-
Notifications
You must be signed in to change notification settings - Fork 2
CVE-2024-27088 (Low) detected in es5-ext-0.10.62.tgz, es5-ext-0.10.53.tgz #481
Description
CVE-2024-27088 - Low Severity Vulnerability
Vulnerable Libraries - es5-ext-0.10.62.tgz, es5-ext-0.10.53.tgz
es5-ext-0.10.62.tgz
ECMAScript extensions and shims
Library home page: https://registry.npmjs.org/es5-ext/-/es5-ext-0.10.62.tgz
Path to dependency file: /apm/package.json
Path to vulnerable library: /apm/node_modules/es5-ext/package.json
Dependency Hierarchy:
- atom-package-manager-2.6.5.tgz (Root Library)
- first-mate-7.4.3.tgz
- emissary-1.3.3.tgz
- es6-weak-map-0.1.4.tgz
- ❌ es5-ext-0.10.62.tgz (Vulnerable Library)
- es6-weak-map-0.1.4.tgz
- emissary-1.3.3.tgz
- first-mate-7.4.3.tgz
es5-ext-0.10.53.tgz
ECMAScript extensions and shims
Library home page: https://registry.npmjs.org/es5-ext/-/es5-ext-0.10.53.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- property-accessors-1.1.3.tgz (Root Library)
- es6-weak-map-0.1.4.tgz
- ❌ es5-ext-0.10.53.tgz (Vulnerable Library)
- es6-weak-map-0.1.4.tgz
Found in HEAD commit: 808ed16784ca49c0e5810becefba198982d2916e
Found in base branch: electron-upgrade
Vulnerability Details
es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into function#copy or function#toStringTokens may cause the script to stall. The vulnerability is patched in v0.10.63.
Publish Date: 2024-02-26
URL: CVE-2024-27088
CVSS 3 Score Details (0.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-27088
Release Date: 2024-02-26
Fix Resolution: es5-ext - 0.10.63
Step up your Open Source Security Game with Mend here