-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-3795 (High) detected in semver-regex-1.0.0.tgz - autoclosed #2753
Comments
ℹ️ This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #2790 |
👋 Thanks for reporting! |
Message that will be displayed on users' first issue |
Thank you for your report, the issue you have reported has just been fixed.
|
This old thread has been automatically locked. If you think you have found something related to this, please open a new issue by following the issue guide (https://github.com/AlexRogalskiy/java-patterns/blob/master/.github/ISSUE_TEMPLATE/bug_report.md), and link to this old issue if necessary. |
CVE-2021-3795 - High Severity Vulnerability
Vulnerable Library - semver-regex-1.0.0.tgz
Regular expression for matching semver versions
Library home page: https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/semver-regex/package.json
Dependency Hierarchy:
Found in HEAD commit: 9efbe1379b9c65e6ed2f688fa63c20bc73430a96
Found in base branch: master
Vulnerability Details
semver-regex is vulnerable to Inefficient Regular Expression Complexity
Publish Date: 2021-09-15
URL: CVE-2021-3795
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1
Release Date: 2021-09-15
Fix Resolution: semver-regex - 3.1.3,4.0.1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: