📂 Vulnerable Library - jest-22.4.3.tgz
Delightful JavaScript Testing.
Path to dependency file: /package.json
Partial results (21 findings) are displayed below due to a content size limitation in GitHub. To view information on the remaining findings, navigate to the Mend Application.
Findings
| Finding |
Severity |
🎯 CVSS |
Exploit Maturity |
EPSS |
Library |
Type |
Fixed in |
Remediation Available |
Reachability |
| CVE-2019-19919 |
🟣 Critical |
9.8 |
Not Defined |
17.800001% |
handlebars-4.1.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2021-44906 |
🟣 Critical |
9.8 |
Not Defined |
< 1% |
minimist-0.0.10.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2021-44906 |
🟣 Critical |
9.8 |
Not Defined |
< 1% |
minimist-1.2.0.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2023-45311 |
🟣 Critical |
9.8 |
Not Defined |
< 1% |
fsevents-1.2.9.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2026-33937 |
🟣 Critical |
9.8 |
Not Defined |
< 1% |
handlebars-4.1.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| MSC-2023-16609 |
🟣 Critical |
9.8 |
High |
< 1% |
fsevents-1.2.9.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2023-45133 |
🟣 Critical |
9.3 |
Not Defined |
< 1% |
babel-traverse-6.26.0.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2025-7783 |
🔴 High |
8.7 |
Not Defined |
< 1% |
form-data-2.3.3.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2026-33941 |
🔴 High |
8.2 |
Not Defined |
< 1% |
handlebars-4.1.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2019-20920 |
🔴 High |
8.1 |
Not Defined |
< 1% |
handlebars-4.1.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2026-33938 |
🔴 High |
8.1 |
Not Defined |
< 1% |
handlebars-4.1.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2026-33940 |
🔴 High |
8.1 |
Not Defined |
< 1% |
handlebars-4.1.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2026-4800 |
🔴 High |
8.1 |
Not Defined |
< 1% |
lodash-4.17.11.tgz |
Direct |
N/A |
❌ |
Unreachable |
| CVE-2021-43138 |
🔴 High |
7.8 |
Not Defined |
< 1% |
async-2.6.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2019-20149 |
🔴 High |
7.5 |
Not Defined |
< 1% |
kind-of-6.0.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2019-20922 |
🔴 High |
7.5 |
Not Defined |
< 1% |
handlebars-4.1.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2021-3777 |
🔴 High |
7.5 |
Not Defined |
< 1% |
tmpl-1.0.4.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2021-3807 |
🔴 High |
7.5 |
Not Defined |
< 1% |
ansi-regex-3.0.0.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2022-24999 |
🔴 High |
7.5 |
Not Defined |
1.5% |
qs-6.5.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
| CVE-2022-3517 |
🔴 High |
7.5 |
Not Defined |
< 1% |
minimatch-3.0.4.tgz |
Transitive |
N/A |
❌ |
Reachable |
| CVE-2024-37890 |
🔴 High |
7.5 |
Not Defined |
< 1% |
ws-5.2.2.tgz |
Transitive |
N/A |
❌ |
Unreachable |
Details
🟣CVE-2019-19919
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Dec 20, 2019 10:50 PM
URL: CVE-2019-19919
Threat Assessment
Exploit Maturity:Not Defined
EPSS:17.800001%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-w457-6q6x-cgp9
Release Date: Dec 20, 2019 10:50 PM
Fix Resolution : handlebars - 3.0.8,4.3.0
🟣CVE-2021-44906
Vulnerable Library - minimist-0.0.10.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: Mar 17, 2022 01:05 PM
URL: CVE-2021-44906
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-xvch-5gv4-984h
Release Date: Mar 17, 2022 01:05 PM
Fix Resolution : minimist - 0.2.4,1.2.6
🟣CVE-2021-44906
Vulnerable Library - minimist-1.2.0.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
-
cypress-3.6.1.tgz (Root Library)
- ❌ minimist-1.2.0.tgz (Vulnerable Library)
-
sw-precache-webpack-plugin-0.11.5.tgz (Root Library)
- sw-precache-5.2.1.tgz
- update-notifier-2.5.0.tgz
- latest-version-3.1.0.tgz
- package-json-4.0.1.tgz
- registry-url-3.1.0.tgz
- rc-1.2.8.tgz
- ❌ minimist-1.2.0.tgz (Vulnerable Library)
-
backpack-core-0.8.3.tgz (Root Library)
- nodemon-1.19.1.tgz
- chokidar-2.1.6.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- rc-1.2.8.tgz
- ❌ minimist-1.2.0.tgz (Vulnerable Library)
-
web-push-3.3.5.tgz (Root Library)
- ❌ minimist-1.2.0.tgz (Vulnerable Library)
-
browserify-preprocessor-1.1.2.tgz (Root Library)
- watchify-3.11.0.tgz
- chokidar-1.7.0.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- rc-1.2.8.tgz
- ❌ minimist-1.2.0.tgz (Vulnerable Library)
-
datadog-metrics-0.8.1.tgz (Root Library)
- dogapi-1.1.0.tgz
- ❌ minimist-1.2.0.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- jest-haste-map-22.4.3.tgz
- sane-2.5.2.tgz
- watch-0.18.0.tgz
- ❌ minimist-1.2.0.tgz (Vulnerable Library)
-
jest-21.2.1.tgz (Root Library)
- jest-cli-21.2.1.tgz
- jest-haste-map-21.2.0.tgz
- sane-2.5.2.tgz
- watch-0.18.0.tgz
- ❌ minimist-1.2.0.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: Mar 17, 2022 01:05 PM
URL: CVE-2021-44906
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-xvch-5gv4-984h
Release Date: Mar 17, 2022 01:05 PM
Fix Resolution : minimist - 0.2.4,1.2.6
🟣CVE-2023-45311
Vulnerable Library - fsevents-1.2.9.tgz
Native Access to Mac OS-X FSEvents
Library home page: https://registry.npmjs.org/fsevents/-/fsevents-1.2.9.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
-
backpack-core-0.8.3.tgz (Root Library)
- nodemon-1.19.1.tgz
- chokidar-2.1.6.tgz
- ❌ fsevents-1.2.9.tgz (Vulnerable Library)
-
browserify-preprocessor-1.1.2.tgz (Root Library)
- babel-plugin-add-module-exports-1.0.0.tgz
- chokidar-2.1.6.tgz
- ❌ fsevents-1.2.9.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- jest-haste-map-22.4.3.tgz
- sane-2.5.2.tgz
- ❌ fsevents-1.2.9.tgz (Vulnerable Library)
-
jest-21.2.1.tgz (Root Library)
- jest-cli-21.2.1.tgz
- jest-haste-map-21.2.0.tgz
- sane-2.5.2.tgz
- ❌ fsevents-1.2.9.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
fsevents before 1.2.11 depends on the https://fsevents-binaries.s3-us-west-2.amazonaws.com URL, which might allow an adversary to execute arbitrary code if any JavaScript project (that depends on fsevents) distributes code that was obtained from that URL at a time when it was controlled by an adversary. NOTE: some sources feel that this means that no version is affected any longer, because the URL is not controlled by an adversary.
Publish Date: Oct 06, 2023 12:00 AM
URL: CVE-2023-45311
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-45311
Release Date: Oct 06, 2023 12:00 AM
Fix Resolution : fsevents - 1.2.11
🟣CVE-2026-33937
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, "Handlebars.compile()" accepts a pre-parsed AST object in addition to a template string. The "value" field of a "NumberLiteral" AST node is emitted directly into the generated JavaScript without quoting or sanitization. An attacker who can supply a crafted AST to "compile()" can therefore inject and execute arbitrary JavaScript, leading to Remote Code Execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. Validate input type before calling "Handlebars.compile()"; ensure the argument is always a "string", never a plain object or JSON-deserialized value. Use the Handlebars runtime-only build ("handlebars/runtime") on the server if templates are pre-compiled at build time; "compile()" will be unavailable.
Publish Date: Mar 27, 2026 09:03 PM
URL: CVE-2026-33937
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: handlebars-lang/handlebars.js@68d8df5
Release Date: Mar 27, 2026 09:03 PM
Fix Resolution : https://github.com/handlebars-lang/handlebars.js.git - v4.7.9
🟣MSC-2023-16609
Vulnerable Library - fsevents-1.2.9.tgz
Native Access to Mac OS-X FSEvents
Library home page: https://registry.npmjs.org/fsevents/-/fsevents-1.2.9.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
-
backpack-core-0.8.3.tgz (Root Library)
- nodemon-1.19.1.tgz
- chokidar-2.1.6.tgz
- ❌ fsevents-1.2.9.tgz (Vulnerable Library)
-
browserify-preprocessor-1.1.2.tgz (Root Library)
- babel-plugin-add-module-exports-1.0.0.tgz
- chokidar-2.1.6.tgz
- ❌ fsevents-1.2.9.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- jest-haste-map-22.4.3.tgz
- sane-2.5.2.tgz
- ❌ fsevents-1.2.9.tgz (Vulnerable Library)
-
jest-21.2.1.tgz (Root Library)
- jest-cli-21.2.1.tgz
- jest-haste-map-21.2.0.tgz
- sane-2.5.2.tgz
- ❌ fsevents-1.2.9.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
This package has been identified by Mend as containing potential malicious functionality. The severity of the functionality can change depending on where the library is running (user's machine or backend server). The following risks were identified: Malware dropper – this package contains a Trojan horse, allowing the unauthorized installation of other potentially malicious software.
Publish Date: Sep 20, 2023 12:00 AM
URL: MSC-2023-16609
Threat Assessment
Exploit Maturity:High
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟣CVE-2023-45133
Vulnerable Library - babel-traverse-6.26.0.tgz
The Babel Traverse module maintains the overall tree state, and is responsible for replacing, removing, and adding nodes
Library home page: https://registry.npmjs.org/babel-traverse/-/babel-traverse-6.26.0.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
-
babel-preset-env-1.7.0.tgz (Root Library)
- babel-plugin-transform-exponentiation-operator-6.24.1.tgz
- babel-helper-builder-binary-assignment-operator-visitor-6.24.1.tgz
- babel-helper-explode-assignable-expression-6.24.1.tgz
- ❌ babel-traverse-6.26.0.tgz (Vulnerable Library)
-
babel-plugin-replace-dynamic-import-runtime-1.0.2.tgz (Root Library)
- babel-template-6.26.0.tgz
- ❌ babel-traverse-6.26.0.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- jest-runtime-22.4.4.tgz
- babel-plugin-istanbul-4.1.6.tgz
- istanbul-lib-instrument-1.10.2.tgz
- ❌ babel-traverse-6.26.0.tgz (Vulnerable Library)
-
jest-21.2.1.tgz (Root Library)
- jest-cli-21.2.1.tgz
- istanbul-api-1.3.7.tgz
- istanbul-lib-instrument-1.10.2.tgz
- ❌ babel-traverse-6.26.0.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Babel is a compiler for writingJavaScript. In "@babel/traverse" prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of "babel-traverse", using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the "path.evaluate()"or "path.evaluateTruthy()" internal Babel methods. Known affected plugins are "@babel/plugin-transform-runtime"; "@babel/preset-env" when using its "useBuiltIns" option; and any "polyfill provider" plugin that depends on "@babel/helper-define-polyfill-provider", such as "babel-plugin-polyfill-corejs3", "babel-plugin-polyfill-corejs2", "babel-plugin-polyfill-es-shims", "babel-plugin-polyfill-regenerator". No other plugins under the "@babel/" namespace are impacted, but third-party plugins might be. Users that only compile trusted code are not impacted. The vulnerability has been fixed in "@babel/traverse@7.23.2" and "@babel/traverse@8.0.0-alpha.4". Those who cannot upgrade "@babel/traverse" and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected "@babel/traverse" versions: "@babel/plugin-transform-runtime" v7.23.2, "@babel/preset-env" v7.23.2, "@babel/helper-define-polyfill-provider" v0.4.3, "babel-plugin-polyfill-corejs2" v0.4.6, "babel-plugin-polyfill-corejs3" v0.8.5, "babel-plugin-polyfill-es-shims" v0.10.0, "babel-plugin-polyfill-regenerator" v0.5.3.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Oct 12, 2023 04:17 PM
URL: CVE-2023-45133
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-67hx-6x53-jw92
Release Date: Oct 12, 2023 04:17 PM
Fix Resolution : @babel/traverse - 7.23.2,@babel/traverse - 7.23.2
🔴CVE-2025-7783
Vulnerable Library - form-data-2.3.3.tgz
A library to create readable "multipart/form-data" streams. Can be used to submit forms and file uploads to other web applications.
Library home page: https://registry.npmjs.org/form-data/-/form-data-2.3.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
cypress-3.6.1.tgz (Root Library)
- request-2.88.0.tgz
- ❌ form-data-2.3.3.tgz (Vulnerable Library)
-
request-2.88.0.tgz (Root Library)
- ❌ form-data-2.3.3.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- jest-environment-jsdom-22.4.3.tgz
- jsdom-11.12.0.tgz
- request-2.88.0.tgz
- ❌ form-data-2.3.3.tgz (Vulnerable Library)
-
jest-21.2.1.tgz (Root Library)
- jest-cli-21.2.1.tgz
- jest-environment-jsdom-21.2.1.tgz
- jsdom-9.12.0.tgz
- request-2.88.0.tgz
- ❌ form-data-2.3.3.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js.
This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jul 18, 2025 04:34 PM
URL: CVE-2025-7783
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-fjxv-7rqg-78g4
Release Date: Jul 18, 2025 04:34 PM
Fix Resolution : form-data - 2.5.4,form-data - 3.0.4,https://github.com/form-data/form-data.git - v2.5.4,form-data - 4.0.4,https://github.com/form-data/form-data.git - v4.0.4,https://github.com/form-data/form-data.git - v3.0.4
🔴CVE-2026-33941
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the Handlebars CLI precompiler ("bin/handlebars" / "lib/precompiler.js") concatenates user-controlled strings — template file names and several CLI options — directly into the JavaScript it emits, without any escaping or sanitization. An attacker who can influence template filenames or CLI arguments can inject arbitrary JavaScript that executes when the generated bundle is loaded in Node.js or a browser. Version 4.7.9 fixes the issue. Some workarounds are available. First, validate all CLI inputs before invoking the precompiler. Reject filenames and option values that contain characters with JavaScript string-escaping significance (""", "'", ";", etc.). Second, use a fixed, trusted namespace string passed via a configuration file rather than command-line arguments in automated pipelines. Third, run the precompiler in a sandboxed environment (container with no write access to sensitive paths) to limit the impact of successful exploitation. Fourth, audit template filenames in any repository or package that is consumed by an automated build pipeline.
Publish Date: Mar 27, 2026 09:13 PM
URL: CVE-2026-33941
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.2
Suggested Fix
Type: Upgrade version
Origin: handlebars-lang/handlebars.js@68d8df5
Release Date: Mar 27, 2026 09:13 PM
Fix Resolution : https://github.com/handlebars-lang/handlebars.js.git - v4.7.9
🔴CVE-2019-20920
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
Publish Date: Sep 30, 2020 12:30 PM
URL: CVE-2019-20920
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1316
Release Date: Sep 30, 2020 12:30 PM
Fix Resolution : handlebars - 4.5.3
🔴CVE-2026-33938
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the "@partial-block" special variable is stored in the template data context and is reachable and mutable from within a template via helpers that accept arbitrary objects. When a helper overwrites "@partial-block" with a crafted Handlebars AST, a subsequent invocation of "{{> @partial-block}}" compiles and executes that AST, enabling arbitrary JavaScript execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build ("require('handlebars/runtime')"). The "compile()" method is absent, eliminating the vulnerable fallback path. Second, audit registered helpers for any that write arbitrary values to context objects. Helpers should treat context data as read-only. Third, avoid registering helpers from third-party packages (such as "handlebars-helpers") in contexts where templates or context data can be influenced by untrusted input.
Publish Date: Mar 27, 2026 09:05 PM
URL: CVE-2026-33938
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin: handlebars-lang/handlebars.js@68d8df5
Release Date: Mar 27, 2026 09:05 PM
Fix Resolution : https://github.com/handlebars-lang/handlebars.js.git - v4.7.9
🔴CVE-2026-33940
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, a crafted object placed in the template context can bypass all conditional guards in "resolvePartial()" and cause "invokePartial()" to return "undefined". The Handlebars runtime then treats the unresolved partial as a source that needs to be compiled, passing the crafted object to "env.compile()". Because the object is a valid Handlebars AST containing injected code, the generated JavaScript executes arbitrary commands on the server. The attack requires the adversary to control a value that can be returned by a dynamic partial lookup. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build ("require('handlebars/runtime')"). Without "compile()", the fallback compilation path in "invokePartial" is unreachable. Second, sanitize context data before rendering: Ensure no value in the context is a non-primitive object that could be passed to a dynamic partial. Third, avoid dynamic partial lookups ("{{> (lookup ...)}}") when context data is user-controlled.
Publish Date: Mar 27, 2026 09:11 PM
URL: CVE-2026-33940
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin: handlebars-lang/handlebars.js@68d8df5
Release Date: Mar 27, 2026 09:11 PM
Fix Resolution : https://github.com/handlebars-lang/handlebars.js.git - v4.7.9
🔴CVE-2026-4800
Vulnerable Library - lodash-4.17.11.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
-
flow-typed-2.6.2.tgz (Root Library)
- table-5.4.0.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
react-app-rewire-styled-components-3.0.2.tgz (Root Library)
- babel-plugin-styled-components-1.10.0.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
backpack-core-0.8.3.tgz (Root Library)
- babel-preset-backpack-0.8.2.tgz
- core-7.4.5.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
redux-3.7.2.tgz (Root Library)
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
flow-typed-2.5.2.tgz (Root Library)
- rest-15.18.1.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
babel-plugin-replace-dynamic-import-runtime-1.0.2.tgz (Root Library)
- babel-types-6.26.0.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- jest-environment-jsdom-22.4.3.tgz
- jsdom-11.12.0.tgz
- request-promise-native-1.0.7.tgz
- request-promise-core-1.1.2.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
❌ lodash-4.17.11.tgz (Vulnerable Library)
-
aws-sdk-2.200.0.tgz (Root Library)
- xmlbuilder-4.2.1.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
babel-plugin-styled-components-1.10.0.tgz (Root Library)
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
cypress-3.6.1.tgz (Root Library)
- getos-3.1.1.tgz
- async-2.6.1.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
draft-js-code-editor-plugin-0.2.1.tgz (Root Library)
- babel-plugin-transform-react-jsx-6.24.1.tgz
- babel-helper-builder-react-jsx-6.26.0.tgz
- babel-types-6.26.0.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
styled-components-4.2.1.tgz (Root Library)
- babel-plugin-styled-components-1.10.0.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
slate-0.44.13.tgz (Root Library)
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
browserify-preprocessor-1.1.2.tgz (Root Library)
- preset-react-7.0.0.tgz
- plugin-transform-react-jsx-7.3.0.tgz
- helper-builder-react-jsx-7.3.0.tgz
- types-7.4.4.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
babel-preset-env-1.7.0.tgz (Root Library)
- babel-plugin-transform-regenerator-6.26.0.tgz
- regenerator-transform-0.10.1.tgz
- babel-types-6.26.0.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
hpp-0.2.2.tgz (Root Library)
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
-
jest-21.2.1.tgz (Root Library)
- jest-cli-21.2.1.tgz
- istanbul-api-1.3.7.tgz
- async-2.6.2.tgz
- ❌ lodash-4.17.11.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Impact:
The fix for CVE-2021-23337 (GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.
When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.
Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
Patches:
Users should upgrade to version 4.18.0.
Workarounds:
Do not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.
Publish Date: Mar 31, 2026 07:25 PM
URL: CVE-2026-4800
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2021-43138
Vulnerable Library - async-2.6.2.tgz
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-2.6.2.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
Publish Date: Apr 06, 2022 12:00 AM
URL: CVE-2021-43138
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.8
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-43138
Release Date: Apr 06, 2022 12:00 AM
Fix Resolution : async - 2.6.4,3.2.2
🔴CVE-2019-20149
Vulnerable Library - kind-of-6.0.2.tgz
Get the native type of a value.
Library home page: https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
-
backpack-core-0.8.3.tgz (Root Library)
- nodemon-1.19.1.tgz
- chokidar-2.1.6.tgz
- anymatch-2.0.0.tgz
- micromatch-3.1.10.tgz
- ❌ kind-of-6.0.2.tgz (Vulnerable Library)
-
browserify-preprocessor-1.1.2.tgz (Root Library)
- babel-plugin-add-module-exports-1.0.0.tgz
- chokidar-2.1.6.tgz
- braces-2.3.2.tgz
- snapdragon-node-2.1.1.tgz
- define-property-1.0.0.tgz
- is-descriptor-1.0.2.tgz
- is-data-descriptor-1.0.0.tgz
- ❌ kind-of-6.0.2.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- micromatch-2.3.11.tgz
- braces-1.8.5.tgz
- expand-range-1.8.2.tgz
- fill-range-2.2.4.tgz
- randomatic-3.1.1.tgz
- ❌ kind-of-6.0.2.tgz (Vulnerable Library)
-
jest-21.2.1.tgz (Root Library)
- jest-cli-21.2.1.tgz
- micromatch-2.3.11.tgz
- braces-1.8.5.tgz
- expand-range-1.8.2.tgz
- fill-range-2.2.4.tgz
- randomatic-3.1.1.tgz
- ❌ kind-of-6.0.2.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
Publish Date: Dec 30, 2019 06:25 PM
URL: CVE-2019-20149
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: jonschlinkert/kind-of#31
Release Date: Dec 30, 2019 06:25 PM
Fix Resolution : kind-of - 6.0.3
🔴CVE-2019-20922
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
Publish Date: Sep 30, 2020 12:30 PM
URL: CVE-2019-20922
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1300
Release Date: Sep 30, 2020 12:30 PM
Fix Resolution : handlebars - 4.4.5
🔴CVE-2021-3777
Vulnerable Library - tmpl-1.0.4.tgz
JavaScript micro templates.
Library home page: https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity
Publish Date: Sep 15, 2021 07:15 AM
URL: CVE-2021-3777
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2021-3807
Vulnerable Library - ansi-regex-3.0.0.tgz
Regular expression for matching ANSI escape codes
Library home page: https://registry.npmjs.org/ansi-regex/-/ansi-regex-3.0.0.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
Publish Date: Sep 17, 2021 12:00 AM
URL: CVE-2021-3807
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2022-24999
Vulnerable Library - qs-6.5.2.tgz
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-6.5.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
cypress-3.6.1.tgz (Root Library)
- request-2.88.0.tgz
- ❌ qs-6.5.2.tgz (Vulnerable Library)
-
request-2.88.0.tgz (Root Library)
- ❌ qs-6.5.2.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- jest-environment-jsdom-22.4.3.tgz
- jsdom-11.12.0.tgz
- request-2.88.0.tgz
- ❌ qs-6.5.2.tgz (Vulnerable Library)
-
jest-21.2.1.tgz (Root Library)
- jest-cli-21.2.1.tgz
- jest-environment-jsdom-21.2.1.tgz
- jsdom-9.12.0.tgz
- request-2.88.0.tgz
- ❌ qs-6.5.2.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[proto]=b&a[proto]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Nov 26, 2022 12:00 AM
URL: CVE-2022-24999
Threat Assessment
Exploit Maturity:Not Defined
EPSS:1.5%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2022-24999
Release Date: Nov 26, 2022 12:00 AM
Fix Resolution : qs - 6.2.4,6.3.3,6.4.1,6.5.3,6.6.1,6.7.3,6.8.3,6.9.7,6.10.3
🔴CVE-2022-3517
Vulnerable Library - minimatch-3.0.4.tgz
a glob matcher in javascript
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
eslint-plugin-node-6.0.1.tgz (Root Library)
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
-
flow-typed-2.6.2.tgz (Root Library)
- glob-7.1.4.tgz
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
-
sw-precache-webpack-plugin-0.11.5.tgz (Root Library)
- sw-precache-5.2.1.tgz
- glob-7.1.4.tgz
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
-
offline-plugin-4.9.1.tgz (Root Library)
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
-
backpack-core-0.8.3.tgz (Root Library)
- nodemon-1.19.1.tgz
- chokidar-2.1.6.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- npm-packlist-1.4.1.tgz
- ignore-walk-3.0.1.tgz
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
-
flow-typed-2.5.2.tgz (Root Library)
- glob-7.1.4.tgz
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
-
browserify-preprocessor-1.1.2.tgz (Root Library)
- watchify-3.11.0.tgz
- chokidar-1.7.0.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- npm-packlist-1.4.1.tgz
- ignore-walk-3.0.1.tgz
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- jest-runtime-22.4.4.tgz
- babel-core-6.26.3.tgz
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
-
offline-plugin-5.0.7.tgz (Root Library)
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
-
jest-21.2.1.tgz (Root Library)
- jest-cli-21.2.1.tgz
- istanbul-api-1.3.7.tgz
- fileset-2.0.3.tgz
- ❌ minimatch-3.0.4.tgz (Vulnerable Library)
Reachability Analysis
This vulnerability is potentially reachable:
- Spectrum-3.1.15/config-overrides.js (Application)
- offline-plugin-5.0.7/lib/index.js (Extension)
-> ❌ minimatch-3.0.4/minimatch.js (Vulnerable Component)
Vulnerability Details
A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
Publish Date: Oct 17, 2022 12:00 AM
URL: CVE-2022-3517
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2024-37890
Vulnerable Library - ws-5.2.2.tgz
Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js
Library home page: https://registry.npmjs.org/ws/-/ws-5.2.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
apollo-server-express-2.5.0-alpha.0.tgz (Root Library)
- apollo-server-core-2.5.0-alpha.0.tgz
- subscriptions-transport-ws-0.9.16.tgz
- ❌ ws-5.2.2.tgz (Vulnerable Library)
-
jest-22.4.3.tgz (Root Library)
- jest-cli-22.4.4.tgz
- jest-environment-jsdom-22.4.3.tgz
- jsdom-11.12.0.tgz
- ❌ ws-5.2.2.tgz (Vulnerable Library)
-
apollo-server-express-2.9.12.tgz (Root Library)
- apollo-server-core-2.9.12.tgz
- subscriptions-transport-ws-0.9.16.tgz
- ❌ ws-5.2.2.tgz (Vulnerable Library)
-
subscriptions-transport-ws-0.9.16.tgz (Root Library)
- ❌ ws-5.2.2.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.
Publish Date: Jun 17, 2024 07:09 PM
URL: CVE-2024-37890
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-3h5v-q93c-6h6q
Release Date: Jun 17, 2024 07:09 PM
Fix Resolution : ws - 5.2.4,6.2.3,7.5.10,8.17.1
📂 Vulnerable Library - jest-22.4.3.tgz
Delightful JavaScript Testing.
Path to dependency file: /package.json
Findings
Details
🟣CVE-2019-19919
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Dec 20, 2019 10:50 PM
URL: CVE-2019-19919
Threat Assessment
Exploit Maturity:Not Defined
EPSS:17.800001%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-w457-6q6x-cgp9
Release Date: Dec 20, 2019 10:50 PM
Fix Resolution : handlebars - 3.0.8,4.3.0
🟣CVE-2021-44906
Vulnerable Library - minimist-0.0.10.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: Mar 17, 2022 01:05 PM
URL: CVE-2021-44906
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-xvch-5gv4-984h
Release Date: Mar 17, 2022 01:05 PM
Fix Resolution : minimist - 0.2.4,1.2.6
🟣CVE-2021-44906
Vulnerable Library - minimist-1.2.0.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
cypress-3.6.1.tgz (Root Library)
sw-precache-webpack-plugin-0.11.5.tgz (Root Library)
backpack-core-0.8.3.tgz (Root Library)
web-push-3.3.5.tgz (Root Library)
browserify-preprocessor-1.1.2.tgz (Root Library)
datadog-metrics-0.8.1.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: Mar 17, 2022 01:05 PM
URL: CVE-2021-44906
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-xvch-5gv4-984h
Release Date: Mar 17, 2022 01:05 PM
Fix Resolution : minimist - 0.2.4,1.2.6
🟣CVE-2023-45311
Vulnerable Library - fsevents-1.2.9.tgz
Native Access to Mac OS-X FSEvents
Library home page: https://registry.npmjs.org/fsevents/-/fsevents-1.2.9.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
backpack-core-0.8.3.tgz (Root Library)
browserify-preprocessor-1.1.2.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
fsevents before 1.2.11 depends on the https://fsevents-binaries.s3-us-west-2.amazonaws.com URL, which might allow an adversary to execute arbitrary code if any JavaScript project (that depends on fsevents) distributes code that was obtained from that URL at a time when it was controlled by an adversary. NOTE: some sources feel that this means that no version is affected any longer, because the URL is not controlled by an adversary.
Publish Date: Oct 06, 2023 12:00 AM
URL: CVE-2023-45311
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-45311
Release Date: Oct 06, 2023 12:00 AM
Fix Resolution : fsevents - 1.2.11
🟣CVE-2026-33937
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, "Handlebars.compile()" accepts a pre-parsed AST object in addition to a template string. The "value" field of a "NumberLiteral" AST node is emitted directly into the generated JavaScript without quoting or sanitization. An attacker who can supply a crafted AST to "compile()" can therefore inject and execute arbitrary JavaScript, leading to Remote Code Execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. Validate input type before calling "Handlebars.compile()"; ensure the argument is always a "string", never a plain object or JSON-deserialized value. Use the Handlebars runtime-only build ("handlebars/runtime") on the server if templates are pre-compiled at build time; "compile()" will be unavailable.
Publish Date: Mar 27, 2026 09:03 PM
URL: CVE-2026-33937
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin: handlebars-lang/handlebars.js@68d8df5
Release Date: Mar 27, 2026 09:03 PM
Fix Resolution : https://github.com/handlebars-lang/handlebars.js.git - v4.7.9
🟣MSC-2023-16609
Vulnerable Library - fsevents-1.2.9.tgz
Native Access to Mac OS-X FSEvents
Library home page: https://registry.npmjs.org/fsevents/-/fsevents-1.2.9.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
backpack-core-0.8.3.tgz (Root Library)
browserify-preprocessor-1.1.2.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
This package has been identified by Mend as containing potential malicious functionality. The severity of the functionality can change depending on where the library is running (user's machine or backend server). The following risks were identified: Malware dropper – this package contains a Trojan horse, allowing the unauthorized installation of other potentially malicious software.
Publish Date: Sep 20, 2023 12:00 AM
URL: MSC-2023-16609
Threat Assessment
Exploit Maturity:High
EPSS:< 1%
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟣CVE-2023-45133
Vulnerable Library - babel-traverse-6.26.0.tgz
The Babel Traverse module maintains the overall tree state, and is responsible for replacing, removing, and adding nodes
Library home page: https://registry.npmjs.org/babel-traverse/-/babel-traverse-6.26.0.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
babel-preset-env-1.7.0.tgz (Root Library)
babel-plugin-replace-dynamic-import-runtime-1.0.2.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Babel is a compiler for writingJavaScript. In "@babel/traverse" prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of "babel-traverse", using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the "path.evaluate()"or "path.evaluateTruthy()" internal Babel methods. Known affected plugins are "@babel/plugin-transform-runtime"; "@babel/preset-env" when using its "useBuiltIns" option; and any "polyfill provider" plugin that depends on "@babel/helper-define-polyfill-provider", such as "babel-plugin-polyfill-corejs3", "babel-plugin-polyfill-corejs2", "babel-plugin-polyfill-es-shims", "babel-plugin-polyfill-regenerator". No other plugins under the "@babel/" namespace are impacted, but third-party plugins might be. Users that only compile trusted code are not impacted. The vulnerability has been fixed in "@babel/traverse@7.23.2" and "@babel/traverse@8.0.0-alpha.4". Those who cannot upgrade "@babel/traverse" and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected "@babel/traverse" versions: "@babel/plugin-transform-runtime" v7.23.2, "@babel/preset-env" v7.23.2, "@babel/helper-define-polyfill-provider" v0.4.3, "babel-plugin-polyfill-corejs2" v0.4.6, "babel-plugin-polyfill-corejs3" v0.8.5, "babel-plugin-polyfill-es-shims" v0.10.0, "babel-plugin-polyfill-regenerator" v0.5.3.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Oct 12, 2023 04:17 PM
URL: CVE-2023-45133
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-67hx-6x53-jw92
Release Date: Oct 12, 2023 04:17 PM
Fix Resolution : @babel/traverse - 7.23.2,@babel/traverse - 7.23.2
🔴CVE-2025-7783
Vulnerable Library - form-data-2.3.3.tgz
A library to create readable "multipart/form-data" streams. Can be used to submit forms and file uploads to other web applications.
Library home page: https://registry.npmjs.org/form-data/-/form-data-2.3.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
cypress-3.6.1.tgz (Root Library)
request-2.88.0.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js.
This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jul 18, 2025 04:34 PM
URL: CVE-2025-7783
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-fjxv-7rqg-78g4
Release Date: Jul 18, 2025 04:34 PM
Fix Resolution : form-data - 2.5.4,form-data - 3.0.4,https://github.com/form-data/form-data.git - v2.5.4,form-data - 4.0.4,https://github.com/form-data/form-data.git - v4.0.4,https://github.com/form-data/form-data.git - v3.0.4
🔴CVE-2026-33941
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the Handlebars CLI precompiler ("bin/handlebars" / "lib/precompiler.js") concatenates user-controlled strings — template file names and several CLI options — directly into the JavaScript it emits, without any escaping or sanitization. An attacker who can influence template filenames or CLI arguments can inject arbitrary JavaScript that executes when the generated bundle is loaded in Node.js or a browser. Version 4.7.9 fixes the issue. Some workarounds are available. First, validate all CLI inputs before invoking the precompiler. Reject filenames and option values that contain characters with JavaScript string-escaping significance (""", "'", ";", etc.). Second, use a fixed, trusted namespace string passed via a configuration file rather than command-line arguments in automated pipelines. Third, run the precompiler in a sandboxed environment (container with no write access to sensitive paths) to limit the impact of successful exploitation. Fourth, audit template filenames in any repository or package that is consumed by an automated build pipeline.
Publish Date: Mar 27, 2026 09:13 PM
URL: CVE-2026-33941
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.2
Suggested Fix
Type: Upgrade version
Origin: handlebars-lang/handlebars.js@68d8df5
Release Date: Mar 27, 2026 09:13 PM
Fix Resolution : https://github.com/handlebars-lang/handlebars.js.git - v4.7.9
🔴CVE-2019-20920
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
Publish Date: Sep 30, 2020 12:30 PM
URL: CVE-2019-20920
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1316
Release Date: Sep 30, 2020 12:30 PM
Fix Resolution : handlebars - 4.5.3
🔴CVE-2026-33938
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the "@partial-block" special variable is stored in the template data context and is reachable and mutable from within a template via helpers that accept arbitrary objects. When a helper overwrites "@partial-block" with a crafted Handlebars AST, a subsequent invocation of "{{> @partial-block}}" compiles and executes that AST, enabling arbitrary JavaScript execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build ("require('handlebars/runtime')"). The "compile()" method is absent, eliminating the vulnerable fallback path. Second, audit registered helpers for any that write arbitrary values to context objects. Helpers should treat context data as read-only. Third, avoid registering helpers from third-party packages (such as "handlebars-helpers") in contexts where templates or context data can be influenced by untrusted input.
Publish Date: Mar 27, 2026 09:05 PM
URL: CVE-2026-33938
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin: handlebars-lang/handlebars.js@68d8df5
Release Date: Mar 27, 2026 09:05 PM
Fix Resolution : https://github.com/handlebars-lang/handlebars.js.git - v4.7.9
🔴CVE-2026-33940
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, a crafted object placed in the template context can bypass all conditional guards in "resolvePartial()" and cause "invokePartial()" to return "undefined". The Handlebars runtime then treats the unresolved partial as a source that needs to be compiled, passing the crafted object to "env.compile()". Because the object is a valid Handlebars AST containing injected code, the generated JavaScript executes arbitrary commands on the server. The attack requires the adversary to control a value that can be returned by a dynamic partial lookup. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build ("require('handlebars/runtime')"). Without "compile()", the fallback compilation path in "invokePartial" is unreachable. Second, sanitize context data before rendering: Ensure no value in the context is a non-primitive object that could be passed to a dynamic partial. Third, avoid dynamic partial lookups ("{{> (lookup ...)}}") when context data is user-controlled.
Publish Date: Mar 27, 2026 09:11 PM
URL: CVE-2026-33940
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin: handlebars-lang/handlebars.js@68d8df5
Release Date: Mar 27, 2026 09:11 PM
Fix Resolution : https://github.com/handlebars-lang/handlebars.js.git - v4.7.9
🔴CVE-2026-4800
Vulnerable Library - lodash-4.17.11.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
flow-typed-2.6.2.tgz (Root Library)
react-app-rewire-styled-components-3.0.2.tgz (Root Library)
backpack-core-0.8.3.tgz (Root Library)
redux-3.7.2.tgz (Root Library)
flow-typed-2.5.2.tgz (Root Library)
babel-plugin-replace-dynamic-import-runtime-1.0.2.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
❌ lodash-4.17.11.tgz (Vulnerable Library)
aws-sdk-2.200.0.tgz (Root Library)
babel-plugin-styled-components-1.10.0.tgz (Root Library)
cypress-3.6.1.tgz (Root Library)
draft-js-code-editor-plugin-0.2.1.tgz (Root Library)
styled-components-4.2.1.tgz (Root Library)
slate-0.44.13.tgz (Root Library)
browserify-preprocessor-1.1.2.tgz (Root Library)
babel-preset-env-1.7.0.tgz (Root Library)
hpp-0.2.2.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Impact:
The fix for CVE-2021-23337 (GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.
When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.
Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
Patches:
Users should upgrade to version 4.18.0.
Workarounds:
Do not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.
Publish Date: Mar 31, 2026 07:25 PM
URL: CVE-2026-4800
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2021-43138
Vulnerable Library - async-2.6.2.tgz
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-2.6.2.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
Publish Date: Apr 06, 2022 12:00 AM
URL: CVE-2021-43138
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.8
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-43138
Release Date: Apr 06, 2022 12:00 AM
Fix Resolution : async - 2.6.4,3.2.2
🔴CVE-2019-20149
Vulnerable Library - kind-of-6.0.2.tgz
Get the native type of a value.
Library home page: https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
backpack-core-0.8.3.tgz (Root Library)
browserify-preprocessor-1.1.2.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
Publish Date: Dec 30, 2019 06:25 PM
URL: CVE-2019-20149
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: jonschlinkert/kind-of#31
Release Date: Dec 30, 2019 06:25 PM
Fix Resolution : kind-of - 6.0.3
🔴CVE-2019-20922
Vulnerable Library - handlebars-4.1.2.tgz
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
Publish Date: Sep 30, 2020 12:30 PM
URL: CVE-2019-20922
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1300
Release Date: Sep 30, 2020 12:30 PM
Fix Resolution : handlebars - 4.4.5
🔴CVE-2021-3777
Vulnerable Library - tmpl-1.0.4.tgz
JavaScript micro templates.
Library home page: https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity
Publish Date: Sep 15, 2021 07:15 AM
URL: CVE-2021-3777
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2021-3807
Vulnerable Library - ansi-regex-3.0.0.tgz
Regular expression for matching ANSI escape codes
Library home page: https://registry.npmjs.org/ansi-regex/-/ansi-regex-3.0.0.tgz
Path to dependency file: /api/package.json
Dependency Hierarchy:
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
Publish Date: Sep 17, 2021 12:00 AM
URL: CVE-2021-3807
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2022-24999
Vulnerable Library - qs-6.5.2.tgz
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-6.5.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
cypress-3.6.1.tgz (Root Library)
request-2.88.0.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[proto]=b&a[proto]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Nov 26, 2022 12:00 AM
URL: CVE-2022-24999
Threat Assessment
Exploit Maturity:Not Defined
EPSS:1.5%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2022-24999
Release Date: Nov 26, 2022 12:00 AM
Fix Resolution : qs - 6.2.4,6.3.3,6.4.1,6.5.3,6.6.1,6.7.3,6.8.3,6.9.7,6.10.3
🔴CVE-2022-3517
Vulnerable Library - minimatch-3.0.4.tgz
a glob matcher in javascript
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
eslint-plugin-node-6.0.1.tgz (Root Library)
flow-typed-2.6.2.tgz (Root Library)
sw-precache-webpack-plugin-0.11.5.tgz (Root Library)
offline-plugin-4.9.1.tgz (Root Library)
backpack-core-0.8.3.tgz (Root Library)
flow-typed-2.5.2.tgz (Root Library)
browserify-preprocessor-1.1.2.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
offline-plugin-5.0.7.tgz (Root Library)
jest-21.2.1.tgz (Root Library)
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
Publish Date: Oct 17, 2022 12:00 AM
URL: CVE-2022-3517
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2024-37890
Vulnerable Library - ws-5.2.2.tgz
Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js
Library home page: https://registry.npmjs.org/ws/-/ws-5.2.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
apollo-server-express-2.5.0-alpha.0.tgz (Root Library)
jest-22.4.3.tgz (Root Library)
apollo-server-express-2.9.12.tgz (Root Library)
subscriptions-transport-ws-0.9.16.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.
Publish Date: Jun 17, 2024 07:09 PM
URL: CVE-2024-37890
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-3h5v-q93c-6h6q
Release Date: Jun 17, 2024 07:09 PM
Fix Resolution : ws - 5.2.4,6.2.3,7.5.10,8.17.1