Update dependency express to v4.21.2 #114
Security Report
You have successfully remediated 5 vulnerabilities, but introduced 16 new vulnerabilities in this branch.
❌ New vulnerabilities:
CVE | Severity | CVSS Score | Vulnerable Library | Suggested Fix | Issue |
---|---|---|---|---|---|
CVE-2022-2421Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-client-2.3.1.tgz -> ❌ socket.io-parser-3.3.1.tgz (Vulnerable Library) |
Critical | 10.0 | socket.io-parser-3.3.1.tgz | Upgrade to version: socket.io-parser - 3.3.3,3.4.2,4.0.5,4.2.1;org.webjars.npm:socket.io-parser:4.0.5,4.2.1 | #64 |
CVE-2022-2421Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-2.4.1.tgz -> socket.io-client-2.4.0.tgz -> ❌ socket.io-parser-3.3.2.tgz (Vulnerable Library) |
Critical | 10.0 | socket.io-parser-3.3.2.tgz | Upgrade to version: socket.io-parser - 3.3.3,3.4.2,4.0.5,4.2.1;org.webjars.npm:socket.io-parser:4.0.5,4.2.1 | #64 |
CVE-2022-2421Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-2.4.1.tgz -> ❌ socket.io-parser-3.4.1.tgz (Vulnerable Library) |
Critical | 10.0 | socket.io-parser-3.4.1.tgz | Upgrade to version: socket.io-parser - 3.3.3,3.4.2,4.0.5,4.2.1;org.webjars.npm:socket.io-parser:4.0.5,4.2.1 | #64 |
CVE-2021-31597Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-client-2.3.1.tgz -> engine.io-client-3.4.4.tgz -> ❌ xmlhttprequest-ssl-1.5.5.tgz (Vulnerable Library) |
Critical | 9.4 | xmlhttprequest-ssl-1.5.5.tgz | Upgrade to version: xmlhttprequest-ssl - 1.6.1 | #64 |
CVE-2020-28502Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-client-2.3.1.tgz -> engine.io-client-3.4.4.tgz -> ❌ xmlhttprequest-ssl-1.5.5.tgz (Vulnerable Library) |
High | 8.1 | xmlhttprequest-ssl-1.5.5.tgz | Upgrade to version: xmlhttprequest - 1.7.0,xmlhttprequest-ssl - 1.6.2 | #64 |
CVE-2024-37890Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-client-2.3.1.tgz -> engine.io-client-3.4.4.tgz -> ❌ ws-6.1.4.tgz (Vulnerable Library) |
High | 7.5 | ws-6.1.4.tgz | Upgrade to version: ws - 5.2.4,6.2.3,7.5.10,8.17.1 | #64 |
CVE-2024-37890Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-2.4.1.tgz -> engine.io-3.5.0.tgz -> ❌ ws-7.4.4.tgz (Vulnerable Library) |
High | 7.5 | ws-7.4.4.tgz | Upgrade to version: ws - 5.2.4,6.2.3,7.5.10,8.17.1 | #64 |
CVE-2020-36049Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-client-2.3.1.tgz -> ❌ socket.io-parser-3.3.1.tgz (Vulnerable Library) |
High | 7.5 | socket.io-parser-3.3.1.tgz | Upgrade to version: socket.io-parser - 3.3.2,3.4.1 | #64 |
CVE-2020-36048Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-2.4.1.tgz -> ❌ engine.io-3.5.0.tgz (Vulnerable Library) |
High | 7.5 | engine.io-3.5.0.tgz | Upgrade to version: engine.io - 4.0.0 | #64 |
CVE-2024-38355Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> ❌ socket.io-2.4.1.tgz (Vulnerable Library) |
High | 7.3 | socket.io-2.4.1.tgz | Upgrade to version: socket.io - 2.5.1,4.6.2 | #64 |
CVE-2023-32695Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-2.4.1.tgz -> ❌ socket.io-parser-3.4.1.tgz (Vulnerable Library) |
High | 7.3 | socket.io-parser-3.4.1.tgz | Upgrade to version: socket.io-parser - 3.4.3,4.2.3 | #64 |
CVE-2022-41940Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-2.4.1.tgz -> ❌ engine.io-3.5.0.tgz (Vulnerable Library) |
High | 7.1 | engine.io-3.5.0.tgz | Upgrade to version: engine.io - 3.6.1,6.2.1 | #64 |
CVE-2024-47764Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-2.4.1.tgz -> engine.io-3.5.0.tgz -> ❌ cookie-0.4.1.tgz (Vulnerable Library) |
Medium | 5.3 | cookie-0.4.1.tgz | Upgrade to version: cookie - 0.7.0 | #64 |
CVE-2021-32640Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-2.4.1.tgz -> engine.io-3.5.0.tgz -> ❌ ws-7.4.4.tgz (Vulnerable Library) |
Medium | 5.3 | ws-7.4.4.tgz | Upgrade to version: 5.2.3,6.2.2,7.4.6 | #64 |
CVE-2021-32640Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-client-2.3.1.tgz -> engine.io-client-3.4.4.tgz -> ❌ ws-6.1.4.tgz (Vulnerable Library) |
Medium | 5.3 | ws-6.1.4.tgz | Upgrade to version: 5.2.3,6.2.2,7.4.6 | #64 |
CVE-2017-16137Path to dependency file: /client-web/package.json Path to vulnerable library: /client-web/package.json Dependency Hierarchy: -> nexmo-client-6.0.16.tgz (Root Library) -> socket.io-2.4.1.tgz -> ❌ debug-4.1.1.tgz (Vulnerable Library) |
Low | 3.7 | debug-4.1.1.tgz | Upgrade to version: debug - 2.6.9,3.1.0,3.2.7,4.3.1 | #64 |
✔️ Remediated vulnerabilities:
CVE | Vulnerable Library |
---|---|
CVE-2024-45590 | body-parser-1.20.2.tgz |
CVE-2024-47764 | cookie-0.6.0.tgz |
CVE-2024-52798 | path-to-regexp-0.1.7.tgz |
CVE-2024-37890 | ws-8.11.0.tgz |
CVE-2024-45296 | path-to-regexp-0.1.7.tgz |
Base branch total remaining vulnerabilities: 14
Base branch commit: 95a6e0bc77f286e625d33aa83abc5db8cb28a46e
Total libraries scanned: 429
Scan token: 770027419ed44391b9126b8dd17479e0