[Snyk] Security upgrade @mojaloop/central-services-health from 8.3.0 to 13.0.0 #30
An automation triggered a pipeline failure
Found 62 vulnerabilities. An additional 0 vulnerabilities have been marked as unaffected.
Output from Automations
6 rules were checked:
If a new dependency is added where the license risk is at least medium
then notify all users in the group admins by email
✔️ The rule did not trigger. Manage rule
If a dependency contains a vulnerability which has not been marked as unaffected and which has not triggered this rule for this dependency before
then notify all users in the group admins by email
✔️ The rule did not trigger. Manage rule
If there is a dependency where the license risk is at least high
then send a pipeline warning
✔️ The rule did not trigger. Manage rule
If a new dependency is added where the license risk is at least high
then fail pipeline
✔️ The rule did not trigger. Manage rule
If a dependency contains a vulnerability which has not been marked as unaffected
then send a pipeline warning
Vulnerability | CVSS2 | CVSS3 | Dependency | Dependency Licenses |
---|---|---|---|---|
CVE-2020-28464 | 10 | 9.8 | djv (npm) | MIT |
CVE-2021-3918 | 7.5 | 9.8 | json-schema (npm) | BSD-3-Clause |
CVE-2022-2564 | N/A | 9.8 | mongoose (npm) | Debricked Unknown License, MIT |
CVE-2021-23383 | 7.5 | 9.8 | handlebars (npm) | Debricked Unknown License, MIT |
CVE-2021-23369 | 7.5 | 9.8 | handlebars (npm) | Debricked Unknown License, MIT |
CVE-2023-3696 | N/A | 9.8 | mongoose (npm) | Debricked Unknown License, MIT |
CVE-2023-26136 | N/A | 9.8 | tough-cookie (npm) | BSD-3-Clause, CC0-1.0, MIT |
CVE-2020-7610 | 7.5 | 9.8 | bson (npm) | Apache-2.0, Debricked Unknown License |
CVE-2021-23438 | 7.5 | 9.8 | mpath (npm) | MIT |
CVE-2020-12265 | 7.5 | 9.8 | decompress (npm) | MIT |
CVE-2022-46175 | N/A | 8.8 | json5 (npm) | Debricked Unknown License, MIT |
CVE-2021-37713 | 4.4 | 8.6 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2021-37712 | 4.4 | 8.6 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2021-37701 | 4.4 | 8.6 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2021-32803 | 5.8 | 8.1 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2021-32804 | 5.8 | 8.1 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2022-23539 | N/A | 8.1 | jsonwebtoken (npm) | MIT |
CVE-2020-36604 | N/A | 8.1 | @hapi/hoek (npm) | BSD-3-Clause |
CVE-2021-43138 | 6.8 | 7.8 | async (npm) | MIT |
CVE-2022-23540 | N/A | 7.6 | jsonwebtoken (npm) | MIT |
CVE-2022-24785 | 5 | 7.5 | moment (npm) | MIT |
CVE-2021-3749 | 7.8 | 7.5 | axios (npm) | MIT |
CVE-2021-27290 | 4.3 | 7.5 | ssri (npm) | CC0-1.0, ISC |
CVE-2022-25883 | N/A | 7.5 | semver (npm) | BSD-2-Clause, Debricked Unknown License, ISC, MIT |
CVE-2022-24999 | N/A | 7.5 | qs (npm) | BSD-3-Clause, Debricked Unknown License, MIT |
CVE-2020-28469 | 5 | 7.5 | glob-parent (npm) | ISC |
CVE-2021-23343 | 5 | 7.5 | path-parse (npm) | MIT |
CVE-2020-7768 | 5 | 7.5 | grpc (npm) | Apache-2.0, BSD-3-Clause |
CVE-2022-3517 | N/A | 7.5 | minimatch (npm) | Debricked Unknown License, ISC, MIT |
CVE-2022-31129 | 5 | 7.5 | moment (npm) | MIT |
CVE-2022-25881 | N/A | 7.5 | http-cache-semantics (npm) | BSD-2-Clause |
CVE-2023-26115 | N/A | 7.5 | word-wrap (npm) | MIT |
CVE-2021-33502 | 5 | 7.5 | normalize-url (npm) | MIT |
CVE-2021-3807 | 7.8 | 7.5 | ansi-regex (npm) | MIT |
CVE-2020-8203 | 5.8 | 7.4 | lodash (npm) | MIT |
CVE-2020-7788 | 7.5 | 7.3 | ini (npm) | Debricked Unknown License, ISC, MIT |
CVE-2020-8116 | 7.5 | 7.3 | dot-prop (npm) | MIT |
CVE-2020-7774 | 7.5 | 7.3 | y18n (npm) | ISC |
CVE-2021-23337 | 6.5 | 7.2 | lodash (npm) | MIT |
CVE-2023-45857 | N/A | 6.5 | axios (npm) | MIT |
CVE-2020-8244 | 6.4 | 6.5 | bl (npm) | MIT |
CVE-2022-0155 | 4.3 | 6.5 | follow-redirects (npm) | Debricked Unknown License, MIT |
CVE-2022-23541 | N/A | 6.3 | jsonwebtoken (npm) | MIT |
CVE-2019-10795 | 6.5 | 6.3 | undefsafe (npm) | MIT |
CVE-2023-28155 | N/A | 6.1 | request (npm) | Apache-2.0, Debricked Unknown License |
CVE-2020-28168 | 4.3 | 5.9 | axios (npm) | MIT |
CVE-2022-0536 | 4.3 | 5.9 | follow-redirects (npm) | Debricked Unknown License, MIT |
CVE-2020-15366 | 6.8 | 5.6 | ajv (npm) | MIT |
CVE-2019-2391 | 5.5 | 5.4 | bson (npm) | Apache-2.0, Debricked Unknown License |
CVE-2017-16137 | 5 | 5.3 | debug (npm) | Debricked Unknown License, MIT |
CVE-2021-29060 | 5 | 5.3 | color-string (npm) | Debricked Unknown License, MIT |
CVE-2020-28500 | 5 | 5.3 | lodash (npm) | MIT |
CVE-2021-23362 | 5 | 5.3 | hosted-git-info (npm) | ISC |
CVE-2022-33987 | 5 | 5.3 | got (npm) | MIT |
CVE-2020-7608 | 4.6 | 5.3 | yargs-parser (npm) | ISC |
CVE-2020-35149 | 5 | 5.3 | mquery (npm) | MIT |
debricked-124 | N/A | N/A | acorn (npm) | MIT |
debricked-149742 | N/A | N/A | @hapi/hoek (npm) | BSD-3-Clause |
debricked-97171 | N/A | N/A | npm-registry-fetch (npm) | ISC, MIT |
debricked-149739 | N/A | N/A | yargs-parser (npm) | ISC |
debricked-155741 | N/A | N/A | ini (npm) | Debricked Unknown License, ISC, MIT |
debricked-97165 | N/A | N/A | lodash (npm) | MIT |
If a dependency contains a vulnerability which has not been marked as unaffected
where CVSS is at least high (7.0-8.9)then fail pipeline
❌ The rule triggered for the following vulnerabilities, causing a pipeline failure. Manage rule
Vulnerability | CVSS2 | CVSS3 | Dependency | Dependency Licenses |
---|---|---|---|---|
CVE-2020-12265 | 7.5 | 9.8 | decompress (npm) | MIT |
CVE-2021-3918 | 7.5 | 9.8 | json-schema (npm) | BSD-3-Clause |
CVE-2023-3696 | N/A | 9.8 | mongoose (npm) | Debricked Unknown License, MIT |
CVE-2021-23383 | 7.5 | 9.8 | handlebars (npm) | Debricked Unknown License, MIT |
CVE-2021-23369 | 7.5 | 9.8 | handlebars (npm) | Debricked Unknown License, MIT |
CVE-2022-2564 | N/A | 9.8 | mongoose (npm) | Debricked Unknown License, MIT |
CVE-2020-28464 | 10 | 9.8 | djv (npm) | MIT |
CVE-2023-26136 | N/A | 9.8 | tough-cookie (npm) | BSD-3-Clause, CC0-1.0, MIT |
CVE-2020-7610 | 7.5 | 9.8 | bson (npm) | Apache-2.0, Debricked Unknown License |
CVE-2021-23438 | 7.5 | 9.8 | mpath (npm) | MIT |
CVE-2022-46175 | N/A | 8.8 | json5 (npm) | Debricked Unknown License, MIT |
CVE-2021-37713 | 4.4 | 8.6 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2021-37712 | 4.4 | 8.6 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2021-37701 | 4.4 | 8.6 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2021-32803 | 5.8 | 8.1 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2021-32804 | 5.8 | 8.1 | tar (npm) | BSD-2-Clause, Debricked Unknown License, ISC |
CVE-2022-23539 | N/A | 8.1 | jsonwebtoken (npm) | MIT |
CVE-2020-36604 | N/A | 8.1 | @hapi/hoek (npm) | BSD-3-Clause |
CVE-2021-43138 | 6.8 | 7.8 | async (npm) | MIT |
CVE-2022-23540 | N/A | 7.6 | jsonwebtoken (npm) | MIT |
CVE-2020-28469 | 5 | 7.5 | glob-parent (npm) | ISC |
CVE-2021-3749 | 7.8 | 7.5 | axios (npm) | MIT |
CVE-2022-31129 | 5 | 7.5 | moment (npm) | MIT |
CVE-2021-3807 | 7.8 | 7.5 | ansi-regex (npm) | MIT |
CVE-2021-33502 | 5 | 7.5 | normalize-url (npm) | MIT |
CVE-2023-26115 | N/A | 7.5 | word-wrap (npm) | MIT |
CVE-2022-3517 | N/A | 7.5 | minimatch (npm) | Debricked Unknown License, ISC, MIT |
CVE-2020-7768 | 5 | 7.5 | grpc (npm) | Apache-2.0, BSD-3-Clause |
CVE-2021-23343 | 5 | 7.5 | path-parse (npm) | MIT |
CVE-2022-24785 | 5 | 7.5 | moment (npm) | MIT |
CVE-2021-27290 | 4.3 | 7.5 | ssri (npm) | CC0-1.0, ISC |
CVE-2022-25881 | N/A | 7.5 | http-cache-semantics (npm) | BSD-2-Clause |
CVE-2022-24999 | N/A | 7.5 | qs (npm) | BSD-3-Clause, Debricked Unknown License, MIT |
CVE-2022-25883 | N/A | 7.5 | semver (npm) | BSD-2-Clause, Debricked Unknown License, ISC, MIT |
CVE-2020-8203 | 5.8 | 7.4 | lodash (npm) | MIT |
CVE-2020-7788 | 7.5 | 7.3 | ini (npm) | Debricked Unknown License, ISC, MIT |
CVE-2020-7774 | 7.5 | 7.3 | y18n (npm) | ISC |
CVE-2020-8116 | 7.5 | 7.3 | dot-prop (npm) | MIT |
CVE-2021-23337 | 6.5 | 7.2 | lodash (npm) | MIT |