Description
Affected versions of product-monitor
insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running product-monitor
.
Recommendation
Update the product-monitor
package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.2.5
- Patched version(s): 2.2.5
References
Related Issues
- Auth0 NextJS SDK v4 Missing Session Invalidation - CVE-2025-46344
- Potential DoS when using ContextLines integration - Vulnerability
- sanitize-html Information Exposure vulnerability - CVE-2024-21501
- json-schema-ref-parser Prototype Pollution issue - CVE-2024-29651
- Tags:
- npm
- product-monitor
Anything's wrong? Let us know Last updated on January 09, 2023