You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a proto or constructor.prototype payload.
mend-bolt-for-githubbot
changed the title
CVE-2021-23395 (High) detected in nedb-1.8.0.tgz
CVE-2021-23395 (Medium) detected in nedb-1.8.0.tgz
Jul 18, 2021
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
mend-bolt-for-githubbot
changed the title
CVE-2021-23395 (Medium) detected in nedb-1.8.0.tgz
CVE-2021-23395 (Medium) detected in nedb-1.8.0.tgz - autoclosed
Nov 25, 2021
CVE-2021-23395 - Medium Severity Vulnerability
Vulnerable Library - nedb-1.8.0.tgz
File-based embedded data store for node.js
Library home page: https://registry.npmjs.org/nedb/-/nedb-1.8.0.tgz
Path to dependency file: 77/Application/package.json
Path to vulnerable library: 77/Application/node_modules/nedb/package.json
Dependency Hierarchy:
Found in HEAD commit: fefe12a162add6ddeaaa7750d2ec2b1a4bc53eff
Found in base branch: master
Vulnerability Details
This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a proto or constructor.prototype payload.
Publish Date: 2021-06-15
URL: CVE-2021-23395
CVSS 3 Score Details (5.3)
Base Score Metrics:
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: