Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade web-ext from 4.3.0 to 8.4.0 #128

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

karencapiiro
Copy link

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the yarn dependencies of this project.

Snyk changed the following file(s):

  • packages/react-devtools-extensions/package.json

Note for zero-installs users

If you are using the Yarn feature zero-installs that was introduced in Yarn V2, note that this PR does not update the .yarn/cache/ directory meaning this code cannot be pulled and immediately developed on as one would expect for a zero-install project - you will need to run yarn to update the contents of the ./yarn/cache directory.
If you are not using zero-install you can ignore this as your flow should likely be unchanged.

⚠️ Warning
Failed to update the yarn.lock, please update manually before merging.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-CROSSSPAWN-8303230
  169  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)

Copy link

New, updated, and removed dependencies detected. Learn more about Socket for GitHub ↗︎

Package New capabilities Transitives Size Publisher
npm/[email protected] None 0 9.96 kB sokra
npm/[email protected] None 0 356 kB zpao
npm/[email protected] filesystem 0 18.3 kB royriojas
npm/[email protected] None 0 19.2 kB d3viant0ne
npm/[email protected] None 0 9.96 kB avoidwork
npm/[email protected] None 0 5.48 kB sindresorhus
npm/[email protected] filesystem 0 133 kB ryanzim
npm/[email protected] environment, eval, filesystem, network, shell 0 6.67 MB es128
npm/[email protected] None 0 43.5 kB mikolalysenko
npm/[email protected] filesystem 0 55.5 kB isaacs
npm/[email protected] None 0 6.52 kB jonschlinkert
npm/[email protected] None 0 3.75 kB sindresorhus
npm/[email protected] None 0 3.1 kB sindresorhus
npm/[email protected] None 0 2.76 kB tarruda
npm/[email protected] None 0 2.68 kB sindresorhus
npm/[email protected] None 0 63.5 kB mdevils
npm/[email protected] None 0 88.3 kB alexlamsl
npm/[email protected] filesystem, unsafe 0 56.9 kB jantimon
npm/[email protected] network 0 45.8 kB chimurai
npm/[email protected] None 0 335 kB ashtuchkin
npm/[email protected] None 0 3.03 kB geelen
npm/[email protected] None 0 8.4 kB trysound
npm/[email protected] None 0 21.6 kB kael
npm/[email protected] None 0 3.64 kB sindresorhus
npm/[email protected] None 0 11.9 kB jensyt
npm/[email protected] None 0 70.4 kB sboudrias
npm/[email protected] None 0 3.96 kB sindresorhus
npm/[email protected] None 0 11 kB phated
npm/[email protected] None 0 35.7 kB indutny
npm/[email protected] None 0 4.58 kB shinnn
npm/[email protected] None 0 1.14 kB sindresorhus
npm/[email protected] None 0 3.23 kB sindresorhus
npm/[email protected] None 0 5.98 kB financial-times
npm/[email protected] None +1 74.9 kB bcoe
npm/[email protected] environment, filesystem 0 173 kB cpojer
npm/[email protected] None 0 2.24 kB cpojer
npm/[email protected] None 0 32.9 kB dankogai
npm/[email protected] None 0 13.5 kB lydell
npm/[email protected] eval 0 278 kB vitaly
npm/[email protected] None 0 18.2 kB mathias
npm/[email protected] None 0 6.78 kB d3viant0ne
npm/[email protected] None 0 16.8 kB esp
npm/[email protected] filesystem 0 17.4 kB ryanzim
npm/[email protected] 🔁 npm/[email protected] None 0 237 kB evcohen
npm/[email protected] None 0 2.16 kB commandoline
npm/[email protected] None 0 34 kB gkz
npm/[email protected] filesystem 0 6.62 kB viankakrisna
npm/[email protected] filesystem 0 15.4 kB sokra
npm/[email protected] None 0 21.9 kB jdalton
npm/[email protected] None 0 65.5 kB jdalton
npm/[email protected] None 0 120 kB pimterry
npm/[email protected] filesystem 0 6.24 kB sindresorhus
npm/[email protected] environment, filesystem 0 41 kB broofa
npm/[email protected] None 0 381 kB kkoopa
npm/[email protected] None 0 5.65 kB megawac
npm/[email protected] network 0 122 kB bitinn
npm/[email protected] network, unsafe Transitive: environment +2 120 kB jhnns
npm/[email protected] environment, filesystem 0 123 kB springmeyer
npm/[email protected] None 0 7.77 kB james.talmage
npm/[email protected] None 0 5.31 kB yisi
npm/[email protected] None 0 316 kB addaleax
npm/[email protected] None 0 49.5 kB gkz
npm/[email protected] None 0 3.32 kB domenic
npm/[email protected] None 0 11.3 kB meryn
npm/[email protected] 🔁 npm/[email protected] None 0 3.5 kB sindresorhus
npm/[email protected] None 0 17 kB blakeembrey
npm/[email protected] filesystem, network 0 17.3 kB eriktrom
npm/[email protected] None 0 8.86 kB moox
npm/[email protected] None 0 8.77 kB beneb
npm/[email protected] None 0 16.8 kB beneb
npm/[email protected] None 0 12.1 kB beneb
npm/[email protected] None 0 10.4 kB beneb
npm/[email protected] None 0 4.83 kB beneb
npm/[email protected] None 0 9.71 kB justineo
npm/[email protected] None 0 13 kB beneb
npm/[email protected] None 0 9.83 kB beneb
npm/[email protected] Transitive: filesystem +1 646 kB luisrudge
npm/[email protected] environment 0 14.5 kB michael-ciniawsky
npm/[email protected] None 0 27.1 kB michael-ciniawsky
npm/[email protected] None 0 9.11 kB beneb
npm/[email protected] None 0 38.6 kB beneb
npm/[email protected] None 0 23 kB beneb
npm/[email protected] None 0 10.5 kB beneb
npm/[email protected] None 0 10.8 kB beneb
npm/[email protected] None 0 6.83 kB beneb
npm/[email protected] None +2 110 kB beneb
npm/[email protected] None 0 10.6 kB sullenor
npm/[email protected] None 0 18.4 kB geelen
npm/[email protected] None 0 10.7 kB geelen
npm/[email protected] None 0 16.9 kB geelen
npm/[email protected] None 0 3.99 kB beneb
npm/[email protected] None 0 9.5 kB beneb
npm/[email protected] None 0 17.6 kB beneb
npm/[email protected] None 0 22.8 kB beneb
npm/[email protected] None 0 13.5 kB beneb
npm/[email protected] None 0 8.77 kB beneb
npm/[email protected] None 0 13.2 kB beneb
npm/[email protected] None 0 4.45 kB beneb
npm/[email protected] None 0 7.94 kB beneb
npm/[email protected] None 0 56.3 kB ariaminaei
npm/[email protected] None 0 13.4 kB benjamn
npm/[email protected] None 0 15.4 kB thebigredgeek
npm/[email protected] eval 0 90.7 kB forbeslindesay
npm/[email protected] environment 0 79.3 kB sophiebits
npm/[email protected] None 0 7.04 kB chrisdickinson
npm/[email protected] None 0 76.6 kB gaearon
npm/[email protected] environment 0 1.86 MB clemmy
npm/[email protected] network 0 434 kB gaearon
npm/[email protected] None 0 201 kB gaearon
npm/[email protected] environment 0 115 kB clemmy
npm/[email protected] None +1 9.12 kB sindresorhus
npm/[email protected] filesystem 0 17.1 kB jergason
npm/[email protected] eval 0 26.5 kB benjamn
npm/[email protected] None 0 120 kB benjamn
npm/[email protected] 🔁 npm/[email protected] None 0 17.9 kB mathias
npm/[email protected] None 0 3.53 kB sindresorhus
npm/[email protected] filesystem 0 10.9 kB d3viant0ne
npm/[email protected] None 0 20.7 kB jfromaniello
npm/[email protected] filesystem, network 0 93.4 kB dougwilson
npm/[email protected] None 0 21.9 kB substack
npm/[email protected] None 0 1.7 kB sindresorhus
npm/[email protected] environment, network 0 810 kB brycekahle
npm/[email protected] filesystem, network 0 108 kB brycekahle
npm/[email protected] None 0 26.2 kB sokra
npm/[email protected] filesystem, unsafe 0 78.3 kB linusu
npm/[email protected] network 0 57 kB daviddias
npm/[email protected] None 0 37.7 kB d3viant0ne
npm/[email protected] None 0 3.75 kB sindresorhus
npm/[email protected] None 0 183 kB goldhand
npm/[email protected] environment, filesystem 0 74.3 kB jeffposnick
npm/[email protected] None +1 173 kB gajus
npm/[email protected] None 0 17.1 kB sokra
npm/[email protected] None 0 13.1 kB bcoe
npm/[email protected] None 0 2.79 kB sindresorhus
npm/[email protected] None 0 15.3 kB marcelklehr
npm/[email protected] None 0 2.61 kB sindresorhus
npm/[email protected] None 0 198 kB faisalman
npm/[email protected] eval, filesystem +1 682 kB alexlamsl
npm/[email protected] environment, filesystem, shell 0 24.7 kB thelarkinn
npm/[email protected] None 0 11.3 kB d3viant0ne
npm/[email protected] Transitive: environment, filesystem +2 191 kB sokra
npm/[email protected] None 0 22.1 kB shellscape
npm/[email protected] filesystem, network 0 714 kB shellscape
npm/[email protected] filesystem 0 10.4 kB mastilver
npm/[email protected] None 0 26.2 kB thelarkinn
npm/[email protected] environment, filesystem, unsafe +7 1.59 MB sokra
npm/[email protected] None 0 22.8 kB mislav
npm/[email protected] environment, filesystem 0 195 kB bcoe

