You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mend-for-github-combot
changed the title
CVE-2021-3765 (High) detected in validator-13.5.2.tgz, validator-12.2.0.tgz
CVE-2021-3765 (High) detected in validator-13.5.2.tgz, validator-12.2.0.tgz - autoclosed
Oct 21, 2022
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2021-3765 - High Severity Vulnerability
validator-13.5.2.tgz
String validation and sanitization
Library home page: https://registry.npmjs.org/validator/-/validator-13.5.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/validator/package.json
Dependency Hierarchy:
validator-12.2.0.tgz
String validation and sanitization
Library home page: https://registry.npmjs.org/validator/-/validator-12.2.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/z-schema/node_modules/validator/package.json
Dependency Hierarchy:
Found in HEAD commit: 3912fdf164197aec6dc6c42ef1edc2f39d68619f
Found in base branch: master
validator.js is vulnerable to Inefficient Regular Expression Complexity
Publish Date: 2021-11-02
URL: CVE-2021-3765
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-qgmg-gppg-76g5
Release Date: 2021-11-02
Fix Resolution (validator): 13.7.0
Direct dependency fix Resolution (swagger-mock-validator): 10.0.1
Fix Resolution (validator): 13.7.0
Direct dependency fix Resolution (swagger-mock-validator): 10.0.1
The text was updated successfully, but these errors were encountered: