Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency express to v4.21.2 #114

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Update dependency express to v4.21.2

15923d2
Select commit
Loading
Failed to load commit list.
Open

Update dependency express to v4.21.2 #114

Update dependency express to v4.21.2
15923d2
Select commit
Loading
Failed to load commit list.
Mend for GitHub.com / WhiteSource Security Check failed Dec 20, 2024 in 7m 34s

Security Report

You have successfully remediated 5 vulnerabilities, but introduced 16 new vulnerabilities in this branch.

❌ New vulnerabilities:

CVE Severity CVSS Score Vulnerable Library Suggested Fix Issue
CVE-2022-2421

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-client-2.3.1.tgz

     -> ❌ socket.io-parser-3.3.1.tgz (Vulnerable Library)

Critical 10.0 socket.io-parser-3.3.1.tgz Upgrade to version: socket.io-parser - 3.3.3,3.4.2,4.0.5,4.2.1;org.webjars.npm:socket.io-parser:4.0.5,4.2.1 #64
CVE-2022-2421

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-2.4.1.tgz

     -> socket.io-client-2.4.0.tgz

       -> ❌ socket.io-parser-3.3.2.tgz (Vulnerable Library)

Critical 10.0 socket.io-parser-3.3.2.tgz Upgrade to version: socket.io-parser - 3.3.3,3.4.2,4.0.5,4.2.1;org.webjars.npm:socket.io-parser:4.0.5,4.2.1 #64
CVE-2022-2421

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-2.4.1.tgz

     -> ❌ socket.io-parser-3.4.1.tgz (Vulnerable Library)

Critical 10.0 socket.io-parser-3.4.1.tgz Upgrade to version: socket.io-parser - 3.3.3,3.4.2,4.0.5,4.2.1;org.webjars.npm:socket.io-parser:4.0.5,4.2.1 #64
CVE-2021-31597

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-client-2.3.1.tgz

     -> engine.io-client-3.4.4.tgz

       -> ❌ xmlhttprequest-ssl-1.5.5.tgz (Vulnerable Library)

Critical 9.4 xmlhttprequest-ssl-1.5.5.tgz Upgrade to version: xmlhttprequest-ssl - 1.6.1 #64
CVE-2020-28502

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-client-2.3.1.tgz

     -> engine.io-client-3.4.4.tgz

       -> ❌ xmlhttprequest-ssl-1.5.5.tgz (Vulnerable Library)

High 8.1 xmlhttprequest-ssl-1.5.5.tgz Upgrade to version: xmlhttprequest - 1.7.0,xmlhttprequest-ssl - 1.6.2 #64
CVE-2024-37890

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-client-2.3.1.tgz

     -> engine.io-client-3.4.4.tgz

       -> ❌ ws-6.1.4.tgz (Vulnerable Library)

High 7.5 ws-6.1.4.tgz Upgrade to version: ws - 5.2.4,6.2.3,7.5.10,8.17.1 #64
CVE-2024-37890

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-2.4.1.tgz

     -> engine.io-3.5.0.tgz

       -> ❌ ws-7.4.4.tgz (Vulnerable Library)

High 7.5 ws-7.4.4.tgz Upgrade to version: ws - 5.2.4,6.2.3,7.5.10,8.17.1 #64
CVE-2020-36049

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-client-2.3.1.tgz

     -> ❌ socket.io-parser-3.3.1.tgz (Vulnerable Library)

High 7.5 socket.io-parser-3.3.1.tgz Upgrade to version: socket.io-parser - 3.3.2,3.4.1 #64
CVE-2020-36048

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-2.4.1.tgz

     -> ❌ engine.io-3.5.0.tgz (Vulnerable Library)

High 7.5 engine.io-3.5.0.tgz Upgrade to version: engine.io - 4.0.0 #64
CVE-2024-38355

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> ❌ socket.io-2.4.1.tgz (Vulnerable Library)

High 7.3 socket.io-2.4.1.tgz Upgrade to version: socket.io - 2.5.1,4.6.2 #64
CVE-2023-32695

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-2.4.1.tgz

     -> ❌ socket.io-parser-3.4.1.tgz (Vulnerable Library)

High 7.3 socket.io-parser-3.4.1.tgz Upgrade to version: socket.io-parser - 3.4.3,4.2.3 #64
CVE-2022-41940

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-2.4.1.tgz

     -> ❌ engine.io-3.5.0.tgz (Vulnerable Library)

High 7.1 engine.io-3.5.0.tgz Upgrade to version: engine.io - 3.6.1,6.2.1 #64
CVE-2024-47764

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-2.4.1.tgz

     -> engine.io-3.5.0.tgz

       -> ❌ cookie-0.4.1.tgz (Vulnerable Library)

Medium 5.3 cookie-0.4.1.tgz Upgrade to version: cookie - 0.7.0 #64
CVE-2021-32640

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-2.4.1.tgz

     -> engine.io-3.5.0.tgz

       -> ❌ ws-7.4.4.tgz (Vulnerable Library)

Medium 5.3 ws-7.4.4.tgz Upgrade to version: 5.2.3,6.2.2,7.4.6 #64
CVE-2021-32640

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-client-2.3.1.tgz

     -> engine.io-client-3.4.4.tgz

       -> ❌ ws-6.1.4.tgz (Vulnerable Library)

Medium 5.3 ws-6.1.4.tgz Upgrade to version: 5.2.3,6.2.2,7.4.6 #64
CVE-2017-16137

Path to dependency file: /client-web/package.json

Path to vulnerable library: /client-web/package.json

Dependency Hierarchy:

-> nexmo-client-6.0.16.tgz (Root Library)

   -> socket.io-2.4.1.tgz

     -> ❌ debug-4.1.1.tgz (Vulnerable Library)

Low 3.7 debug-4.1.1.tgz Upgrade to version: debug - 2.6.9,3.1.0,3.2.7,4.3.1 #64

✔️ Remediated vulnerabilities:

CVE Vulnerable Library
CVE-2024-45590 body-parser-1.20.2.tgz
CVE-2024-47764 cookie-0.6.0.tgz
CVE-2024-52798 path-to-regexp-0.1.7.tgz
CVE-2024-37890 ws-8.11.0.tgz
CVE-2024-45296 path-to-regexp-0.1.7.tgz

Base branch total remaining vulnerabilities: 14
Base branch commit: 95a6e0bc77f286e625d33aa83abc5db8cb28a46e


Total libraries scanned: 429

Scan token: 770027419ed44391b9126b8dd17479e0