WS-2018-0211 (Critical) detected in flatmap-stream-0.1.1.tgz, event-stream-3.3.6.tgz - autoclosed #191
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
WS-2018-0211 - Critical Severity Vulnerability
Vulnerable Libraries - flatmap-stream-0.1.1.tgz, event-stream-3.3.6.tgz
flatmap-stream-0.1.1.tgz
UNMAINTAINED
Library home page: https://registry.npmjs.org/flatmap-stream/-/flatmap-stream-0.1.1.tgz
Path to dependency file: /npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/package.json
Path to vulnerable library: /npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/node_modules/flatmap-stream
Dependency Hierarchy:
event-stream-3.3.6.tgz
construct pipes of streams of events
Library home page: https://registry.npmjs.org/event-stream/-/event-stream-3.3.6.tgz
Path to dependency file: /npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/package.json
Path to vulnerable library: /npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/node_modules/event-stream
Dependency Hierarchy:
Found in HEAD commit: ba8cd9078c8ce0cb202767d627706711237abf71
Found in base branch: main
Vulnerability Details
Malicious code in event-stream, the ownership \event-stream\ node_module was transferred
Publish Date: 2018-11-28
URL: WS-2018-0211
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/WS-2018-0211
Release Date: 2018-11-28
Fix Resolution: event-stream - 4.0.0
The text was updated successfully, but these errors were encountered: