nock-11.7.0.tgz: 4 vulnerabilities (highest severity is: 9.8) · Issue #3 · amaybaum-dev/github-actions2 · GitHub
More Web Proxy on the site http://driver.im/
You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
Mend Note: After conducting further research, Mend has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.
dev-mend-for-github-combot
changed the title
nock-11.7.0.tgz: 1 vulnerabilities (highest severity is: 7.2) reachable
nock-11.7.0.tgz: 1 vulnerabilities (highest severity is: 7.2)
May 30, 2024
dev-mend-for-github-combot
changed the title
nock-11.7.0.tgz: 1 vulnerabilities (highest severity is: 7.2)
nock-11.7.0.tgz: 1 vulnerabilities (highest severity is: 6.0)
Jul 4, 2024
dev-mend-for-github-combot
changed the title
nock-11.7.0.tgz: 1 vulnerabilities (highest severity is: 6.0)
nock-11.7.0.tgz: 6 vulnerabilities (highest severity is: 9.8)
Jan 12, 2025
dev-mend-for-github-combot
changed the title
nock-11.7.0.tgz: 6 vulnerabilities (highest severity is: 9.8)
nock-11.7.0.tgz: 5 vulnerabilities (highest severity is: 9.8)
Jan 12, 2025
dev-mend-for-github-combot
changed the title
nock-11.7.0.tgz: 5 vulnerabilities (highest severity is: 9.8)
nock-11.7.0.tgz: 4 vulnerabilities (highest severity is: 9.8)
Jan 16, 2025
Uh oh!
There was an error while loading. Please reload this page.
Path to dependency file: /codesnippets-auto-pr/package.json
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - minimist-0.0.8.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: 2022-03-17
URL: CVE-2021-44906
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2022-03-17
Fix Resolution (minimist): 0.2.2
Direct dependency fix Resolution (nock): 11.7.1
Vulnerable Library - pathval-1.1.0.tgz
Object value retrieval given a string path
Library home page: https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
pathval before version 1.1.1 is vulnerable to prototype pollution.
Publish Date: 2020-10-25
URL: CVE-2020-7751
CVSS 3 Score Details (6.0)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-7751
Release Date: 2020-10-26
Fix Resolution (pathval): 1.1.1
Direct dependency fix Resolution (nock): 11.7.1
Vulnerable Library - minimist-0.0.8.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "proto" payload.
Publish Date: 2020-03-11
URL: CVE-2020-7598
CVSS 3 Score Details (5.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2020-03-11
Fix Resolution (minimist): 0.2.1
Direct dependency fix Resolution (nock): 11.7.1
Vulnerable Libraries - lodash-4.17.19.tgz, lodash-4.17.15.tgz
lodash-4.17.19.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.19.tgz
Dependency Hierarchy:
lodash-4.17.15.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
Mend Note: After conducting further research, Mend has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.
Publish Date: 2021-02-15
URL: CVE-2020-28500
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500
Release Date: 2021-02-15
Fix Resolution (lodash): 4.17.21
Direct dependency fix Resolution (nock): 11.7.1
Fix Resolution (lodash): 4.17.21
Direct dependency fix Resolution (nock): 11.7.1
The text was updated successfully, but these errors were encountered: