinux.org/RLSA-2023:0321https://github.com/grafana/grafana-image-renderer/issues/329https://github.com/isaacs/minimatchhttps://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6https://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6 (v3.0.5)https://github.com/nodejs/node/issues/42510https://linux.oracle.com/cve/CVE-2022-3517.htmlhttps://linux.oracle.com/errata/ELSA-2023-1743.htmlhttps://lists.debian.org/debian-lts-announce/2023/01/msg00011.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLKhttps://nvd.nist.gov/vuln/detail/CVE-2022-3517https://ubuntu.com/security/notices/USN-6086-1https://www.cve.org/CVERecord?id=CVE-2022-3517 |
minimist |
CVE-2021-44906 |
CRITICAL |
0.0.8 |
1.2.6, 0.2.4 |
https://access.redhat.com/errata/RHSA-2023:0321https://access.redhat.com/security/cve/CVE-2021-44906more links (toggle)https://bugzilla.redhat.com/2066009https://bugzilla.redhat.com/2130518https://bugzilla.redhat.com/2134609https://bugzilla.redhat.com/2140911https://bugzilla.redhat.com/show_bug.cgi?id=2066009https://bugzilla.redhat.com/show_bug.cgi?id=2130518https://bugzilla.redhat.com/show_bug.cgi?id=2134609https://bugzilla.redhat.com/show_bug.cgi?id=2140911https://bugzilla.redhat.com/show_bug.cgi?id=2142808https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548https://errata.almalinux.org/9/ALSA-2023-0321.htmlhttps://errata.rockylinux.org/RLSA-2023:0321https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.ziphttps://github.com/advisories/GHSA-xvch-5gv4-984hhttps://github.com/minimistjs/minimist/commit/34e20b8461118608703d6485326abbb8e35e1703https://github.com/minimistjs/minimist/commit/bc8ecee43875261f4f17eb20b1243d3ed15e70ebhttps://github.com/minimistjs/minimist/commit/c2b981977fa834b223b408cfb860f933c9811e4dhttps://github.com/minimistjs/minimist/commit/ef9153fc52b6cea0744b2239921c5dcae4697f11https://github.com/minimistjs/minimist/commits/v0.2.4https://github.com/minimistjs/minimist/issues/11https://github.com/minimistjs/minimist/pull/24https://github.com/substack/minimisthttps://github.com/substack/minimist/blob/master/index.js#L69https://github.com/substack/minimist/issues/164https://linux.oracle.com/cve/CVE-2021-44906.htmlhttps://linux.oracle.com/errata/ELSA-2023-0321.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2021-44906https://security.netapp.com/advisory/ntap-20240621-0006https://security.netapp.com/advisory/ntap-20240621-0006/https://snyk.io/vuln/SNYK-JS-MINIMIST-559764https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068https://www.cve.org/CVERecord?id=CVE-2021-44906 |
minimist |
CVE-2020-7598 |
MEDIUM |
0.0.8 |
0.2.1, 1.2.3 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.htmlhttps://access.redhat.com/security/cve/CVE-2020-7598more links (toggle)https://errata.almalinux.org/8/ALSA-2020-2852.htmlhttps://github.com/minimistjs/minimist/commit/10bd4cdf49d9686d48214be9d579a9cdfda37c68https://github.com/minimistjs/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9abhttps://github.com/minimistjs/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95https://github.com/minimistjs/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94https://github.com/substack/minimisthttps://linux.oracle.com/cve/CVE-2020-7598.htmlhttps://linux.oracle.com/errata/ELSA-2020-2852.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2020-7598https://snyk.io/vuln/SNYK-JS-MINIMIST-559764https://www.cve.org/CVERecord?id=CVE-2020-7598https://www.npmjs.com/advisories/1179 |
nth-check |
CVE-2021-3803 |
HIGH |
1.0.2 |
2.0.1 |
https://access.redhat.com/security/cve/CVE-2021-3803https://github.com/advisories/GHSA-rp65-9cf3-cjxrmore links (toggle)https://github.com/fb55/nth-checkhttps://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726 (v2.0.1)https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0/https://lists.debian.org/debian-lts-announce/2023/05/msg00023.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2021-3803https://ubuntu.com/security/notices/USN-6114-1https://www.cve.org/CVERecord?id=CVE-2021-3803 |
path-to-regexp |
CVE-2024-45296 |
HIGH |
0.1.7 |
1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 |
https://access.redhat.com/security/cve/CVE-2024-45296https://github.com/pillarjs/path-to-regexpmore links (toggle)https://github.com/pillarjs/path-to-regexp/commit/29b96b4a1de52824e1ca0f49a701183cc4ed476fhttps://github.com/pillarjs/path-to-regexp/commit/60f2121e9b66b7b622cc01080df0aabda9eedee6https://github.com/pillarjs/path-to-regexp/commit/925ac8e3c5780b02f58cbd4e52f95da8ad2ac485https://github.com/pillarjs/path-to-regexp/commit/d31670ae8f6e69cbfd56e835742195b7d10942efhttps://github.com/pillarjs/path-to-regexp/commit/f1253b47b347dcb909e3e80b0eb2649109e59894https://github.com/pillarjs/path-to-regexp/releases/tag/v6.3.0https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598jhttps://nvd.nist.gov/vuln/detail/CVE-2024-45296https://www.cve.org/CVERecord?id=CVE-2024-45296 |
phin |
GHSA-x565-32qp-m3vf |
MEDIUM |
2.9.3 |
3.7.1 |
https://github.com/ethanent/phinhttps://github.com/ethanent/phin/commit/c071f95336a987dad9332fd388adeb249925cc57more links (toggle)https://github.com/ethanent/phin/security/advisories/GHSA-x565-32qp-m3vf |
semver |
CVE-2022-25883 |
HIGH |
7.3.2 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363https://access.redhat.com/security/cve/CVE-2022-25883more links (toggle)https://bugzilla.redhat.com/2216475https://bugzilla.redhat.com/2230948https://bugzilla.redhat.com/2230955https://bugzilla.redhat.com/2230956https://errata.almalinux.org/9/ALSA-2023-5363.htmlhttps://github.com/advisories/GHSA-c2qf-rxjj-qqgwhttps://github.com/npm/node-semverhttps://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104https://github.com/npm/node-semver/blob/main/internal/re.js#L138https://github.com/npm/node-semver/blob/main/internal/re.js#L160https://github.com/npm/node-semver/blob/main/internal/re.js%23L138https://github.com/npm/node-semver/blob/main/internal/re.js%23L160https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920chttps://github.com/npm/node-semver/pull/564https://github.com/npm/node-semver/pull/585https://github.com/npm/node-semver/pull/593https://linux.oracle.com/cve/CVE-2022-25883.htmlhttps://linux.oracle.com/errata/ELSA-2023-5363.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2022-25883https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795https://www.cve.org/CVERecord?id=CVE-2022-25883 |
semver |
CVE-2022-25883 |
HIGH |
7.3.2 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363https://access.redhat.com/security/cve/CVE-2022-25883more links (toggle)https://bugzilla.redhat.com/2216475https://bugzilla.redhat.com/2230948https://bugzilla.redhat.com/2230955https://bugzilla.redhat.com/2230956https://errata.almalinux.org/9/ALSA-2023-5363.htmlhttps://github.com/advisories/GHSA-c2qf-rxjj-qqgwhttps://github.com/npm/node-semverhttps://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104https://github.com/npm/node-semver/blob/main/internal/re.js#L138https://github.com/npm/node-semver/blob/main/internal/re.js#L160https://github.com/npm/node-semver/blob/main/internal/re.js%23L138https://github.com/npm/node-semver/blob/main/internal/re.js%23L160https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920chttps://github.com/npm/node-semver/pull/564https://github.com/npm/node-semver/pull/585https://github.com/npm/node-semver/pull/593https://linux.oracle.com/cve/CVE-2022-25883.htmlhttps://linux.oracle.com/errata/ELSA-2023-5363.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2022-25883https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795https://www.cve.org/CVERecord?id=CVE-2022-25883 |
semver |
CVE-2022-25883 |
HIGH |
7.3.2 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363https://access.redhat.com/security/cve/CVE-2022-25883more links (toggle)https://bugzilla.redhat.com/2216475https://bugzilla.redhat.com/2230948https://bugzilla.redhat.com/2230955https://bugzilla.redhat.com/2230956https://errata.almalinux.org/9/ALSA-2023-5363.htmlhttps://github.com/advisories/GHSA-c2qf-rxjj-qqgwhttps://github.com/npm/node-semverhttps://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104https://github.com/npm/node-semver/blob/main/internal/re.js#L138https://github.com/npm/node-semver/blob/main/internal/re.js#L160https://github.com/npm/node-semver/blob/main/internal/re.js%23L138https://github.com/npm/node-semver/blob/main/internal/re.js%23L160https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920chttps://github.com/npm/node-semver/pull/564https://github.com/npm/node-semver/pull/585https://github.com/npm/node-semver/pull/593https://linux.oracle.com/cve/CVE-2022-25883.htmlhttps://linux.oracle.com/errata/ELSA-2023-5363.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2022-25883https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795https://www.cve.org/CVERecord?id=CVE-2022-25883 |
semver |
CVE-2022-25883 |
HIGH |
7.3.2 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363https://access.redhat.com/security/cve/CVE-2022-25883more links (toggle)https://bugzilla.redhat.com/2216475https://bugzilla.redhat.com/2230948https://bugzilla.redhat.com/2230955https://bugzilla.redhat.com/2230956https://errata.almalinux.org/9/ALSA-2023-5363.htmlhttps://github.com/advisories/GHSA-c2qf-rxjj-qqgwhttps://github.com/npm/node-semverhttps://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104https://github.com/npm/node-semver/blob/main/internal/re.js#L138https://github.com/npm/node-semver/blob/main/internal/re.js#L160https://github.com/npm/node-semver/blob/main/internal/re.js%23L138https://github.com/npm/node-semver/blob/main/internal/re.js%23L160https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920chttps://github.com/npm/node-semver/pull/564https://github.com/npm/node-semver/pull/585https://github.com/npm/node-semver/pull/593https://linux.oracle.com/cve/CVE-2022-25883.htmlhttps://linux.oracle.com/errata/ELSA-2023-5363.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2022-25883https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795https://www.cve.org/CVERecord?id=CVE-2022-25883 |
semver |
CVE-2022-25883 |
HIGH |
7.3.5 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363https://access.redhat.com/security/cve/CVE-2022-25883more links (toggle)https://bugzilla.redhat.com/2216475https://bugzilla.redhat.com/2230948https://bugzilla.redhat.com/2230955https://bugzilla.redhat.com/2230956https://errata.almalinux.org/9/ALSA-2023-5363.htmlhttps://github.com/advisories/GHSA-c2qf-rxjj-qqgwhttps://github.com/npm/node-semverhttps://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104https://github.com/npm/node-semver/blob/main/internal/re.js#L138https://github.com/npm/node-semver/blob/main/internal/re.js#L160https://github.com/npm/node-semver/blob/main/internal/re.js%23L138https://github.com/npm/node-semver/blob/main/internal/re.js%23L160https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920chttps://github.com/npm/node-semver/pull/564https://github.com/npm/node-semver/pull/585https://github.com/npm/node-semver/pull/593https://linux.oracle.com/cve/CVE-2022-25883.htmlhttps://linux.oracle.com/errata/ELSA-2023-5363.htmlhttps://nvd.nist.gov/vuln/detail/CVE-2022-25883https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795https://www.cve.org/CVERecord?id=CVE-2022-25883 |
25 other vulnerabilities found... |
No Misconfigurations found |