Skip to content

Commit b89bb73

Browse files
committed
Update ranges
1 parent b7827b4 commit b89bb73

File tree

5 files changed

+155
-154
lines changed

5 files changed

+155
-154
lines changed

repository/jsrepository-master.json

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4874,10 +4874,7 @@
48744874
"vulnerabilities": [
48754875
{
48764876
"ranges": [
4877-
{
4878-
"atOrAbove": "0",
4879-
"below": "1.12.0"
4880-
}
4877+
{"atOrAbove":"1.0.0","below":"1.12.0"}
48814878
],
48824879
"summary": "## Summary\n\nWhen Axios runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response.\nThis path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`.",
48834880
"identifiers": {
@@ -6402,9 +6399,7 @@
64026399
"vulnerabilities": [
64036400
{
64046401
"ranges": [
6405-
{
6406-
"below": "4.17.11"
6407-
}
6402+
{"atOrAbove":"4.7.0","below":"4.17.11"}
64086403
],
64096404
"summary": "Regular Expression Denial of Service (ReDoS) in lodash",
64106405
"cwe": ["CWE-400"],
@@ -6559,9 +6554,7 @@
65596554
},
65606555
{
65616556
"ranges": [
6562-
{
6563-
"below": "4.17.21"
6564-
}
6557+
{"atOrAbove":"4.0.0","below":"4.17.21"}
65656558
],
65666559
"summary": "Regular Expression Denial of Service (ReDoS) in lodash",
65676560
"cwe": ["CWE-1333", "CWE-400"],

repository/jsrepository-v2.json

Lines changed: 38 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -6477,7 +6477,7 @@
64776477
]
64786478
},
64796479
{
6480-
"atOrAbove": "0",
6480+
"atOrAbove": "1.0.0",
64816481
"below": "1.12.0",
64826482
"severity": "high",
64836483
"cwe": [
@@ -8189,6 +8189,7 @@
81898189
]
81908190
},
81918191
{
8192+
"atOrAbove": "4.7.0",
81928193
"below": "4.17.11",
81938194
"cwe": [
81948195
"CWE-400"
@@ -8270,68 +8271,69 @@
82708271
{
82718272
"below": "4.17.21",
82728273
"cwe": [
8273-
"CWE-1333",
8274-
"CWE-400"
8274+
"CWE-77",
8275+
"CWE-94"
82758276
],
8276-
"severity": "medium",
8277+
"severity": "high",
82778278
"identifiers": {
8278-
"summary": "Regular Expression Denial of Service (ReDoS) in lodash",
8279+
"summary": "Command Injection in lodash",
82798280
"CVE": [
8280-
"CVE-2020-28500"
8281+
"CVE-2021-23337"
82818282
],
8282-
"githubID": "GHSA-29mw-wpgm-hmr9"
8283+
"githubID": "GHSA-35jh-r3h4-6jhm"
82838284
},
82848285
"info": [
8285-
"https://github.com/advisories/GHSA-29mw-wpgm-hmr9",
8286-
"https://nvd.nist.gov/vuln/detail/CVE-2020-28500",
8287-
"https://github.com/lodash/lodash/pull/5065",
8288-
"https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7",
8289-
"https://github.com/lodash/lodash/commit/c4847ebe7d14540bb28a8b932a9ce1b9ecbfee1a",
8286+
"https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
8287+
"https://nvd.nist.gov/vuln/detail/CVE-2021-23337",
8288+
"https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
82908289
"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
82918290
"https://github.com/lodash/lodash",
8292-
"https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8",
8291+
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851",
8292+
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851",
82938293
"https://security.netapp.com/advisory/ntap-20210312-0006/",
8294-
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896",
8295-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894",
8296-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892",
8297-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895",
8298-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893",
8299-
"https://snyk.io/vuln/SNYK-JS-LODASH-1018905",
8294+
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932",
8295+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930",
8296+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928",
8297+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931",
8298+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929",
8299+
"https://snyk.io/vuln/SNYK-JS-LODASH-1040724",
83008300
"https://www.oracle.com//security-alerts/cpujul2021.html",
83018301
"https://www.oracle.com/security-alerts/cpujan2022.html",
83028302
"https://www.oracle.com/security-alerts/cpujul2022.html",
83038303
"https://www.oracle.com/security-alerts/cpuoct2021.html"
83048304
]
83058305
},
83068306
{
8307+
"atOrAbove": "4.0.0",
83078308
"below": "4.17.21",
83088309
"cwe": [
8309-
"CWE-77",
8310-
"CWE-94"
8310+
"CWE-1333",
8311+
"CWE-400"
83118312
],
8312-
"severity": "high",
8313+
"severity": "medium",
83138314
"identifiers": {
8314-
"summary": "Command Injection in lodash",
8315+
"summary": "Regular Expression Denial of Service (ReDoS) in lodash",
83158316
"CVE": [
8316-
"CVE-2021-23337"
8317+
"CVE-2020-28500"
83178318
],
8318-
"githubID": "GHSA-35jh-r3h4-6jhm"
8319+
"githubID": "GHSA-29mw-wpgm-hmr9"
83198320
},
83208321
"info": [
8321-
"https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
8322-
"https://nvd.nist.gov/vuln/detail/CVE-2021-23337",
8323-
"https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
8322+
"https://github.com/advisories/GHSA-29mw-wpgm-hmr9",
8323+
"https://nvd.nist.gov/vuln/detail/CVE-2020-28500",
8324+
"https://github.com/lodash/lodash/pull/5065",
8325+
"https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7",
8326+
"https://github.com/lodash/lodash/commit/c4847ebe7d14540bb28a8b932a9ce1b9ecbfee1a",
83248327
"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
83258328
"https://github.com/lodash/lodash",
8326-
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851",
8327-
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851",
8329+
"https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8",
83288330
"https://security.netapp.com/advisory/ntap-20210312-0006/",
8329-
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932",
8330-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930",
8331-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928",
8332-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931",
8333-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929",
8334-
"https://snyk.io/vuln/SNYK-JS-LODASH-1040724",
8331+
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896",
8332+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894",
8333+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892",
8334+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895",
8335+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893",
8336+
"https://snyk.io/vuln/SNYK-JS-LODASH-1018905",
83358337
"https://www.oracle.com//security-alerts/cpujul2021.html",
83368338
"https://www.oracle.com/security-alerts/cpujan2022.html",
83378339
"https://www.oracle.com/security-alerts/cpujul2022.html",

repository/jsrepository-v3.json

Lines changed: 38 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -6623,7 +6623,7 @@
66236623
]
66246624
},
66256625
{
6626-
"atOrAbove": "0",
6626+
"atOrAbove": "1.0.0",
66276627
"below": "1.12.0",
66286628
"severity": "high",
66296629
"cwe": [
@@ -8375,6 +8375,7 @@
83758375
]
83768376
},
83778377
{
8378+
"atOrAbove": "4.7.0",
83788379
"below": "4.17.11",
83798380
"cwe": [
83808381
"CWE-400"
@@ -8456,68 +8457,69 @@
84568457
{
84578458
"below": "4.17.21",
84588459
"cwe": [
8459-
"CWE-1333",
8460-
"CWE-400"
8460+
"CWE-77",
8461+
"CWE-94"
84618462
],
8462-
"severity": "medium",
8463+
"severity": "high",
84638464
"identifiers": {
8464-
"summary": "Regular Expression Denial of Service (ReDoS) in lodash",
8465+
"summary": "Command Injection in lodash",
84658466
"CVE": [
8466-
"CVE-2020-28500"
8467+
"CVE-2021-23337"
84678468
],
8468-
"githubID": "GHSA-29mw-wpgm-hmr9"
8469+
"githubID": "GHSA-35jh-r3h4-6jhm"
84698470
},
84708471
"info": [
8471-
"https://github.com/advisories/GHSA-29mw-wpgm-hmr9",
8472-
"https://nvd.nist.gov/vuln/detail/CVE-2020-28500",
8473-
"https://github.com/lodash/lodash/pull/5065",
8474-
"https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7",
8475-
"https://github.com/lodash/lodash/commit/c4847ebe7d14540bb28a8b932a9ce1b9ecbfee1a",
8472+
"https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
8473+
"https://nvd.nist.gov/vuln/detail/CVE-2021-23337",
8474+
"https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
84768475
"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
84778476
"https://github.com/lodash/lodash",
8478-
"https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8",
8477+
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851",
8478+
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851",
84798479
"https://security.netapp.com/advisory/ntap-20210312-0006/",
8480-
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896",
8481-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894",
8482-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892",
8483-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895",
8484-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893",
8485-
"https://snyk.io/vuln/SNYK-JS-LODASH-1018905",
8480+
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932",
8481+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930",
8482+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928",
8483+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931",
8484+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929",
8485+
"https://snyk.io/vuln/SNYK-JS-LODASH-1040724",
84868486
"https://www.oracle.com//security-alerts/cpujul2021.html",
84878487
"https://www.oracle.com/security-alerts/cpujan2022.html",
84888488
"https://www.oracle.com/security-alerts/cpujul2022.html",
84898489
"https://www.oracle.com/security-alerts/cpuoct2021.html"
84908490
]
84918491
},
84928492
{
8493+
"atOrAbove": "4.0.0",
84938494
"below": "4.17.21",
84948495
"cwe": [
8495-
"CWE-77",
8496-
"CWE-94"
8496+
"CWE-1333",
8497+
"CWE-400"
84978498
],
8498-
"severity": "high",
8499+
"severity": "medium",
84998500
"identifiers": {
8500-
"summary": "Command Injection in lodash",
8501+
"summary": "Regular Expression Denial of Service (ReDoS) in lodash",
85018502
"CVE": [
8502-
"CVE-2021-23337"
8503+
"CVE-2020-28500"
85038504
],
8504-
"githubID": "GHSA-35jh-r3h4-6jhm"
8505+
"githubID": "GHSA-29mw-wpgm-hmr9"
85058506
},
85068507
"info": [
8507-
"https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
8508-
"https://nvd.nist.gov/vuln/detail/CVE-2021-23337",
8509-
"https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
8508+
"https://github.com/advisories/GHSA-29mw-wpgm-hmr9",
8509+
"https://nvd.nist.gov/vuln/detail/CVE-2020-28500",
8510+
"https://github.com/lodash/lodash/pull/5065",
8511+
"https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7",
8512+
"https://github.com/lodash/lodash/commit/c4847ebe7d14540bb28a8b932a9ce1b9ecbfee1a",
85108513
"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
85118514
"https://github.com/lodash/lodash",
8512-
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851",
8513-
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851",
8515+
"https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8",
85148516
"https://security.netapp.com/advisory/ntap-20210312-0006/",
8515-
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932",
8516-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930",
8517-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928",
8518-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931",
8519-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929",
8520-
"https://snyk.io/vuln/SNYK-JS-LODASH-1040724",
8517+
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896",
8518+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894",
8519+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892",
8520+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895",
8521+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893",
8522+
"https://snyk.io/vuln/SNYK-JS-LODASH-1018905",
85218523
"https://www.oracle.com//security-alerts/cpujul2021.html",
85228524
"https://www.oracle.com/security-alerts/cpujan2022.html",
85238525
"https://www.oracle.com/security-alerts/cpujul2022.html",

repository/jsrepository-v4.json

Lines changed: 38 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -6622,7 +6622,7 @@
66226622
]
66236623
},
66246624
{
6625-
"atOrAbove": "0",
6625+
"atOrAbove": "1.0.0",
66266626
"below": "1.12.0",
66276627
"severity": "high",
66286628
"cwe": [
@@ -8374,6 +8374,7 @@
83748374
]
83758375
},
83768376
{
8377+
"atOrAbove": "4.7.0",
83778378
"below": "4.17.11",
83788379
"cwe": [
83798380
"CWE-400"
@@ -8455,68 +8456,69 @@
84558456
{
84568457
"below": "4.17.21",
84578458
"cwe": [
8458-
"CWE-1333",
8459-
"CWE-400"
8459+
"CWE-77",
8460+
"CWE-94"
84608461
],
8461-
"severity": "medium",
8462+
"severity": "high",
84628463
"identifiers": {
8463-
"summary": "Regular Expression Denial of Service (ReDoS) in lodash",
8464+
"summary": "Command Injection in lodash",
84648465
"CVE": [
8465-
"CVE-2020-28500"
8466+
"CVE-2021-23337"
84668467
],
8467-
"githubID": "GHSA-29mw-wpgm-hmr9"
8468+
"githubID": "GHSA-35jh-r3h4-6jhm"
84688469
},
84698470
"info": [
8470-
"https://github.com/advisories/GHSA-29mw-wpgm-hmr9",
8471-
"https://nvd.nist.gov/vuln/detail/CVE-2020-28500",
8472-
"https://github.com/lodash/lodash/pull/5065",
8473-
"https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7",
8474-
"https://github.com/lodash/lodash/commit/c4847ebe7d14540bb28a8b932a9ce1b9ecbfee1a",
8471+
"https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
8472+
"https://nvd.nist.gov/vuln/detail/CVE-2021-23337",
8473+
"https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
84758474
"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
84768475
"https://github.com/lodash/lodash",
8477-
"https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8",
8476+
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851",
8477+
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851",
84788478
"https://security.netapp.com/advisory/ntap-20210312-0006/",
8479-
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896",
8480-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894",
8481-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892",
8482-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895",
8483-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893",
8484-
"https://snyk.io/vuln/SNYK-JS-LODASH-1018905",
8479+
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932",
8480+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930",
8481+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928",
8482+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931",
8483+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929",
8484+
"https://snyk.io/vuln/SNYK-JS-LODASH-1040724",
84858485
"https://www.oracle.com//security-alerts/cpujul2021.html",
84868486
"https://www.oracle.com/security-alerts/cpujan2022.html",
84878487
"https://www.oracle.com/security-alerts/cpujul2022.html",
84888488
"https://www.oracle.com/security-alerts/cpuoct2021.html"
84898489
]
84908490
},
84918491
{
8492+
"atOrAbove": "4.0.0",
84928493
"below": "4.17.21",
84938494
"cwe": [
8494-
"CWE-77",
8495-
"CWE-94"
8495+
"CWE-1333",
8496+
"CWE-400"
84968497
],
8497-
"severity": "high",
8498+
"severity": "medium",
84988499
"identifiers": {
8499-
"summary": "Command Injection in lodash",
8500+
"summary": "Regular Expression Denial of Service (ReDoS) in lodash",
85008501
"CVE": [
8501-
"CVE-2021-23337"
8502+
"CVE-2020-28500"
85028503
],
8503-
"githubID": "GHSA-35jh-r3h4-6jhm"
8504+
"githubID": "GHSA-29mw-wpgm-hmr9"
85048505
},
85058506
"info": [
8506-
"https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
8507-
"https://nvd.nist.gov/vuln/detail/CVE-2021-23337",
8508-
"https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
8507+
"https://github.com/advisories/GHSA-29mw-wpgm-hmr9",
8508+
"https://nvd.nist.gov/vuln/detail/CVE-2020-28500",
8509+
"https://github.com/lodash/lodash/pull/5065",
8510+
"https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7",
8511+
"https://github.com/lodash/lodash/commit/c4847ebe7d14540bb28a8b932a9ce1b9ecbfee1a",
85098512
"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
85108513
"https://github.com/lodash/lodash",
8511-
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851",
8512-
"https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851",
8514+
"https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8",
85138515
"https://security.netapp.com/advisory/ntap-20210312-0006/",
8514-
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932",
8515-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930",
8516-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928",
8517-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931",
8518-
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929",
8519-
"https://snyk.io/vuln/SNYK-JS-LODASH-1040724",
8516+
"https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896",
8517+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894",
8518+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892",
8519+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895",
8520+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893",
8521+
"https://snyk.io/vuln/SNYK-JS-LODASH-1018905",
85208522
"https://www.oracle.com//security-alerts/cpujul2021.html",
85218523
"https://www.oracle.com/security-alerts/cpujan2022.html",
85228524
"https://www.oracle.com/security-alerts/cpujul2022.html",

0 commit comments

Comments
 (0)