Looking for the vulnerability index of Invicti's legacy products?
Vulnerable package dependencies [low] - Vulnerability Database

Vulnerable package dependencies [low]

Description

Your web application depends on one or more third-party packages that contain known security vulnerabilities with low severity ratings. These vulnerabilities have been publicly disclosed and documented in security databases. While classified as low severity, they still represent potential security weaknesses that should be addressed as part of a comprehensive security posture.

Remediation

Follow these steps to remediate vulnerable package dependencies:

1. Review the details section to identify each vulnerable package, its current version, associated CVE identifiers, and available fixes.
2. Update vulnerable packages to the latest patched versions using your package manager (e.g., npm update, pip install --upgrade, composer update).
3. Test thoroughly after updating to ensure compatibility and that no functionality breaks.
4. If no fix is available: Evaluate whether the vulnerable functionality is actually used in your application. Consider replacing the package with a secure alternative, implementing compensating controls, or contacting the package maintainer to request a security patch.
5. Implement ongoing monitoring using software composition analysis (SCA) tools to detect new vulnerabilities in your dependencies as they are disclosed.