You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mend-for-github-combot
changed the title
buefy-0.6.6.tgz: 1 vulnerabilities (highest severity is: 6.1)
buefy-0.6.6.tgz: 1 vulnerabilities (highest severity is: 6.1) reachable
Jan 22, 2025
Vulnerable Library - buefy-0.6.6.tgz
Lightweight UI components for Vue.js based on Bulma
Library home page: https://registry.npmjs.org/buefy/-/buefy-0.6.6.tgz
Path to dependency file: /applications/gui/package.json
Path to vulnerable library: /applications/gui/node_modules/buefy/package.json
Found in HEAD commit: 4e5656db54be4b22481fe3774c2caeba51bac190
Vulnerabilities
Reachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2019-0256
Vulnerable Library - buefy-0.6.6.tgz
Lightweight UI components for Vue.js based on Bulma
Library home page: https://registry.npmjs.org/buefy/-/buefy-0.6.6.tgz
Path to dependency file: /applications/gui/package.json
Path to vulnerable library: /applications/gui/node_modules/buefy/package.json
Dependency Hierarchy:
Found in HEAD commit: 4e5656db54be4b22481fe3774c2caeba51bac190
Found in base branch: main
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
In buefy, versions prior to 0.7.2 are vulnerable to Cross-Site Scripting when the autocomplete list renders user input as HTML without encoding.
Publish Date: 2019-09-11
URL: WS-2019-0256
Threat Assessment
Exploit Maturity: Not Defined
EPSS:
CVSS 3 Score Details (6.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/747
Release Date: 2019-09-11
Fix Resolution: 0.7.2
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: