Looking for the vulnerability index of Invicti's legacy products?
Vulnerable package dependencies [high] - Vulnerability Database

Vulnerable package dependencies [high]

Description

Your web application contains one or more third-party package dependencies with known security vulnerabilities rated as high severity. These vulnerabilities have been publicly disclosed and may be actively exploited by attackers. Each affected package is listed in the details section with specific CVE identifiers, CVSS scores, and vulnerability descriptions.

Remediation

Take the following steps to remediate vulnerable package dependencies:

1. Review Vulnerable Packages: Examine each package listed in the details section and verify it is actually used by your application (not just present in the dependency tree).

2. Update to Patched Versions: For each vulnerable package, upgrade to the latest secure version that addresses the CVE. Update your package manifest file (e.g., package.json, requirements.txt, pom.xml) with the fixed version numbers.

3. Test After Updates: Run your application's test suite to ensure compatibility with updated packages. Verify that functionality remains intact after dependency updates.

4. Handle Packages Without Fixes: If no patched version exists:
• Check if alternative packages provide similar functionality
• Contact the package maintainer to request a security fix
• Implement compensating controls or input validation to mitigate the vulnerability
• Consider removing the package if it's not critical to your application

5. Automate Dependency Scanning: Integrate software composition analysis (SCA) tools into your CI/CD pipeline to detect vulnerable dependencies before deployment.

6. Maintain a Software Bill of Materials (SBOM): Document all third-party dependencies to facilitate ongoing vulnerability management and incident response.