You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Users of flow-coverage-report have Inefficient Regular Expression Complexity "vulnerability" CVE-2021-3803 via transitive dependency badge-up / [email protected] / css-select / [email protected]. Upgrading to latest svgo links a non-vulnerable version of nth-check.
One trouble is yahoo/badge-up#21 isn't merging. We could pull it into your fork in rpl/badge-up#1 and then upgrade the fork version here.
The text was updated successfully, but these errors were encountered:
We're part of a startup called Seal Security that mitigates software vulnerabilities in older open source versions by backporting/creating standalone security patches - enabling more straightforward remediation in cases like this. We created an nth-check 1.02-sp1 that's vulnerability-free. As with all of our patches, it's open-source and available for free.
If relevant, check out our GitHub repo if you wish to learn more, or start using our app.
Please feel free to reach us at [email protected] if you have any requests/questions.
Users of flow-coverage-report have Inefficient Regular Expression Complexity "vulnerability" CVE-2021-3803 via transitive dependency
badge-up / [email protected] / css-select / [email protected]
. Upgrading to latest svgo links a non-vulnerable version of nth-check.One trouble is yahoo/badge-up#21 isn't merging. We could pull it into your fork in rpl/badge-up#1 and then upgrade the fork version here.
The text was updated successfully, but these errors were encountered: