yurikrupnik / mussia7

mussia7 project
batman-ten.vercel.app
MIT License
0 stars 0 forks source link

[DepShield] (CVSS 7.5) Vulnerability due to usage of debug:2.6.9 #18

Open sonatype-depshield[bot] opened 3 years ago

sonatype-depshield[bot] commented 3 years ago

Vulnerabilities

DepShield reports that this application's usage of debug:2.6.9 results in the following vulnerability(s):


Occurrences

debug:2.6.9 is a transitive dependency introduced by the following direct dependency(s):

eslint-plugin-import:2.23.3         └─ eslint-import-resolver-node:0.3.4               └─ debug:2.6.9         └─ debug:2.6.9

nodemon-webpack-plugin:4.5.2         └─ nodemon:2.0.7               └─ undefsafe:2.0.3                     └─ debug:2.6.9

react-styleguidist:11.1.6         └─ react-dev-utils:11.0.4               └─ detect-port-alt:1.1.6                     └─ debug:2.6.9               └─ fork-ts-checker-webpack-plugin:4.1.6                     └─ micromatch:3.1.10                           └─ extglob:2.0.4                                 └─ expand-brackets:2.1.4                                       └─ debug:2.6.9                           └─ snapdragon:0.8.2                                 └─ debug:2.6.9         └─ webpack-dev-server:3.11.2               └─ compression:1.7.4                     └─ debug:2.6.9               └─ express:4.17.1                     └─ body-parser:1.19.0                           └─ debug:2.6.9                     └─ debug:2.6.9                     └─ finalhandler:1.1.2                           └─ debug:2.6.9                     └─ send:0.17.1                           └─ debug:2.6.9               └─ serve-index:1.9.1                     └─ debug:2.6.9

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

secure-code-warrior-for-github[bot] commented 3 years ago

Micro-Learning Topic: Uncontrolled Resource Consumption (CWE 400)

The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

Try this challenge in Secure Code Warrior