You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This package has been identified by Mend as containing potential malicious functionality. The severity of the functionality can change depending on where the library is running (user's machine or backend server). The following risks were identified: Protestware – this package contains code that differs from the stated functionality. This can be as simple as opening a web URL to protest or, in some cases could, delete files.
mend-for-github-combot
changed the title
event-source-polyfill-1.0.26.tgz: 1 vulnerabilities (highest severity is: 5.3)
event-source-polyfill-1.0.26.tgz: 1 vulnerabilities (highest severity is: 5.3) unreachable
Aug 7, 2024
A polyfill for http://www.w3.org/TR/eventsource/
Library home page: https://registry.npmjs.org/event-source-polyfill/-/event-source-polyfill-1.0.26.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/event-source-polyfill/package.json
Found in HEAD commit: 2ff65424c48b6f26c40b741a18dfe5db8d9c8841
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - event-source-polyfill-1.0.26.tgz
A polyfill for http://www.w3.org/TR/eventsource/
Library home page: https://registry.npmjs.org/event-source-polyfill/-/event-source-polyfill-1.0.26.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/event-source-polyfill/package.json
Dependency Hierarchy:
Found in HEAD commit: 2ff65424c48b6f26c40b741a18dfe5db8d9c8841
Found in base branch: main
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
This package has been identified by Mend as containing potential malicious functionality. The severity of the functionality can change depending on where the library is running (user's machine or backend server). The following risks were identified: Protestware – this package contains code that differs from the stated functionality. This can be as simple as opening a web URL to protest or, in some cases could, delete files.
Publish Date: 2022-06-29
URL: MSC-2022-1557
Threat Assessment
Exploit Maturity: High
EPSS:
CVSS 3 Score Details (5.3)
Base Score Metrics:
The text was updated successfully, but these errors were encountered: