Open mend-for-github-com[bot] opened 3 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
:information_source: This issue was automatically re-opened by WhiteSource because the vulnerable library in the specific branch(es) has been detected in the WhiteSource inventory.
WS-2019-0063 - High Severity Vulnerability
JavaScript YAML parser and dumper. Very fast.
Library home page: https://github.com/nodeca/js-yaml.git
Found in HEAD commit: c92f0918f68b35842a2bf5ae212e5d75e70546e5
Found in base branch: gh-pages
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
Publish Date: 2019-04-05
URL: WS-2019-0063
Base Score Metrics not available
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/813
Release Date: 2019-04-05
Fix Resolution: js-yaml - 3.13.1