-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - node-popup-0.1.14.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/ws/package.json
Found in HEAD commit: d7d21efb3aaa38b61736a4184eaa885d95dd5415
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (node-popup version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2021-44906 | 9.8 | minimist-1.2.5.tgz | Transitive | N/A* | ❌ | |
| CVE-2024-37890 | 7.5 | ws-6.2.2.tgz | Transitive | N/A* | ❌ | |
| CVE-2020-7598 | 5.6 | minimist-1.2.5.tgz | Transitive | N/A* | ❌ | |
| CVE-2026-31988 | 5.3 | yauzl-2.10.0.tgz | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2021-44906
Vulnerable Library - minimist-1.2.5.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/minimist/package.json
Dependency Hierarchy:
- node-popup-0.1.14.tgz (Root Library)
- carlo-0.9.43.tgz
- puppeteer-core-1.20.0.tgz
- extract-zip-1.7.0.tgz
- mkdirp-0.5.5.tgz
- ❌ minimist-1.2.5.tgz (Vulnerable Library)
- mkdirp-0.5.5.tgz
- extract-zip-1.7.0.tgz
- puppeteer-core-1.20.0.tgz
- carlo-0.9.43.tgz
Found in HEAD commit: d7d21efb3aaa38b61736a4184eaa885d95dd5415
Found in base branch: master
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: 2022-03-17
URL: CVE-2021-44906
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-xvch-5gv4-984h
Release Date: 2022-03-17
Fix Resolution: minimist - 0.2.4,1.2.6
Step up your Open Source Security Game with Mend here
CVE-2024-37890
Vulnerable Library - ws-6.2.2.tgz
Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js
Library home page: https://registry.npmjs.org/ws/-/ws-6.2.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/ws/package.json
Dependency Hierarchy:
- node-popup-0.1.14.tgz (Root Library)
- carlo-0.9.43.tgz
- puppeteer-core-1.20.0.tgz
- ❌ ws-6.2.2.tgz (Vulnerable Library)
- puppeteer-core-1.20.0.tgz
- carlo-0.9.43.tgz
Found in HEAD commit: d7d21efb3aaa38b61736a4184eaa885d95dd5415
Found in base branch: master
Vulnerability Details
ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.
Publish Date: 2024-06-17
URL: CVE-2024-37890
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-3h5v-q93c-6h6q
Release Date: 2024-06-17
Fix Resolution: ws - 5.2.4,6.2.3,7.5.10,8.17.1
Step up your Open Source Security Game with Mend here
CVE-2020-7598
Vulnerable Library - minimist-1.2.5.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/minimist/package.json
Dependency Hierarchy:
- node-popup-0.1.14.tgz (Root Library)
- carlo-0.9.43.tgz
- puppeteer-core-1.20.0.tgz
- extract-zip-1.7.0.tgz
- mkdirp-0.5.5.tgz
- ❌ minimist-1.2.5.tgz (Vulnerable Library)
- mkdirp-0.5.5.tgz
- extract-zip-1.7.0.tgz
- puppeteer-core-1.20.0.tgz
- carlo-0.9.43.tgz
Found in HEAD commit: d7d21efb3aaa38b61736a4184eaa885d95dd5415
Found in base branch: master
Vulnerability Details
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "proto" payload.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2020-03-11
URL: CVE-2020-7598
CVSS 3 Score Details (5.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Release Date: 2020-03-11
Fix Resolution: minimist - 0.2.1,1.2.3
Step up your Open Source Security Game with Mend here
CVE-2026-31988
Vulnerable Library - yauzl-2.10.0.tgz
yet another unzip library for node
Library home page: https://registry.npmjs.org/yauzl/-/yauzl-2.10.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/yauzl/package.json
Dependency Hierarchy:
- node-popup-0.1.14.tgz (Root Library)
- carlo-0.9.43.tgz
- puppeteer-core-1.20.0.tgz
- extract-zip-1.7.0.tgz
- ❌ yauzl-2.10.0.tgz (Vulnerable Library)
- extract-zip-1.7.0.tgz
- puppeteer-core-1.20.0.tgz
- carlo-0.9.43.tgz
Found in HEAD commit: d7d21efb3aaa38b61736a4184eaa885d95dd5415
Found in base branch: master
Vulnerability Details
yauzl (aka Yet Another Unzip Library) version 3.2.0 for Node.js contains an off-by-one error in the NTFS extended timestamp extra field parser within the getLastModDate() function. The while loop condition checks cursor < data.length + 4 instead of cursor + 4 <= data.length, allowing readUInt16LE() to read past the buffer boundary. A remote attacker can cause a denial of service (process crash via ERR_OUT_OF_RANGE exception) by sending a crafted zip file with a malformed NTFS extra field. This affects any Node.js application that processes zip file uploads and calls entry.getLastModDate() on parsed entries. Fixed in version 3.2.1.
Publish Date: 2026-03-11
URL: CVE-2026-31988
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://www.codeant.ai/security-research/yauzl-denial-of-service-zip-file-crash
Release Date: 2026-03-11
Fix Resolution: yauzl - 3.2.1,https://github.com/thejoshwolfe/yauzl.git - 3.2.1
Step up your Open Source Security Game with Mend here