Update tc-libs #7161
Update tc-libs #7161
75 new alerts including 3 critical severity security vulnerabilities
New alerts in code changed by this pull request
Security Alerts:
- 3 critical
- 37 high
- 32 medium
- 3 low
Alerts not introduced by this pull request might have been detected because the code changes were too large.
See annotations below for details.
Annotations
Check failure on line 2434 in package-lock.json
Code scanning / Trivy
auth0-js Privilege Escalation Vulnerability High
Check failure on line 11256 in package-lock.json
Code scanning / Trivy
axios: Possible SSRF and Credential Leakage via Absolute URL in axios Requests High
Check failure on line 11256 in package-lock.json
Code scanning / Trivy
axios: Axios DoS via lack of data size check High
Check failure on line 21686 in package-lock.json
Code scanning / Trivy
nodejs-prismjs: Regular expression denial of service via prism-asciidoc prism-rest prism-tap and prism-eiffel components High
Check failure on line 21686 in package-lock.json
Code scanning / Trivy
nodejs-prismjs: xss vulnerability that allows attackers to execute arbitrary code High
Check failure on line 12680 in package-lock.json
Code scanning / Trivy
nodejs-is-svg: ReDoS via malicious string High
Check failure on line 12680 in package-lock.json
Code scanning / Trivy
nodejs-is-svg: Regular expression denial of service if the application is provided and checks a crafted invalid SVG string High
Check failure on line 14718 in package-lock.json
Code scanning / Trivy
json5: Prototype Pollution in JSON5 via Parse Method High
Check failure on line 18232 in package-lock.json
Code scanning / Trivy
path-to-regexp: Backtracking regular expressions cause ReDoS High
Check failure on line 17071 in package-lock.json
Code scanning / Trivy
node-forge: node-forge ASN.1 Unbounded Recursion High
Check failure on line 17071 in package-lock.json
Code scanning / Trivy
node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications High
Check failure on line 14996 in package-lock.json
Code scanning / Trivy
nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties Critical
Check failure on line 14996 in package-lock.json
Code scanning / Trivy
nodejs-lodash: prototype pollution in zipObjectDeep function High
Check failure on line 14996 in package-lock.json
Code scanning / Trivy
nodejs-lodash: command injection via template High
Check failure on line 15001 in package-lock.json
Code scanning / Trivy
nodejs-semver: Regular expression denial of service High
Check failure on line 17071 in package-lock.json
Code scanning / Trivy
node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery High
Check failure on line 17071 in package-lock.json
Code scanning / Trivy
node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery High
Check failure on line 17071 in package-lock.json
Code scanning / Trivy
nodejs-node-forge: prototype pollution via the util.setPath function High
Check failure on line 17066 in package-lock.json
Code scanning / Trivy
node-fetch: exposure of sensitive information to an unauthorized actor High
Check failure on line 16694 in package-lock.json
Code scanning / Trivy
multer: Multer Denial of Service High
Check failure on line 16694 in package-lock.json
Code scanning / Trivy
multer: Multer vulnerable to Denial of Service via unhandled exception High
Check failure on line 16694 in package-lock.json
Code scanning / Trivy
Multer vulnerable to Denial of Service via memory leaks from unclosed streams High
Check failure on line 16694 in package-lock.json
Code scanning / Trivy
Multer vulnerable to Denial of Service from maliciously crafted requests High
Check failure on line 2434 in package-lock.json
Code scanning / Trivy
Cross-Site Request Forgery (CSRF) in Auth0 High
Check failure on line 2434 in package-lock.json
Code scanning / Trivy
Auth0-js bypasses CSRF checks High