Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade @kubernetes/client-node from 0.16.3 to 0.21.0 #6

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

karencapiiro
Copy link

snyk-top-banner

Snyk has created this PR to upgrade @kubernetes/client-node from 0.16.3 to 0.21.0.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 7 versions ahead of your current version.

  • The recommended version was released on 4 months ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Denial of Service (DoS)
SNYK-JS-WS-7266574
63 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-HTTPCACHESEMANTICS-3248783
63 Proof of Concept
medium severity Missing Release of Resource after Effective Lifetime
SNYK-JS-INFLIGHT-6095116
63 Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JS-JOSE-3018688
63 No Known Exploit
medium severity Resource Exhaustion
SNYK-JS-JOSE-6419224
63 No Known Exploit
medium severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JS-TAR-6476909
63 Proof of Concept

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"","from":"kubernetes/client-node","to":"kubernetes/client-node"}],"env":"prod","hasFixes":true,"isBreakingChange":false,"isMajorUpgrade":false,"issuesToFix":[{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-WS-7266574","issue_id":"SNYK-JS-WS-7266574","priority_score":169,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity","value":"proofOfConcept"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00044},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Mon Jun 17 2024 14:34:03 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"high"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":2.81},{"name":"scoreVersion","value":"V5"}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-HTTPCACHESEMANTICS-3248783","issue_id":"SNYK-JS-HTTPCACHESEMANTICS-3248783","priority_score":63,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"low"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity","value":"proofOfConcept"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00161},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Mon Jan 30 2023 14:39:52 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":2.35},{"name":"likelihood","value":2.64},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-INFLIGHT-6095116","issue_id":"SNYK-JS-INFLIGHT-6095116","priority_score":141,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity","value":"proofOfConcept"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"local"},{"name":"epss","value":0.01055},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Thu Nov 30 2023 12:52:55 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":2.35},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Missing Release of Resource after Effective Lifetime"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-JOSE-3018688","issue_id":"SNYK-JS-JOSE-3018688","priority_score":91,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"low"},{"name":"attackComplexity","value":"high"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00102},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Thu Sep 08 2022 13:51:16 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":1.5},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-JOSE-6419224","issue_id":"SNYK-JS-JOSE-6419224","priority_score":49,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"low"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00044},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Fri Mar 08 2024 08:47:34 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":2.35},{"name":"likelihood","value":2.06},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Resource Exhaustion"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-TAR-6476909","issue_id":"SNYK-JS-TAR-6476909","priority_score":142,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity","value":"proofOfConcept"},{"name":"userInteraction","value":"required"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00045},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Fri Mar 22 2024 12:56:33 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":2.36},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Uncontrolled Resource Consumption ('Resource Exhaustion')"}],"prId":"22ee8d35-4351-4ae2-8de4-6c9828ebc1cf","prPublicId":"22ee8d35-4351-4ae2-8de4-6c9828ebc1cf","packageManager":"yarn","priorityScoreList":[169,63,141,91,49,142],"projectPublicId":"4d4da4d9-492b-40ee-8b04-0dddfba0a39a","projectUrl":"https://app.snyk.io/org/apiiro-snyk/project/4d4da4d9-492b-40ee-8b04-0dddfba0a39a?utm_source=github&utm_medium=referral&page=upgrade-pr","prType":"upgrade","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["priorityScore"],"type":"auto","upgrade":["SNYK-JS-WS-7266574","SNYK-JS-HTTPCACHESEMANTICS-3248783","SNYK-JS-INFLIGHT-6095116","SNYK-JS-JOSE-3018688","SNYK-JS-JOSE-6419224","SNYK-JS-TAR-6476909"],"upgradeInfo":{"versionsDiff":7,"publishedDate":"2024-05-03T16:39:50.776Z"},"vulns":["SNYK-JS-WS-7266574","SNYK-JS-HTTPCACHESEMANTICS-3248783","SNYK-JS-INFLIGHT-6095116","SNYK-JS-JOSE-3018688","SNYK-JS-JOSE-6419224","SNYK-JS-TAR-6476909"]}'

Snyk has created this PR to upgrade @kubernetes/client-node from 0.16.3 to 0.21.0.

See this package in yarn:
@kubernetes/client-node

See this project in Snyk:
https://app.snyk.io/org/apiiro-snyk/project/4d4da4d9-492b-40ee-8b04-0dddfba0a39a?utm_source=github&utm_medium=referral&page=upgrade-pr
@rafikmojr
Copy link
Collaborator

Logo
Checkmarx One – Scan Summary & Details28fba1fa-409f-4969-a7eb-eb33219bcb16

New Issues

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2023-4860 Npm-electron-16.2.2 Vulnerable Package
CRITICAL CVE-2024-1670 Npm-electron-16.2.2 Vulnerable Package
CRITICAL CVE-2024-2887 Npm-electron-16.2.2 Vulnerable Package
CRITICAL CVE-2024-4559 Npm-electron-16.2.2 Vulnerable Package
CRITICAL CVE-2024-4671 Npm-electron-16.2.2 Vulnerable Package
CRITICAL CVE-2024-6992 Npm-electron-16.2.2 Vulnerable Package
CRITICAL CVE-2024-8905 Npm-electron-16.2.2 Vulnerable Package
CRITICAL CVE-2024-8907 Npm-electron-16.2.2 Vulnerable Package
CRITICAL CVE-2024-8908 Npm-electron-16.2.2 Vulnerable Package
CRITICAL CVE-2024-8909 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2022-0453 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2022-1314 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2022-1477 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2023-7010 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2023-7012 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-1669 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-1673 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-1938 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-1939 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-2173 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-2174 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-2176 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-2400 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-26192 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-2625 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-2627 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-2883 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-2885 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-2886 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-29180 Npm-webpack-dev-middleware-5.3.3 Vulnerable Package
HIGH CVE-2024-29415 Npm-ip-1.1.8 Vulnerable Package
HIGH CVE-2024-29415 Npm-ip-2.0.0 Vulnerable Package
HIGH CVE-2024-3156 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3157 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3158 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3159 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3168 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3169 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3170 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3171 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3172 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3173 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3174 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3176 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-33883 Npm-ejs-3.1.8 Vulnerable Package
HIGH CVE-2024-33883 Npm-ejs-3.1.9 Vulnerable Package
HIGH CVE-2024-3515 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3516 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-37890 Npm-ws-7.5.9 Vulnerable Package
HIGH CVE-2024-37890 Npm-ws-8.11.0 Vulnerable Package
HIGH CVE-2024-37890 Npm-ws-7.5.7 Vulnerable Package
HIGH CVE-2024-37890 Npm-ws-8.13.0 Vulnerable Package
HIGH CVE-2024-3832 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3834 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3837 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-3914 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-4058 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-4059 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-4060 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-4068 Npm-braces-3.0.2 Vulnerable Package
HIGH CVE-2024-4331 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-4368 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-45296 Npm-path-to-regexp-2.2.1 Vulnerable Package
HIGH CVE-2024-45296 Npm-path-to-regexp-1.8.0 Vulnerable Package
HIGH CVE-2024-45296 Npm-path-to-regexp-0.1.7 Vulnerable Package
HIGH CVE-2024-4558 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-45590 Npm-body-parser-1.20.1 Vulnerable Package
HIGH CVE-2024-4761 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-4947 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-4948 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-4950 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5157 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5158 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5159 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5160 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5274 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5493 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5494 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5495 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5496 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5497 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5498 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5499 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5830 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5831 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5832 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5833 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5834 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5835 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5836 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5837 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5838 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5841 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5842 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5844 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5845 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5846 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-5847 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6100 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6101 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6102 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6103 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6290 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6291 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6292 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6293 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6772 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6773 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6774 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6775 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6776 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6777 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6778 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6779 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6988 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6989 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6990 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6991 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6994 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6997 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-6998 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7000 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7255 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7256 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7532 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7533 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7534 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7535 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7536 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7550 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7964 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7965 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7966 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7967 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7968 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7969 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7970 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7971 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7972 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7973 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7974 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7977 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7979 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-7980 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8193 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8194 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8198 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8362 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8636 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8637 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8638 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8639 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8904 Npm-electron-16.2.2 Vulnerable Package
HIGH CVE-2024-8906 Npm-electron-16.2.2 Vulnerable Package
HIGH Cx636032b1-ebe2 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2022-1138 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2022-1492 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2023-7011 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2023-7013 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-1672 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-1674 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-1675 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-21423 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-21503 Python-black-21.12b0 Vulnerable Package
MEDIUM CVE-2024-21503 Python-black-22.12.0 Vulnerable Package
MEDIUM CVE-2024-26163 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-26167 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-26188 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-26196 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-26247 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-2626 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-2628 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-2629 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-2630 Npm-electron-16.2.2 Vulnerable Package
MEDIUM CVE-2024-2631 Npm-electron-16.2.2

More results are available on AST platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants