forked from github/code-scanning-javascript-demo
-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource
Description
CVE-2024-27088 - Low Severity Vulnerability
Vulnerable Library - es5-ext-0.10.53.tgz
ECMAScript extensions and shims
Library home page: https://registry.npmjs.org/es5-ext/-/es5-ext-0.10.53.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/es5-ext/package.json
Dependency Hierarchy:
- standard-4.5.4.tgz (Root Library)
- eslint-0.24.1.tgz
- escope-3.6.0.tgz
- es6-map-0.1.5.tgz
- ❌ es5-ext-0.10.53.tgz (Vulnerable Library)
- es6-map-0.1.5.tgz
- escope-3.6.0.tgz
- eslint-0.24.1.tgz
Found in base branch: main
Vulnerability Details
es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into "function#copy" or "function#toStringTokens" may cause the script to stall. The vulnerability is patched in v0.10.63.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2024-02-26
URL: CVE-2024-27088
CVSS 3 Score Details (0.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
Metadata
Metadata
Assignees
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource