You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mend-for-github-combot
changed the title
CVE-2022-48285 (Medium) detected in jszip-2.5.0.tgz
CVE-2022-48285 (High) detected in jszip-2.5.0.tgz
Feb 3, 2023
mend-for-github-combot
changed the title
CVE-2022-48285 (High) detected in jszip-2.5.0.tgz
CVE-2022-48285 (High) detected in jszip-2.5.0.tgz - autoclosed
May 4, 2024
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
mend-for-github-combot
changed the title
CVE-2022-48285 (High) detected in jszip-2.5.0.tgz - autoclosed
CVE-2022-48285 (High) detected in jszip-2.5.0.tgz
May 4, 2024
CVE-2022-48285 - High Severity Vulnerability
Create, read and edit .zip files with Javascript http://stuartk.com/jszip
Library home page: https://registry.npmjs.org/jszip/-/jszip-2.5.0.tgz
Path to dependency file: /assets/wmt/reveal/package.json
Path to vulnerable library: /assets/wmt/reveal/node_modules/jszip/package.json
Dependency Hierarchy:
Found in HEAD commit: e18fd672daa5561842258223a173ced78ea399b2
Found in base branch: master
loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.
Mend Note: Converted from WS-2023-0004, on 2023-02-01.
Publish Date: 2023-01-29
URL: CVE-2022-48285
Base Score Metrics:
Type: Upgrade version
Release Date: 2023-01-29
Fix Resolution: jszip - 3.8.0
The text was updated successfully, but these errors were encountered: