documentation
documentation copied to clipboard
core-2.0.1.tgz: 3 vulnerabilities (highest severity is: 7.5)
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in | Remediation Available | |
|---|---|---|---|---|---|---|
| CVE-2022-25858 | 7.5 | terser-5.13.1.tgz | Transitive | N/A | ❌ | |
| CVE-2020-7753 | 7.5 | trim-0.0.1.tgz | Transitive | N/A | ❌ | |
| CVE-2022-33987 | 5.3 | got-9.6.0.tgz | Transitive | N/A | ❌ |
Details
CVE-2022-25858
Vulnerable Library - terser-5.13.1.tgz
JavaScript parser, mangler/compressor and beautifier toolkit for ES6+
Library home page: https://registry.npmjs.org/terser/-/terser-5.13.1.tgz
Dependency Hierarchy:
- core-2.0.1.tgz (Root Library)
- html-minifier-terser-6.1.0.tgz
- :x: terser-5.13.1.tgz (Vulnerable Library)
- html-minifier-terser-6.1.0.tgz
Found in HEAD commit: eb5c6b3850490c8aa859d6f9414b6feb25c3be1c
Found in base branch: master
Vulnerability Details
The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions.
Publish Date: 2022-07-15
URL: CVE-2022-25858
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25858
Release Date: 2022-07-15
Fix Resolution: terser - 4.8.1,5.14.2
CVE-2020-7753
Vulnerable Library - trim-0.0.1.tgz
Trim string whitespace
Library home page: https://registry.npmjs.org/trim/-/trim-0.0.1.tgz
Dependency Hierarchy:
- core-2.0.1.tgz (Root Library)
- mdx-loader-2.0.1.tgz
- mdx-1.6.22.tgz
- remark-parse-8.0.3.tgz
- :x: trim-0.0.1.tgz (Vulnerable Library)
- remark-parse-8.0.3.tgz
- mdx-1.6.22.tgz
- mdx-loader-2.0.1.tgz
Found in HEAD commit: eb5c6b3850490c8aa859d6f9414b6feb25c3be1c
Found in base branch: master
Vulnerability Details
All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
Publish Date: 2020-10-27
URL: CVE-2020-7753
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2020-10-27
Fix Resolution: trim - 0.0.3
CVE-2022-33987
Vulnerable Library - got-9.6.0.tgz
Simplified HTTP requests
Library home page: https://registry.npmjs.org/got/-/got-9.6.0.tgz
Dependency Hierarchy:
- core-2.0.1.tgz (Root Library)
- update-notifier-5.1.0.tgz
- latest-version-5.1.0.tgz
- package-json-6.5.0.tgz
- :x: got-9.6.0.tgz (Vulnerable Library)
- package-json-6.5.0.tgz
- latest-version-5.1.0.tgz
- update-notifier-5.1.0.tgz
Found in HEAD commit: eb5c6b3850490c8aa859d6f9414b6feb25c3be1c
Found in base branch: master
Vulnerability Details
The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.
Publish Date: 2022-06-18
URL: CVE-2022-33987
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987
Release Date: 2022-06-18
Fix Resolution: got - 11.8.5,12.1.0