🚮 Removed packages: npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected], npm/[email protected]

View full report↗︎

Copy link

🚨 Potential security issues detected. Learn more about Socket for GitHub ↗︎

To accept the risk, merge this PR and you will not be notified again.

Alert Package NoteSourceCI
Critical CVE npm/[email protected] ⚠︎

View full report↗︎

Next steps

What is a critical CVE?

Contains a Critical Common Vulnerability and Exposure (CVE).

Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Take a deeper look at the dependency

Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support [AT] socket [DOT] dev.

Remove the package

If you happen to install a dependency that Socket reports as Known Malware you should immediately remove it and select a different dependency. For other alert types, you may may wish to investigate alternative packages or consider if there are other ways to mitigate the specific risk posed by the dependency.

Mark a package as acceptable risk

To ignore an alert, reply with a comment starting with @SocketSecurity ignore followed by a space separated list of ecosystem/package-name@version specifiers. e.g. @SocketSecurity ignore npm/[email protected] or ignore all packages with @SocketSecurity ignore-all

@rafikmojr
Copy link
Collaborator

Logo
Checkmarx One – Scan Summary & Details9541a0a3-f1d3-4f29-a6d0-ae95e7aa19a2

New Issues (158)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2024-12692 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Type Confusion in V8 in Google Chrome versions prior to 131.0.6778.204 allowed a remote attacker to potentially exploit heap corruption via a craft...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-12694 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Use after free in Compositing in Google Chrome versions prior to 131.0.6778.204 allowed a remote attacker to potentially exploit heap corruption vi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-12695 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Out of bounds write in V8 in Google Chrome versions prior to 131.0.6778.204 allowed a remote attacker to execute arbitrary code inside a sandbox vi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-40643 Npm-htmlparser2-3.10.1
detailsRecommended version: 5.0.0
Description: Joplin is a free, open-source note-taking and to-do application. Joplin fails to consider that "<" followed by a non-letter character will not be c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-40643 Npm-htmlparser2-3.3.0
detailsRecommended version: 5.0.0
Description: Joplin is a free, open-source note-taking and to-do application. Joplin fails to consider that "<" followed by a non-letter character will not be c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-42461 Npm-elliptic-6.5.4
detailsRecommended version: 6.6.0
Description: In the elliptic package, "ECDSA" signature malleability occurs because "BER-encoded" signatures are allowed which leads to Improper Verification of...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-42461 Npm-elliptic-6.4.0
detailsRecommended version: 6.6.0
Description: In the elliptic package, "ECDSA" signature malleability occurs because "BER-encoded" signatures are allowed which leads to Improper Verification of...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-42461 Npm-elliptic-6.5.3
detailsRecommended version: 6.6.0
Description: In the elliptic package, "ECDSA" signature malleability occurs because "BER-encoded" signatures are allowed which leads to Improper Verification of...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-48949 Npm-elliptic-6.5.3
detailsRecommended version: 6.6.0
Description: The verify function in "lib/elliptic/eddsa/index.js" in the Elliptic versions 4.0.0 through 6.5.5 for Node.js omits "sig.S().gte(sig.eddsa.curve.n)...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-48949 Npm-elliptic-6.5.4
detailsRecommended version: 6.6.0
Description: The verify function in "lib/elliptic/eddsa/index.js" in the Elliptic versions 4.0.0 through 6.5.5 for Node.js omits "sig.S().gte(sig.eddsa.curve.n)...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-48949 Npm-elliptic-6.4.0
detailsRecommended version: 6.6.0
Description: The verify function in "lib/elliptic/eddsa/index.js" in the Elliptic versions 4.0.0 through 6.5.5 for Node.js omits "sig.S().gte(sig.eddsa.curve.n)...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-9370 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Inappropriate implementation in V8 in Google Chrome versions prior to 129.0.6668.89.
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-9963 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Insufficient data validation in Downloads in Google Chrome versions prior to 130.0.6723.58 allowed a remote attacker who convinced a user to engage...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2025-0444 Npm-electron-32.3.0
detailsDescription: Use after free in Skia in Google Chrome prior to 133.0.6943.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2025-0445 Npm-electron-32.3.0
detailsDescription: Use after free in V8 in Google Chrome prior to 133.0.6943.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML pa...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2025-0611 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Object corruption in V8 in Google Chrome prior to 132.0.6834.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTM...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
CRITICAL Cx1113a032-799e Npm-webmarker-js-0.0.3
detailsDescription: This package is loading pollyfill script from cdn.polyfill.io, which has been compromised to deliver malicious code. Click here to learn more about...
Vulnerable Package
HIGH CVE-2022-21213 Npm-mout-1.1.0
detailsRecommended version: 1.2.4
Description: This affects versions prior to version 1.2.4 of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while t...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-25858 Npm-terser-4.8.0
detailsRecommended version: 4.8.1
Description: The package terser before 4.8.1, and 5.0.x before 5.14.2 is vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of reg...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.5.6
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.2.3
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.5.3
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.5.21
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10229 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Inappropriate implementation in Extensions in Google Chrome versions prior to 130.0.6723.69 allowed a remote attacker to bypass site isolation via ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10230 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Type Confusion in V8 in Google Chrome versions prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafte...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10231 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Type Confusion in V8 in Google Chrome versions prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafte...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10487 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Out-of-bounds write in Dawn in Google Chrome versions prior to 130.0.6723.92 allowed a remote attacker to perform out of bounds memory access via a...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10488 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Use after free in WebRTC in Google Chrome versions prior to 130.0.6723.92 allowed a remote attacker to potentially exploit heap corruption via a cr...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-10826 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Use after free in Family Experiences in Google Chrome on Android versions prior to 130.0.6723.116 allowed a remote attacker to potentially exploit ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-11112 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Use after free in Media in Google Chrome on Windows prior to 131.0.6778.69 allowed a remote attacker to potentially exploit heap corruption via a c...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
HIGH CVE-2024-11114 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Inappropriate implementation in Views in Google Chrome on Windows versions prior to 131.0.6778.69 allowed a remote attacker who had compromised the...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
HIGH CVE-2024-11115 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 131.0.6778.69 allowed a remote attacker to perform privilege escalat...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-11395 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Type Confusion in V8 in Google Chrome versions prior to 131.0.6778.85 allowed a remote attacker to potentially exploit heap corruption via a crafte...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-12382 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Use after free in Translate in Google Chrome versions prior to 131.0.6778.139 allowed a remote attacker to potentially exploit heap corruption via ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-12693 Npm-electron-32.3.0
detailsRecommended version: 34.0.2
Description: Out of bounds memory access in V8 in Google Chrome versions prior to 131.0.6778.204 allowed a remote attacker to execute arbitrary code inside a sa...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21536 Npm-http-proxy-middleware-0.17.3
detailsRecommended version: 2.0.7
Description: The http-proxy-middleware versions through 2.0.7-beta.0 and 3.0.0-beta.0 through 3.0.2 are vulnerable to Denial of Service (DoS) due to an "Unhandl...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21536 Npm-http-proxy-middleware-2.0.6
detailsRecommended version: 2.0.7
Description: The http-proxy-middleware versions through 2.0.7-beta.0 and 3.0.0-beta.0 through 3.0.2 are vulnerable to Denial of Service (DoS) due to an "Unhandl...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21536 Npm-http-proxy-middleware-0.17.4
detailsRecommended version: 2.0.7
Description: The http-proxy-middleware versions through 2.0.7-beta.0 and 3.0.0-beta.0 through 3.0.2 are vulnerable to Denial of Service (DoS) due to an "Unhandl...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-5.1.0
detailsRecommended version: 6.0.6
Description: Versions of the package cross-spawn prior to 6.0.6 and 7.x prior to 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS), due to im...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-4.0.2
detailsRecommended version: 6.0.6
Description: Versions of the package cross-spawn prior to 6.0.6 and 7.x prior to 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS), due to im...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-7.0.3
detailsRecommended version: 7.0.5
Description: Versions of the package cross-spawn prior to 6.0.6 and 7.x prior to 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS), due to im...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-7.0.1
detailsRecommended version: 7.0.5
Description: Versions of the package cross-spawn prior to 6.0.6 and 7.x prior to 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS), due to im...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-6.0.5
detailsRecommended version: 6.0.6
Description: Versions of the package cross-spawn prior to 6.0.6 and 7.x prior to 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS), due to im...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package

More results are available on the CxOne platform

Fixed Issues (303)
Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.14
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.23
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.20
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.28
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.12
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.22
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.17
HIGH CVE-2023-1534 Npm-electron-23.1.2
HIGH CVE-2023-2033 Npm-electron-23.1.2
HIGH CVE-2023-2136 Npm-electron-23.1.2
HIGH CVE-2023-2312 Npm-electron-23.1.2
HIGH CVE-2023-2313 Npm-electron-23.1.2
HIGH CVE-2023-2457 Npm-electron-23.1.2
HIGH CVE-2023-2458 Npm-electron-23.1.2
HIGH CVE-2023-2460 Npm-electron-23.1.2
HIGH CVE-2023-2461 Npm-electron-23.1.2
HIGH CVE-2023-2721 Npm-electron-23.1.2
HIGH CVE-2023-2722 Npm-electron-23.1.2
HIGH CVE-2023-2723 Npm-electron-23.1.2
HIGH CVE-2023-2724 Npm-electron-23.1.2
HIGH CVE-2023-2725 Npm-electron-23.1.2
HIGH CVE-2023-2726 Npm-electron-23.1.2
HIGH CVE-2023-29198 Npm-electron-23.1.2
HIGH CVE-2023-2929 Npm-electron-23.1.2
HIGH CVE-2023-2930 Npm-electron-23.1.2
HIGH CVE-2023-2931 Npm-electron-23.1.2
HIGH CVE-2023-2932 Npm-electron-23.1.2
HIGH CVE-2023-2933 Npm-electron-23.1.2
HIGH CVE-2023-2934 Npm-electron-23.1.2
HIGH CVE-2023-2935 Npm-electron-23.1.2
HIGH CVE-2023-29350 Npm-electron-23.1.2
HIGH CVE-2023-2936 Npm-electron-23.1.2
HIGH CVE-2023-2939 Npm-electron-23.1.2
HIGH CVE-2023-3079 Npm-electron-23.1.2
HIGH CVE-2023-3214 Npm-electron-23.1.2
HIGH CVE-2023-3215 Npm-electron-23.1.2
HIGH CVE-2023-3216 Npm-electron-23.1.2
HIGH CVE-2023-3217 Npm-electron-23.1.2
HIGH CVE-2023-33143 Npm-electron-23.1.2
HIGH CVE-2023-3420 Npm-electron-23.1.2
HIGH CVE-2023-3421 Npm-electron-23.1.2
HIGH CVE-2023-3422 Npm-electron-23.1.2
HIGH CVE-2023-3598 Npm-electron-23.1.2
HIGH CVE-2023-36014 Npm-electron-23.1.2
HIGH CVE-2023-36024 Npm-electron-23.1.2
HIGH CVE-2023-36034 Npm-electron-23.1.2
HIGH CVE-2023-36562 Npm-electron-23.1.2
HIGH CVE-2023-36735 Npm-electron-23.1.2
HIGH CVE-2023-36741 Npm-electron-23.1.2
HIGH CVE-2023-36787 Npm-electron-23.1.2
HIGH CVE-2023-3727 Npm-electron-23.1.2
HIGH CVE-2023-3728 Npm-electron-23.1.2
HIGH CVE-2023-3729 Npm-electron-23.1.2
HIGH CVE-2023-3730 Npm-electron-23.1.2
HIGH CVE-2023-3731 Npm-electron-23.1.2
HIGH CVE-2023-3732 Npm-electron-23.1.2
HIGH CVE-2023-4068 Npm-electron-23.1.2
HIGH CVE-2023-4069 Npm-electron-23.1.2
HIGH CVE-2023-4070 Npm-electron-23.1.2
HIGH CVE-2023-4071 Npm-electron-23.1.2
HIGH CVE-2023-4072 Npm-electron-23.1.2
HIGH CVE-2023-4073 Npm-electron-23.1.2
HIGH CVE-2023-4074 Npm-electron-23.1.2
HIGH CVE-2023-4075 Npm-electron-23.1.2
HIGH CVE-2023-4076 Npm-electron-23.1.2
HIGH CVE-2023-4077 Npm-electron-23.1.2
HIGH CVE-2023-4078 Npm-electron-23.1.2
HIGH CVE-2023-4349 Npm-electron-23.1.2
HIGH CVE-2023-4351 Npm-electron-23.1.2
HIGH CVE-2023-4352 Npm-electron-23.1.2
HIGH CVE-2023-4353 Npm-electron-23.1.2
HIGH CVE-2023-4354 Npm-electron-23.1.2
HIGH CVE-2023-4355 Npm-electron-23.1.2
HIGH CVE-2023-4356 Npm-electron-23.1.2
HIGH CVE-2023-4357 Npm-electron-23.1.2
HIGH CVE-2023-4358 Npm-electron-23.1.2
HIGH CVE-2023-4362 Npm-electron-23.1.2
HIGH CVE-2023-4366 Npm-electron-23.1.2
HIGH CVE-2023-4368 Npm-electron-23.1.2
HIGH CVE-2023-4369 Npm-electron-23.1.2
HIGH CVE-2023-4427 Npm-electron-23.1.2
HIGH CVE-2023-4428 Npm-electron-23.1.2
HIGH CVE-2023-4429 Npm-electron-23.1.2
HIGH CVE-2023-4430 Npm-electron-23.1.2
HIGH CVE-2023-4431 Npm-electron-23.1.2
HIGH CVE-2023-44402 Npm-electron-23.1.2
HIGH CVE-2023-4572 Npm-electron-23.1.2
HIGH CVE-2023-4761 Npm-electron-23.1.2
HIGH CVE-2023-4762 Npm-electron-23.1.2
HIGH CVE-2023-4763 Npm-electron-23.1.2
HIGH CVE-2023-4863 Npm-electron-23.1.2
HIGH CVE-2023-5186 Npm-electron-23.1.2
HIGH CVE-2023-5187 Npm-electron-23.1.2
HIGH CVE-2023-5217 Npm-electron-23.1.2
HIGH CVE-2023-5218 Npm-electron-23.1.2
HIGH CVE-2023-5346 Npm-electron-23.1.2
HIGH CVE-2023-5472 Npm-electron-23.1.2
HIGH CVE-2023-5474 Npm-electron-23.1.2
HIGH CVE-2023-5476 Npm-electron-23.1.2
HIGH CVE-2023-5482 Npm-electron-23.1.2
HIGH CVE-2023-5849 Npm-electron-23.1.2
HIGH CVE-2023-5852 Npm-electron-23.1.2
HIGH CVE-2023-5854 Npm-electron-23.1.2
HIGH CVE-2023-5855 Npm-electron-23.1.2
HIGH CVE-2023-5856 Npm-electron-23.1.2
HIGH CVE-2023-5857 Npm-electron-23.1.2
HIGH CVE-2023-5996 Npm-electron-23.1.2
HIGH CVE-2023-5997 Npm-electron-23.1.2
HIGH CVE-2023-6112 Npm-electron-23.1.2
HIGH CVE-2023-6345 Npm-electron-23.1.2
HIGH CVE-2023-6346 Npm-electron-23.1.2
HIGH CVE-2023-6347 Npm-electron-23.1.2
HIGH CVE-2023-6348 Npm-electron-23.1.2
HIGH CVE-2023-6350 Npm-electron-23.1.2
HIGH CVE-2023-6351 Npm-electron-23.1.2
HIGH CVE-2023-6508 Npm-electron-23.1.2
HIGH CVE-2023-6509 Npm-electron-23.1.2
HIGH CVE-2023-6510 Npm-electron-23.1.2
HIGH CVE-2023-6702 Npm-electron-23.1.2
HIGH CVE-2023-6703 Npm-electron-23.1.2
HIGH CVE-2023-6704 Npm-electron-23.1.2
HIGH CVE-2023-6705 Npm-electron-23.1.2
HIGH CVE-2023-6706 Npm-electron-23.1.2
HIGH CVE-2023-6707 Npm-electron-23.1.2
HIGH CVE-2023-7024 Npm-electron-23.1.2
HIGH CVE-2024-0222 Npm-electron-23.1.2
HIGH CVE-2024-0223 Npm-electron-23.1.2
HIGH CVE-2024-0224 Npm-electron-23.1.2
HIGH CVE-2024-0225 Npm-electron-23.1.2
HIGH CVE-2024-0517 Npm-electron-23.1.2
HIGH CVE-2024-0518 Npm-electron-23.1.2
HIGH CVE-2024-0519 Npm-electron-23.1.2
HIGH CVE-2024-0804 Npm-electron-23.1.2
HIGH CVE-2024-0806 Npm-electron-23.1.2
HIGH CVE-2024-0807 Npm-electron-23.1.2
HIGH CVE-2024-0808 Npm-electron-23.1.2
HIGH CVE-2024-0812 Npm-electron-23.1.2
HIGH CVE-2024-0813 Npm-electron-23.1.2
HIGH CVE-2024-1059 Npm-electron-23.1.2
HIGH CVE-2024-1060 Npm-electron-23.1.2
HIGH CVE-2024-1077 Npm-electron-23.1.2
HIGH CVE-2024-1283 Npm-electron-23.1.2
HIGH CVE-2024-1284 Npm-electron-23.1.2
HIGH CVE-2024-1669 Npm-electron-23.1.2
HIGH CVE-2024-1670 Npm-electron-23.1.2
HIGH CVE-2024-1673 Npm-electron-23.1.2
HIGH CVE-2024-1938 Npm-electron-23.1.2
HIGH CVE-2024-1939 Npm-electron-23.1.2
HIGH CVE-2024-21326 Npm-electron-23.1.2
HIGH CVE-2024-21385 Npm-electron-23.1.2
HIGH CVE-2024-21399 Npm-electron-23.1.2
HIGH CVE-2024-2173 Npm-electron-23.1.2
HIGH CVE-2024-2174 Npm-electron-23.1.2
HIGH CVE-2024-2400 Npm-electron-23.1.2
HIGH CVE-2024-26192 Npm-electron-23.1.2
HIGH CVE-2024-2625 Npm-electron-23.1.2
HIGH CVE-2024-2627 Npm-electron-23.1.2
HIGH CVE-2024-2883 Npm-electron-23.1.2
HIGH CVE-2024-2885 Npm-electron-23.1.2
HIGH CVE-2024-2886 Npm-electron-23.1.2
HIGH CVE-2024-2887 Npm-electron-23.1.2
HIGH CVE-2024-3157 Npm-electron-23.1.2
HIGH CVE-2024-3515 Npm-electron-23.1.2
HIGH CVE-2024-3516 Npm-electron-23.1.2
HIGH Cx89601373-08db Npm-debug-3.2.6
HIGH Cx89601373-08db Npm-debug-2.6.8
HIGH Cx89601373-08db Npm-debug-2.6.7
HIGH Cx89601373-08db Npm-debug-2.6.9
HIGH Cx89601373-08db Npm-debug-4.1.1
HIGH Cx89601373-08db Npm-debug-3.2.7
HIGH Cx89601373-08db Npm-debug-4.2.0
HIGH Cx89601373-08db Npm-debug-2.2.0
HIGH Cx89601373-08db Npm-debug-4.1.0
HIGH Cx89601373-08db Npm-debug-3.1.0
HIGH Cx89601373-08db Npm-debug-2.6.0
HIGH Cxab55612e-3a56 Npm-braces-3.0.2
HIGH Cxab55612e-3a56 Npm-braces-1.8.5
HIGH Cxab55612e-3a56 Npm-braces-2.3.2
HIGH Cxca84a1c2-1f12 Npm-micromatch-4.0.2
HIGH Cxca84a1c2-1f12 Npm-micromatch-3.1.10
HIGH Cxca84a1c2-1f12 Npm-micromatch-4.0.5
HIGH Cxca84a1c2-1f12 Npm-micromatch-4.0.4
HIGH Cxca84a1c2-1f12 Npm-micromatch-2.3.11
HIGH Cxf6e7f2c1-dc59 Npm-yauzl-2.4.1
HIGH Cxf6e7f2c1-dc59 Npm-yauzl-2.10.0
MEDIUM CVE-2023-2311 Npm-electron-23.1.2
MEDIUM CVE-2023-2314 Npm-electron-23.1.2
MEDIUM CVE-2023-2459 Npm-electron-23.1.2
MEDIUM CVE-2023-2463 Npm-electron-23.1.2
MEDIUM CVE-2023-2464 Npm-electron-23.1.2
MEDIUM CVE-2023-2465 Npm-electron-23.1.2
MEDIUM CVE-2023-2466 Npm-electron-23.1.2

More results are available on the CxOne platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants