You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g proto, toString, etc) results in a returned object with a modified prototype instance.
mend-bolt-for-githubbot
changed the title
electron-devtools-installer-3.1.1.tgz: 2 vulnerabilities (highest severity is: 5.5)
electron-devtools-installer-3.1.1.tgz: 2 vulnerabilities (highest severity is: 7.3)
Jan 19, 2023
mend-bolt-for-githubbot
changed the title
electron-devtools-installer-3.1.1.tgz: 2 vulnerabilities (highest severity is: 7.3)
electron-devtools-installer-3.1.1.tgz: 3 vulnerabilities (highest severity is: 7.3)
Jan 30, 2023
mend-bolt-for-githubbot
changed the title
electron-devtools-installer-3.1.1.tgz: 3 vulnerabilities (highest severity is: 7.3)
electron-devtools-installer-3.1.1.tgz: 2 vulnerabilities (highest severity is: 5.5)
Feb 2, 2023
mend-bolt-for-githubbot
changed the title
electron-devtools-installer-3.1.1.tgz: 2 vulnerabilities (highest severity is: 5.5)
electron-devtools-installer-3.1.1.tgz: 2 vulnerabilities (highest severity is: 9.8)
Feb 9, 2023
mend-bolt-for-githubbot
changed the title
electron-devtools-installer-3.1.1.tgz: 2 vulnerabilities (highest severity is: 9.8)
electron-devtools-installer-3.1.1.tgz: 2 vulnerabilities (highest severity is: 7.3)
Mar 7, 2023
Vulnerable Library - electron-devtools-installer-3.1.1.tgz
Path to dependency file: /components/dashboard/node_modules/electron-devtools-installer/package.json
Path to vulnerable library: /components/dashboard/node_modules/jszip/package.json
Vulnerabilities
Details
CVE-2022-48285
Vulnerable Library - jszip-3.5.0.tgz
Create, read and edit .zip files with JavaScript http://stuartk.com/jszip
Library home page: https://registry.npmjs.org/jszip/-/jszip-3.5.0.tgz
Path to dependency file: /components/dashboard/node_modules/jszip/package.json
Path to vulnerable library: /components/dashboard/node_modules/jszip/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.
Publish Date: 2023-01-29
URL: CVE-2022-48285
CVSS 3 Score Details (7.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2023-01-29
Fix Resolution (jszip): 3.8.0
Direct dependency fix Resolution (electron-devtools-installer): 3.2.0
Step up your Open Source Security Game with Mend here
CVE-2021-23413
Vulnerable Library - jszip-3.5.0.tgz
Create, read and edit .zip files with JavaScript http://stuartk.com/jszip
Library home page: https://registry.npmjs.org/jszip/-/jszip-3.5.0.tgz
Path to dependency file: /components/dashboard/node_modules/jszip/package.json
Path to vulnerable library: /components/dashboard/node_modules/jszip/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g proto, toString, etc) results in a returned object with a modified prototype instance.
Publish Date: 2021-07-25
URL: CVE-2021-23413
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23413
Release Date: 2021-07-25
Fix Resolution (jszip): 3.7.0
Direct dependency fix Resolution (electron-devtools-installer): 3.2.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: