You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The parsing component in LibSass through 3.5.5 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Parser::parse_css_variable_value in parser.cpp).
mend-for-github-combot
changed the title
CVE-2018-20821 (Medium) detected in node-sass-4.9.0.tgz, opennms-opennms-source-24.1.2-1
CVE-2018-20821 (Medium) detected in node-sass-4.9.0.tgz, opennmsopennms-source-24.1.2-1
Oct 9, 2020
CVE-2018-20821 - Medium Severity Vulnerability
node-sass-4.9.0.tgz
Wrapper around libsass
Library home page: https://registry.npmjs.org/node-sass/-/node-sass-4.9.0.tgz
Path to dependency file: esri.github.io/package.json
Path to vulnerable library: esri.github.io/node_modules/node-sass/package.json
Dependency Hierarchy:
Found in HEAD commit: a4d59687db7452886288c3f1faa3a43e975f6ff8
The parsing component in LibSass through 3.5.5 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Parser::parse_css_variable_value in parser.cpp).
Publish Date: 2019-04-23
URL: CVE-2018-20821
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20821
Release Date: 2019-04-23
Fix Resolution: LibSass - 3.6.0
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: