You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.
Vulnerable Library - puppeteer-1.11.0.tgz
A high-level API to control headless Chrome over the DevTools Protocol
Library home page: https://registry.npmjs.org/puppeteer/-/puppeteer-1.11.0.tgz
Found in HEAD commit: caf38324f5719d5c85806c516ecfb8f0177e29c0
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2019-5786
Vulnerable Library - puppeteer-1.11.0.tgz
A high-level API to control headless Chrome over the DevTools Protocol
Library home page: https://registry.npmjs.org/puppeteer/-/puppeteer-1.11.0.tgz
Dependency Hierarchy:
Found in HEAD commit: caf38324f5719d5c85806c516ecfb8f0177e29c0
Found in base branch: main
Vulnerability Details
Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
Publish Date: 2019-06-27
URL: CVE-2019-5786
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html
Release Date: 2019-06-27
Fix Resolution: 1.13.0
CVE-2017-16137
Vulnerable Libraries - debug-3.2.6.tgz, debug-4.1.0.tgz
debug-3.2.6.tgz
small debugging utility
Library home page: https://registry.npmjs.org/debug/-/debug-3.2.6.tgz
Dependency Hierarchy:
debug-4.1.0.tgz
small debugging utility
Library home page: https://registry.npmjs.org/debug/-/debug-4.1.0.tgz
Dependency Hierarchy:
Found in HEAD commit: caf38324f5719d5c85806c516ecfb8f0177e29c0
Found in base branch: main
Vulnerability Details
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.
Publish Date: 2018-06-07
URL: CVE-2017-16137
CVSS 3 Score Details (3.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-gxpj-cx7g-858c
Release Date: 2018-06-07
Fix Resolution (debug): 3.2.7
Direct dependency fix Resolution (puppeteer): 1.12.0
Fix Resolution (debug): 3.2.7
Direct dependency fix Resolution (puppeteer): 1.12.0
The text was updated successfully, but these errors were encountered: