-
Vulnerable Library - linting-tools-1.82.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Found in HEAD commit: 2cf23381656d682947cb6730e7e041838590c754
## …
-
Hello!
I hope you are doing well!
We are a security research team. Our tool automatically detected a vulnerability in this repository. We want to disclose it responsibly. GitHub has a feature called…
-
Hello!
I hope you are doing well!
We are a security research team. Our tool automatically detected a vulnerability in this repository. We want to disclose it responsibly. GitHub has a feature called…
-
Hello ActiveDriverDB developers,
We are a cybersecurity research group from the CISPA Helmholtz Center for Information Security and Ca’ Foscari University of Venice. We recently conducted an analys…
-
Hello!
I hope you are doing well!
We are a security research team. Our tool automatically detected a vulnerability in this repository. We want to disclose it responsibly. GitHub has a feature cal…
-
Hello!
I hope you are doing well!
We are a security research team. Our tool automatically detected a vulnerability in this repository. We want to disclose it responsibly. GitHub has a feature cal…
-
Hello maintainer(s),
I am a security researcher from the Institute of Application Security at TU Braunschweig, Germany. We discovered a (potential) security vulnerability in your project.
We wo…
-
### Problem Statement
> Many security researchers encounter situations where they are unable to report security vulnerabilities to organizations because there are no reporting channels to contact the…
-
So this is a touchy subject. There are a lot of strong feelings both ways about this. First, let's go back to the definition of an incident and breach in veris. An Incident is a security event that…
-
Hello!
I hope you are doing well!
We are a security research team. Our tool automatically detected a vulnerability in this repository. We want to disclose it responsibly. GitHub has a feature cal…