Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: github issues

Project: zmsstatistic

Scan Information (show all):

Summary

Summary of Vulnerable Dependencies (click to show all)

Dependency Vulnerability IDs Package Highest Severity CVE Count Confidence Evidence Count
.eslintrc.js   0 0
@babel/runtime:7.26.0 pkg:npm/%40babel%2Fruntime@7.26.0 MEDIUM 1 3
@parcel/reporter-dev-server:2.16.3 pkg:npm/%40parcel%2Freporter-dev-server@2.16.3 MEDIUM 1 3
ConfigForm.js   0 0
bar.js   0 0
baseview.js   0 0
bindHandler.js   0 0
bluescreen.js   0 0
bootstrap.bundle.min.js   0 0
brace-expansion:1.1.11 pkg:npm/brace-expansion@1.1.11 LOW 1 3
d.js   0 0
d3.min.js   0 0
dialogHandler.js   0 0
dumper.js   0 0
eslint.config.js   0 0
exceptionHandler.js   0 0
file.js   0 0
helpers.js   0 0
index.js   0 0
index.js   0 0
index.js   0 0
index.js   0 0
jquery.min.js   0 0
nv.d3.min.js   0 0
open-editor.js   0 0
settings.js   0 0
statistic.js   0 0
table-sort.js   0 0
tabs.js   0 0
toggle.js   0 0
utils.js   0 0
vendor.js pkg:javascript/moment.js@2.19.4 HIGH 2 3

Dependencies (vulnerable)

.eslintrc.js

File Path: /github/workspace/zmsstatistic/.eslintrc.js
MD5: 89ceb9008403b6afe2fa1071ca96a6f9
SHA1: 6e33b3de6f64251f79c0498f097ab814ffca5043
SHA256:96e13d424c49a03e03db93ee876b869728f7fda2a1a7085f3436ef35832708c6

Identifiers

  • None

@babel/runtime:7.26.0

File Path: /github/workspace/zmsstatistic/package-lock.json?@babel/runtime

Referenced In Project/Scope: package-lock.json: transitive

Identifiers

  • pkg:npm/%40babel%2Fruntime@7.26.0   (Confidence:Highest)

GHSA-968p-4wvh-cqc8 (NPM)  

### Impact

When using Babel to compile [regular expression named capturing groups](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions/Named_capturing_group), Babel will generate a polyfill for the `.replace` method that has quadratic complexity on some specific replacement pattern strings (i.e. the second argument passed to `.replace`).

Your generated code is vulnerable if _all_ the following conditions are true:
- You use Babel to compile [regular expression named capturing groups](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions/Named_capturing_group)
- You use the `.replace` method on a regular expression that contains named capturing groups
- **Your code uses untrusted strings as the second argument of `.replace`**

If you are using `@babel/preset-env` with the [`targets`](https://babeljs.io/docs/options#targets) option, the transform that injects the vulnerable code is automatically enabled if:
- you use [_duplicated_ named capturing groups](https://github.com/tc39/proposal-duplicate-named-capturing-groups), and target any browser older than Chrome/Edge 126, Opera 112, Firefox 129, Safari 17.4, or Node.js 23
- you use any [named capturing groups](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions/Named_capturing_group), and target any browser older than Chrome 64, Opera 71, Edge 79, Firefox 78, Safari 11.1, or Node.js 10

You can verify what transforms `@babel/preset-env` is using by enabling the [`debug` option](https://babeljs.io/docs/babel-preset-env#debug).


### Patches

This problem has been fixed in `@babel/helpers` and `@babel/runtime` 7.26.10 and 8.0.0-alpha.17, please upgrade. It's likely that you do not directly depend on `@babel/helpers`, and instead you depend on `@babel/core` (which itself depends on `@babel/helpers`). Upgrading to `@babel/core` 7.26.10 is not required, but it guarantees that you are on a new enough `@babel/helpers` version.

Please note that just updating your Babel dependencies is not enough: you will also need to re-compile your code.

### Workarounds

If you are passing user-provided strings as the second argument of `.replace` on regular expressions that contain named capturing groups, validate the input and make sure it does not contain the substring `$<` if it's then not followed by `>` (possibly with other characters in between).

### References

This vulnerability was reported and fixed in https://github.com/babel/babel/pull/17173.
CWE-1333 Inefficient Regular Expression Complexity

CVSSv3:
  • Base Score: MEDIUM (6.199999809265137)
  • Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unscored:
  • Severity: moderate

References:

Vulnerable Software & Versions (NPM):

  • cpe:2.3:a:*:\@babel\/runtime:\<7.26.10:*:*:*:*:*:*:*

@parcel/reporter-dev-server:2.16.3

File Path: /github/workspace/zmsstatistic/package-lock.json?@parcel/reporter-dev-server

Referenced In Project/Scope: package-lock.json: transitive

Identifiers

  • pkg:npm/%40parcel%2Freporter-dev-server@2.16.3   (Confidence:Highest)

GHSA-qm9p-f9j5-w83w (NPM)  

parcel versions 1.6.1 and above have an Origin Validation Error vulnerability. Malicious websites can send XMLHTTPRequests to the application's development server and read the response to steal source code when developers visit them.
CWE-346 Origin Validation Error

CVSSv3:
  • Base Score: MEDIUM (6.5)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Unscored:
  • Severity: moderate

References:

Vulnerable Software & Versions (NPM):

  • cpe:2.3:a:*:\@parcel\/reporter-dev-server:\>\=1.6.1\<\=2.16.3:*:*:*:*:*:*:*

ConfigForm.js

File Path: /github/workspace/zmsstatistic/vendor/ezyang/htmlpurifier/library/HTMLPurifier/Printer/ConfigForm.js
MD5: ee5990d6bb62017463a7a8d72c8288b5
SHA1: fea8a3b01a8ca8c6e650eb27f98274c5dbaa9db9
SHA256:aef2d12317af2e659e9c782c04f71ae23b17fecb2516b3605af5d2f81cedc003

Identifiers

  • None

bar.js

File Path: /github/workspace/zmsstatistic/vendor/tracy/tracy/src/Tracy/Bar/assets/bar.js
MD5: 2a9b73064834f21ea5a9894c9521c38b
SHA1: f5f666c069b61694a0293cc2d2b9b1c228c9ab51
SHA256:94546cd6dce28e555f30405bce897655b4146076f76f86a0a43e6831b6ae2d45

Identifiers

  • None

baseview.js

File Path: /github/workspace/zmsstatistic/js/lib/baseview.js
MD5: 3ba8e15b32566bb9111af120810258d4
SHA1: 1db7c8b17bdf28fe7379606781bb8ce1764cf70d
SHA256:ac468ca36b8c82e887d9db344374d0a0c3c8ef079041b245c4d1c2d9d6a62e73

Identifiers

  • None

bindHandler.js

File Path: /github/workspace/zmsstatistic/js/lib/bindHandler.js
MD5: 02da9fbcce9021bb27d94cbc5d1c3e7b
SHA1: 9b8083272a4b682498f5e5e396fef74f35073e7e
SHA256:cb011db8f35a155950539f68dca786e81dac335911bfa9182404e5ef5da5c0c3

Identifiers

  • None

bluescreen.js

File Path: /github/workspace/zmsstatistic/vendor/tracy/tracy/src/Tracy/BlueScreen/assets/bluescreen.js
MD5: 0f129e65454877880fc2954c4a461f57
SHA1: 56da74e26355080009a5545acaf8e93b37b3ecfb
SHA256:087de1ff1cbedf322cc38208f21ee48a4213018b49b25adc788d15ffe0cb0b10

Identifiers

  • None

bootstrap.bundle.min.js

File Path: /github/workspace/zmsstatistic/vendor/phpunit/php-code-coverage/src/Report/Html/Renderer/Template/js/bootstrap.bundle.min.js
MD5: 43629cbd1e4634150e99b74d2c35a725
SHA1: c7827462c3ce7eacd5d4fbc975f6fd572b047778
SHA256:cb789b7cec81aa580177e1b3c0561011539974d243d3a1de0d78a1a278015cab

Identifiers

  • None

brace-expansion:1.1.11

File Path: /github/workspace/zmsstatistic/package-lock.json?brace-expansion

Referenced In Project/Scope: package-lock.json: transitive

Identifiers

  • pkg:npm/brace-expansion@1.1.11   (Confidence:Highest)

GHSA-v6h2-p8h4-qcjw (NPM)  

A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is `a5b98a4f30d7813266b221435e1eaaf25a1b0ac5`. It is recommended to upgrade the affected component.
CWE-400 Uncontrolled Resource Consumption

CVSSv3:
  • Base Score: LOW (3.0999999046325684)
  • Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Unscored:
  • Severity: low

References:

Vulnerable Software & Versions (NPM):

  • cpe:2.3:a:*:brace-expansion:\>\=1.0.0\<\=1.1.11:*:*:*:*:*:*:*

d.js

File Path: /github/workspace/zmsstatistic/vendor/aronduby/dump/src/D/resources/d.js
MD5: 30b19c3d953860cf9b890550ad398793
SHA1: 5a5b9c9d5d19497711bf1ea6ce381a632b917f6d
SHA256:92988e463e37017bc3528f002a7be97809dcdc3fece18e1635b1f41f7178f278

Identifiers

  • None

d3.min.js

File Path: /github/workspace/zmsstatistic/vendor/phpunit/php-code-coverage/src/Report/Html/Renderer/Template/js/d3.min.js
MD5: 5bc245068b1b70d4c3eaef79045023e4
SHA1: 4cb68b0a6a11e6d7cf8f3712ab65a783fb49ea6c
SHA256:76c39718d1c0a3fb321676b3b7e29306c0907919a5716d5728bd1b08ae0169e7

Identifiers

  • None

dialogHandler.js

File Path: /github/workspace/zmsstatistic/js/lib/dialogHandler.js
MD5: 0b73ab77e027e4f15080a5d830eb389d
SHA1: 15909a7af52c7afe1c0792a9fdd1a5e3c0cd765d
SHA256:2fb6d65f1e11ff51b5d625623fdd64eb2b57cbebbea2579e44bee933bad9d40c

Identifiers

  • None

dumper.js

File Path: /github/workspace/zmsstatistic/vendor/tracy/tracy/src/Tracy/Dumper/assets/dumper.js
MD5: a1a10099927de11cddeac3f5e6f06496
SHA1: 8ece5f95fd921ff4774b7d879c2bf2fbfc4be8f5
SHA256:e76c473df57087ed36916bd6316bcb334e0f47ce9fdaefe433302c170d228f98

Identifiers

  • None

eslint.config.js

File Path: /github/workspace/zmsstatistic/vendor/tracy/tracy/eslint.config.js
MD5: 59b634b302dcd0b63ba01abbce9b95cc
SHA1: f0e34727345c321c9360d3c01ae24179d5a6cccf
SHA256:c1f89b20da818738089c388a7bb7633d6ec61204471311852bc3ef475529067d

Identifiers

  • None

exceptionHandler.js

File Path: /github/workspace/zmsstatistic/js/lib/exceptionHandler.js
MD5: f401905c468a3104afec940da5ae1b10
SHA1: afd82f26aae7d75ad3cb656888c83c5d6ef0387c
SHA256:e168d3edfb8665c18ecdfca12affdd18509082472ae0c74156fc3ae797e7825d

Identifiers

  • None

file.js

File Path: /github/workspace/zmsstatistic/vendor/phpunit/php-code-coverage/src/Report/Html/Renderer/Template/js/file.js
MD5: 3ffd21f16409adb49997d108bdf7a05a
SHA1: f8be112d2b017baa111e385886e3cd6d447e7f33
SHA256:2741fcd58f71ff97eefc006b8d74154da084723753b5d6947fd53d9543317316

Identifiers

  • None

helpers.js

File Path: /github/workspace/zmsstatistic/vendor/tracy/tracy/src/Tracy/assets/helpers.js
MD5: 22291596fcf46576fbf952f4ff6ec362
SHA1: 6e3f850f5951b252173cf4c0f41ad2e32ed11939
SHA256:db550de99ec013d1c08805a2d76c4c5d982e96ad84f07e4363296673df53e5a5

Identifiers

  • None

index.js

File Path: /github/workspace/zmsstatistic/js/block/periodlist/index.js
MD5: 934dc644b24f93a6b1ebb1a6dd9f8f86
SHA1: 8c63ee4f83dad9420776240e3fc98728251c66c6
SHA256:2d210c0841bff0464a1752e0a0a66faea5a900ac50f1b567c3047f9ad0434b5a

Identifiers

  • None

index.js

File Path: /github/workspace/zmsstatistic/js/block/reportfilter/index.js
MD5: 0b26b0b1599232e0479594386cc36b5d
SHA1: 7e9ae9c41ef87d1bdfad7800fa7124af426a71d3
SHA256:8fbf857a58931f71904f1d4b75f7c3a074feec786dc38704c86c285cc6e2bf27

Identifiers

  • None

index.js

File Path: /github/workspace/zmsstatistic/js/block/warehousereport/index.js
MD5: 99784cfa281c7357d51ce0325d3bc457
SHA1: 0cb38927d7d6d6cc3194cacd73a56e081a316d81
SHA256:d7e7292c28fc6b8794758f14c428a30b84d329150a36227fbb457b2c0bbbbb83

Identifiers

  • None

index.js

File Path: /github/workspace/zmsstatistic/js/index.js
MD5: 3b8960f734f1e6ab52e0a847ecd64c64
SHA1: 02d134bc01cbaf74ef3ed0b7fe1b35f07b422867
SHA256:60a2d50434e05b641dccee4f36627050d317fbcc6a756b69e66f579df9feafa7

Identifiers

  • None

jquery.min.js

File Path: /github/workspace/zmsstatistic/vendor/phpunit/php-code-coverage/src/Report/Html/Renderer/Template/js/jquery.min.js
MD5: c9771cc3e90e18f5336eedbd0fffb2cf
SHA1: 6ee8aaa3ac1f4e0ae18717a3fd26892e9f0e4cc5
SHA256:3e7501d15c3630e791c8b20392eb9dee31a9f65ce3efdde76cef5c710141ab24

Identifiers

  • None

nv.d3.min.js

File Path: /github/workspace/zmsstatistic/vendor/phpunit/php-code-coverage/src/Report/Html/Renderer/Template/js/nv.d3.min.js
MD5: faf359a29dd581bd8f288f15ea24d063
SHA1: 25249613b132ff52b704f6f52bc52a1b06bfa64a
SHA256:0ec70f7ac9519d96d4a814bccfa73f574a3b3a8c2646eeaa449ccea68033fe7c

Identifiers

  • None

open-editor.js

File Path: /github/workspace/zmsstatistic/vendor/tracy/tracy/tools/open-in-editor/windows/open-editor.js
MD5: 768504f6a16bcbb92e4f934bc748cd5f
SHA1: 180f2fc5828e209334d531b5690f2688db5fb313
SHA256:071c893fa96c1940161258784d571fe8ec6aa10b93365c8993b001f25badd33d

Identifiers

  • None

settings.js

File Path: /github/workspace/zmsstatistic/js/settings.js
MD5: acf44d69a3a543b639720d0e70fa2264
SHA1: 6b306ddcdb34d08032a61d7b4f043dc0643f0707
SHA256:820800f8896a72b9033d2863a4e75adfe3ee4710597f484e8691336c60c0e0c9

Identifiers

  • None

statistic.js

File Path: /github/workspace/zmsstatistic/public/_css/statistic.js
MD5: cfcb2bcabeb3a8c5ac3bff2912c37871
SHA1: 42061230269044f4c474031f22787c816ddb1849
SHA256:e8f147f8145e29359eaa972ffad497c777928c6f77843b1d7144f44fe8d660cc

Identifiers

  • None

table-sort.js

File Path: /github/workspace/zmsstatistic/vendor/tracy/tracy/src/Tracy/assets/table-sort.js
MD5: 94691a23df5fdd9b04e802f126746bde
SHA1: f366cdbc896cba74b2802b489b37c02afd37ad83
SHA256:9457c18c3f34de45becb447759878bd8e49d1a30cca387aaf5dec1c895e9c8a7

Identifiers

  • None

tabs.js

File Path: /github/workspace/zmsstatistic/vendor/tracy/tracy/src/Tracy/assets/tabs.js
MD5: 24eb02e61eb1830764a78d9d4b00d046
SHA1: 72b3152b2c012508a6064f3998e33856a0ef2d67
SHA256:ea38495a19f612057902d786212f3b942123ecf518419e7ce728fc4b943f6ddb

Identifiers

  • None

toggle.js

File Path: /github/workspace/zmsstatistic/vendor/tracy/tracy/src/Tracy/assets/toggle.js
MD5: 2ea8d7fad6192690d2dcf46c2698994e
SHA1: 000c31d840283b2456f95408e5d37f98ff9d45a0
SHA256:527868421055fe097163e604bf5dafc1127fffe1540c972126f803fd31c1ecad

Identifiers

  • None

utils.js

File Path: /github/workspace/zmsstatistic/js/lib/utils.js
MD5: 968e4a4ef051b770861b2752e4858a68
SHA1: a215c2d634e1ea8afe504f32596ab21f1dd5e20d
SHA256:dfc644a23d65b2ff8d630f0f046e64eda349923ebfd2bf8780c8214230b4ec98

Identifiers

  • None

vendor.js

File Path: /github/workspace/zmsstatistic/public/_js/vendor.js
MD5: 7e40c3823a8fd9566597c57e7ba51135
SHA1: f2dfa5ba1ad1e07c320907a9ce62551ec53a5eca
SHA256:5a55981f26da533bead069a75c42e5dab655409c09820bb8752b1cff898c274d

Identifiers

  • pkg:javascript/moment.js@2.19.4   (Confidence:Highest)

CVE-2022-24785  

Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), CWE-27 Path Traversal: 'dir/../../filename'

CVSSv3:
  • Base Score: HIGH (7.5)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:3.9/RC:R/MAV:A
CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N

References:

Vulnerable Software & Versions (NVD):

  • cpe:2.3:a:momentjs:moment:*:*:*:*:*:node.js:*:* versions from (including) 1.0.1; versions up to (excluding) 2.29.2
  • cpe:2.3:a:momentjs:moment:*:*:*:*:*:nuget:*:* versions from (including) 1.0.1; versions up to (excluding) 2.29.2
  • cpe:2.3:a:netapp:active_iq:-:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:* versions up to (excluding) 5.21.0

CVE-2022-31129  

moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.
CWE-400 Uncontrolled Resource Consumption, CWE-1333 Inefficient Regular Expression Complexity

CVSSv3:
  • Base Score: HIGH (7.5)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

References:

Vulnerable Software & Versions (NVD):

  • cpe:2.3:a:momentjs:moment:*:*:*:*:*:node.js:*:* versions from (including) 2.18.0; versions up to (excluding) 2.29.4
  • cpe:2.3:a:momentjs:moment:*:*:*:*:*:nuget:*:* versions from (including) 2.18.0; versions up to (excluding) 2.29.4



This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the CISA Known Exploited Vulnerability Catalog.
This report may contain data retrieved from the Github Advisory Database (via NPM Audit API).
This report may contain data retrieved from RetireJS.
This report may contain data retrieved from the Sonatype OSS Index.