Spectra Assure
Community
warningRisk: Vulnerabilities
Scanned: 14 days ago

servify

latest
Top 10k
Microservices the simplest way conceivable.
License: Permissive (MIT)
Published: over 8 years ago



SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
No sensitive information found

Security

Vulnerabilities
2 medium severity vulnerabilities
Hardening
No application hardening issues

Threats

Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion

Popularity

66.64M
Recorded Downloads Since 2021
Contributor
Declared Dependencies
68
Dependents

Top issues

Problem

Software composition analysis has identified a component with one or more known vulnerabilities. Based on the CVSS scoring, these vulnerabilities have been marked as medium severity.

Prevalence in npm community

21 packages
found in
Top 100
101 packages
found in
Top 1k
1553 packages
found in
Top 10k
711.5k packages
in community

Next steps

Perform impact analysis for the reported CVEs.
Update the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.

Problem

Uniform Resource Locators (URLs) are structured addresses that point to locations and assets on the internet. URLs allow software developers to build complex applications that exchange data with servers that can be hosted in multiple geographical regions. URLs can commonly be found embedded in documentation, configuration files, source code and compiled binaries. A port number is associated with a network address of a host, such as an IP address, and the type of network protocol used for communication. Within URLs, the ports are optional. Ports can be specified in a URL immediately following the domain name. Each network protocol, or schema, has a set of standard ports on which the service operates. This issue is raised when a mismatch between a network protocol and its expected port number is detected. While the presence of non-standard ports does not imply malicious intent, all of their uses in a software package should be documented and approved.

Prevalence in npm community

6 packages
found in
Top 100
42 packages
found in
Top 1k
867 packages
found in
Top 10k
519.08k packages
in community

Next steps

Investigate reported detections.
If the software should not include these network references, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider changing the port to one that is standard for the networking protocol.

Top behaviors

Prevalence in npm community

Behavior often found in this community (Common)
95 packages
found in
Top 100
726 packages
found in
Top 1k
7488 packages
found in
Top 10k
4.56M packages
in community

Prevalence in npm community

Behavior often found in this community (Common)
6 packages
found in
Top 100
42 packages
found in
Top 1k
867 packages
found in
Top 10k
519.35k packages
in community

Prevalence in npm community

Behavior often found in this community (Common)
34 packages
found in
Top 100
218 packages
found in
Top 1k
3028 packages
found in
Top 10k
1.25M packages
in community

Prevalence in npm community

Behavior often found in this community (Common)
72 packages
found in
Top 100
465 packages
found in
Top 1k
5356 packages
found in
Top 10k
1.75M packages
in community

Prevalence in npm community

Behavior often found in this community (Common)
70 packages
found in
Top 100
380 packages
found in
Top 1k
4401 packages
found in
Top 10k
2.08M packages
in community

Top vulnerabilities

Vulnerability Exploitation Lifecycle
(2 Active Vulnerabilities)
1 (1 Fixable)
CVE-2024-43796m
1 (0 Fixable)
CVE-2023-28155m
None
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated