📂 Vulnerable Library - npm-8.19.2.tgz
a package manager for JavaScript
Path to dependency file: /script/package.json
Findings
| Finding |
Severity |
🎯 CVSS |
Exploit Maturity |
EPSS |
Library |
Type |
Fixed in |
Remediation Available |
Reachability |
| CVE-289561-266276 |
🟣 Critical |
9.8 |
N/A |
N/A |
inherits-2.0.4.tgz |
Transitive |
N/A |
❌ |
|
| CVE-398484-724968 |
🟣 Critical |
9.8 |
N/A |
N/A |
ms-2.1.3.tgz |
Transitive |
N/A |
❌ |
|
| CVE-495493-603164 |
🟣 Critical |
9.8 |
N/A |
N/A |
delegates-1.0.0.tgz |
Transitive |
N/A |
❌ |
|
| CVE-2025-5889 |
🟡 Low |
1.3 |
Proof of concept |
< 1% |
brace-expansion-1.1.11.tgz |
Transitive |
N/A |
❌ |
|
| CVE-2025-5889 |
🟡 Low |
1.3 |
Proof of concept |
< 1% |
brace-expansion-2.0.1.tgz |
Transitive |
N/A |
❌ |
|
Details
🟣CVE-289561-266276
Vulnerable Library - inherits-2.0.4.tgz
Browser-friendly inheritance fully compatible with standard node.js inherits()
Library home page: https://registry.npmjs.org/inherits/-/inherits-2.0.4.tgz
Path to dependency file: /script/package.json
Dependency Hierarchy:
-
glob-7.1.6.tgz (Root Library)
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
fstream-1.0.12.tgz (Root Library)
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
express-4.18.2.tgz (Root Library)
- http-errors-2.0.0.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
settings-view-https://www.atom.io/api/packages/settings-view/versions/0.261.3/tarball.tgz (Root Library)
- glob-4.3.1.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
markdown-preview-https://www.atom.io/api/packages/markdown-preview/versions/0.160.2/tarball.tgz (Root Library)
- cheerio-1.0.0-rc.3.tgz
- htmlparser2-3.10.1.tgz
- readable-stream-3.4.0.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
npm-8.19.2.tgz (Root Library)
- node-gyp-9.1.0.tgz
- glob-7.2.3.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
babel-core-5.8.38.tgz (Root Library)
- regenerator-0.8.40.tgz
- commoner-0.10.8.tgz
- glob-5.0.15.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
mocha-10.2.0.tgz (Root Library)
- glob-7.2.0.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
jasmine-tagged-1.1.4.tgz (Root Library)
- jasmine-focused-1.0.7.tgz
-
archive-view-https://www.atom.io/api/packages/archive-view/versions/0.65.2/tarball.tgz (Root Library)
- ls-archive-1.3.4.tgz
- tar-2.2.2.tgz
- block-stream-0.0.9.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
prebuild-install-5.3.3.tgz (Root Library)
- tar-fs-2.0.0.tgz
- tar-stream-2.1.0.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
fs-plus-3.1.1.tgz (Root Library)
- rimraf-2.7.1.tgz
- glob-7.2.3.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
atom-package-manager-2.6.5.tgz (Root Library)
- asar-require-0.3.0.tgz
- asar-0.12.1.tgz
- mksnapshot-0.3.5.tgz
- decompress-zip-0.3.3.tgz
- readable-stream-1.1.14.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
text-buffer-13.18.6.tgz (Root Library)
- fs-admin-0.19.0.tgz
- prebuild-install-6.1.3.tgz
- tar-fs-2.1.1.tgz
- tar-stream-2.2.0.tgz
- bl-4.1.0.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
-
fs-admin-0.19.0.tgz (Root Library)
- prebuild-install-6.1.3.tgz
- tar-fs-2.1.1.tgz
- tar-stream-2.2.0.tgz
- bl-4.1.0.tgz
- ❌ inherits-2.0.4.tgz (Vulnerable Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-289561-266276
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟣CVE-398484-724968
Vulnerable Library - ms-2.1.3.tgz
Tiny millisecond conversion utility
Library home page: https://registry.npmjs.org/ms/-/ms-2.1.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
express-4.18.2.tgz (Root Library)
- send-0.18.0.tgz
- ❌ ms-2.1.3.tgz (Vulnerable Library)
-
electron-packager-16.0.0.tgz (Root Library)
- galactus-0.2.1.tgz
- debug-3.2.7.tgz
- ❌ ms-2.1.3.tgz (Vulnerable Library)
-
npm-8.19.2.tgz (Root Library)
- make-fetch-happen-10.2.1.tgz
- agentkeepalive-4.2.1.tgz
- humanize-ms-1.2.1.tgz
- ❌ ms-2.1.3.tgz (Vulnerable Library)
-
mocha-10.2.0.tgz (Root Library)
- ❌ ms-2.1.3.tgz (Vulnerable Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-398484-724968
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟣CVE-495493-603164
Vulnerable Library - delegates-1.0.0.tgz
delegate methods and accessors to another property
Library home page: https://registry.npmjs.org/delegates/-/delegates-1.0.0.tgz
Path to dependency file: /script/package.json
Dependency Hierarchy:
-
prebuild-install-5.3.3.tgz (Root Library)
- npmlog-4.1.2.tgz
- are-we-there-yet-1.1.5.tgz
- ❌ delegates-1.0.0.tgz (Vulnerable Library)
-
atom-package-manager-2.6.5.tgz (Root Library)
- npm-6.14.17.tgz
- npmlog-4.1.2.tgz
- are-we-there-yet-1.1.4.tgz
- ❌ delegates-1.0.0.tgz (Vulnerable Library)
-
npm-8.19.2.tgz (Root Library)
- npmlog-6.0.2.tgz
- are-we-there-yet-3.0.1.tgz
- ❌ delegates-1.0.0.tgz (Vulnerable Library)
-
fs-admin-0.12.0.tgz (Root Library)
- prebuild-install-5.3.3.tgz
- npmlog-4.1.2.tgz
- are-we-there-yet-1.1.5.tgz
- ❌ delegates-1.0.0.tgz (Vulnerable Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-495493-603164
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟡CVE-2025-5889
Vulnerable Library - brace-expansion-1.1.11.tgz
Brace expansion as known from sh/bash
Library home page: https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz
Path to dependency file: /apm/package.json
Dependency Hierarchy:
-
eslint-plugin-import-2.17.2.tgz (Root Library)
- minimatch-3.0.4.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
electron-packager-16.0.0.tgz (Root Library)
- universal-1.3.1.tgz
- dir-compare-2.4.0.tgz
- minimatch-3.0.4.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
settings-view-https://www.atom.io/api/packages/settings-view/versions/0.261.3/tarball.tgz (Root Library)
- glob-4.3.1.tgz
- minimatch-2.0.10.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
minimatch-3.0.5.tgz (Root Library)
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
npm-8.19.2.tgz (Root Library)
- node-gyp-9.1.0.tgz
- glob-7.2.3.tgz
- minimatch-3.1.2.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
babel-core-5.8.38.tgz (Root Library)
- minimatch-2.0.10.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
mocha-10.2.0.tgz (Root Library)
- glob-7.2.0.tgz
- minimatch-3.1.2.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
webdriverio-5.9.2.tgz (Root Library)
- config-5.9.1.tgz
- glob-7.1.4.tgz
- minimatch-3.0.4.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
stylelint-9.3.0.tgz (Root Library)
- globby-8.0.1.tgz
- glob-7.1.2.tgz
- minimatch-3.0.4.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
scandal-3.2.0.tgz (Root Library)
- minimatch-2.0.10.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
electron-winstaller-0.0.1.tgz (Root Library)
- asar-1.0.0.tgz
- tmp-promise-1.1.0.tgz
- tmp-0.1.0.tgz
- rimraf-2.6.3.tgz
- glob-7.1.4.tgz
- minimatch-3.0.4.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
eslint-5.16.0.tgz (Root Library)
- minimatch-3.0.4.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
eslint-plugin-node-9.0.1.tgz (Root Library)
- minimatch-3.0.4.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
atom-package-manager-2.6.5.tgz (Root Library)
- glob-7.2.3.tgz
- minimatch-3.1.2.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
fs-extra-0.30.0.tgz (Root Library)
- rimraf-2.6.2.tgz
- glob-7.1.2.tgz
- minimatch-3.0.4.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
-
glob-7.0.3.tgz (Root Library)
- minimatch-3.1.2.tgz
- ❌ brace-expansion-1.1.11.tgz (Vulnerable Library)
Vulnerability Details
A vulnerability was found in juliangruber brace-expansion up to 1.1.11. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to apply a patch to fix this issue.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jun 09, 2025 06:16 PM
URL: CVE-2025-5889
Threat Assessment
Exploit Maturity:Proof of concept
EPSS:< 1%
Score: 1.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-v6h2-p8h4-qcjw
Release Date: Jun 09, 2025 06:16 PM
Fix Resolution : brace-expansion - 4.0.1,https://github.com/juliangruber/brace-expansion.git - no_fix,brace-expansion - 3.0.1,brace-expansion - 2.0.2,brace-expansion - 1.1.12
🟡CVE-2025-5889
Vulnerable Library - brace-expansion-2.0.1.tgz
Brace expansion as known from sh/bash
Library home page: https://registry.npmjs.org/brace-expansion/-/brace-expansion-2.0.1.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
Vulnerability Details
A vulnerability was found in juliangruber brace-expansion up to 1.1.11. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to apply a patch to fix this issue.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jun 09, 2025 06:16 PM
URL: CVE-2025-5889
Threat Assessment
Exploit Maturity:Proof of concept
EPSS:< 1%
Score: 1.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-v6h2-p8h4-qcjw
Release Date: Jun 09, 2025 06:16 PM
Fix Resolution : brace-expansion - 4.0.1,https://github.com/juliangruber/brace-expansion.git - no_fix,brace-expansion - 3.0.1,brace-expansion - 2.0.2,brace-expansion - 1.1.12
📂 Vulnerable Library - npm-8.19.2.tgz
a package manager for JavaScript
Path to dependency file: /script/package.json
Findings
Details
🟣CVE-289561-266276
Vulnerable Library - inherits-2.0.4.tgz
Browser-friendly inheritance fully compatible with standard node.js inherits()
Library home page: https://registry.npmjs.org/inherits/-/inherits-2.0.4.tgz
Path to dependency file: /script/package.json
Dependency Hierarchy:
glob-7.1.6.tgz (Root Library)
fstream-1.0.12.tgz (Root Library)
express-4.18.2.tgz (Root Library)
settings-view-https://www.atom.io/api/packages/settings-view/versions/0.261.3/tarball.tgz (Root Library)
markdown-preview-https://www.atom.io/api/packages/markdown-preview/versions/0.160.2/tarball.tgz (Root Library)
npm-8.19.2.tgz (Root Library)
babel-core-5.8.38.tgz (Root Library)
mocha-10.2.0.tgz (Root Library)
jasmine-tagged-1.1.4.tgz (Root Library)
archive-view-https://www.atom.io/api/packages/archive-view/versions/0.65.2/tarball.tgz (Root Library)
prebuild-install-5.3.3.tgz (Root Library)
fs-plus-3.1.1.tgz (Root Library)
atom-package-manager-2.6.5.tgz (Root Library)
text-buffer-13.18.6.tgz (Root Library)
fs-admin-0.19.0.tgz (Root Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-289561-266276
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟣CVE-398484-724968
Vulnerable Library - ms-2.1.3.tgz
Tiny millisecond conversion utility
Library home page: https://registry.npmjs.org/ms/-/ms-2.1.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
express-4.18.2.tgz (Root Library)
electron-packager-16.0.0.tgz (Root Library)
npm-8.19.2.tgz (Root Library)
mocha-10.2.0.tgz (Root Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-398484-724968
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟣CVE-495493-603164
Vulnerable Library - delegates-1.0.0.tgz
delegate methods and accessors to another property
Library home page: https://registry.npmjs.org/delegates/-/delegates-1.0.0.tgz
Path to dependency file: /script/package.json
Dependency Hierarchy:
prebuild-install-5.3.3.tgz (Root Library)
atom-package-manager-2.6.5.tgz (Root Library)
npm-8.19.2.tgz (Root Library)
fs-admin-0.12.0.tgz (Root Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-495493-603164
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟡CVE-2025-5889
Vulnerable Library - brace-expansion-1.1.11.tgz
Brace expansion as known from sh/bash
Library home page: https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz
Path to dependency file: /apm/package.json
Dependency Hierarchy:
eslint-plugin-import-2.17.2.tgz (Root Library)
electron-packager-16.0.0.tgz (Root Library)
settings-view-https://www.atom.io/api/packages/settings-view/versions/0.261.3/tarball.tgz (Root Library)
minimatch-3.0.5.tgz (Root Library)
npm-8.19.2.tgz (Root Library)
babel-core-5.8.38.tgz (Root Library)
mocha-10.2.0.tgz (Root Library)
webdriverio-5.9.2.tgz (Root Library)
stylelint-9.3.0.tgz (Root Library)
scandal-3.2.0.tgz (Root Library)
electron-winstaller-0.0.1.tgz (Root Library)
eslint-5.16.0.tgz (Root Library)
eslint-plugin-node-9.0.1.tgz (Root Library)
atom-package-manager-2.6.5.tgz (Root Library)
fs-extra-0.30.0.tgz (Root Library)
glob-7.0.3.tgz (Root Library)
Vulnerability Details
A vulnerability was found in juliangruber brace-expansion up to 1.1.11. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to apply a patch to fix this issue.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jun 09, 2025 06:16 PM
URL: CVE-2025-5889
Threat Assessment
Exploit Maturity:Proof of concept
EPSS:< 1%
Score: 1.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-v6h2-p8h4-qcjw
Release Date: Jun 09, 2025 06:16 PM
Fix Resolution : brace-expansion - 4.0.1,https://github.com/juliangruber/brace-expansion.git - no_fix,brace-expansion - 3.0.1,brace-expansion - 2.0.2,brace-expansion - 1.1.12
🟡CVE-2025-5889
Vulnerable Library - brace-expansion-2.0.1.tgz
Brace expansion as known from sh/bash
Library home page: https://registry.npmjs.org/brace-expansion/-/brace-expansion-2.0.1.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
npm-8.19.2.tgz (Root Library)
mocha-10.2.0.tgz (Root Library)
Vulnerability Details
A vulnerability was found in juliangruber brace-expansion up to 1.1.11. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to apply a patch to fix this issue.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jun 09, 2025 06:16 PM
URL: CVE-2025-5889
Threat Assessment
Exploit Maturity:Proof of concept
EPSS:< 1%
Score: 1.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-v6h2-p8h4-qcjw
Release Date: Jun 09, 2025 06:16 PM
Fix Resolution : brace-expansion - 4.0.1,https://github.com/juliangruber/brace-expansion.git - no_fix,brace-expansion - 3.0.1,brace-expansion - 2.0.2,brace-expansion - 1.1.12