Fix package lock #7162
Fix package lock #7162
123 new alerts including 6 critical severity security vulnerabilities
New alerts in code changed by this pull request
Security Alerts:
- 6 critical
- 57 high
- 51 medium
- 9 low
Alerts not introduced by this pull request might have been detected because the code changes were too large.
See annotations below for details.
Annotations
Check failure on line 16622 in package-lock.json
Code scanning / Trivy
Multer vulnerable to Denial of Service from maliciously crafted requests High
Check failure on line 16622 in package-lock.json
Code scanning / Trivy
Multer vulnerable to Denial of Service via memory leaks from unclosed streams High
Check failure on line 14945 in package-lock.json
Code scanning / Trivy
nodejs-semver: Regular expression denial of service High
Check failure on line 14940 in package-lock.json
Code scanning / Trivy
nodejs-lodash: command injection via template High
Check failure on line 14940 in package-lock.json
Code scanning / Trivy
nodejs-lodash: prototype pollution in zipObjectDeep function High
Check failure on line 14940 in package-lock.json
Code scanning / Trivy
nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties Critical
Check failure on line 14827 in package-lock.json
Code scanning / Trivy
node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm High
Check failure on line 14701 in package-lock.json
Code scanning / Trivy
node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm High
Check failure on line 14708 in package-lock.json
Code scanning / Trivy
jsonwebtoken: Unrestricted key type could lead to legacy keys usagen High
Check failure on line 14631 in package-lock.json
Code scanning / Trivy
json5: Prototype Pollution in JSON5 via Parse Method High
Check failure on line 12828 in package-lock.json
Code scanning / Trivy
nodejs-is-svg: Regular expression denial of service if the application is provided and checks a crafted invalid SVG string High
Check failure on line 12828 in package-lock.json
Code scanning / Trivy
nodejs-is-svg: ReDoS via malicious string High
Check failure on line 11344 in package-lock.json
Code scanning / Trivy
axios: Axios DoS via lack of data size check High
Check failure on line 11344 in package-lock.json
Code scanning / Trivy
axios: Possible SSRF and Credential Leakage via Absolute URL in axios Requests High
Check failure on line 11324 in package-lock.json
Code scanning / Trivy
node-forge: node-forge ASN.1 Unbounded Recursion High
Check failure on line 11324 in package-lock.json
Code scanning / Trivy
node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications High
Check failure on line 10180 in package-lock.json
Code scanning / Trivy
form-data: Unsafe random function in form-data Critical
Check failure on line 23114 in package-lock.json
Code scanning / Trivy
sharp vulnerability in libwebp dependency CVE-2023-4863 High
Check failure on line 22996 in package-lock.json
Code scanning / Trivy
npm-serialize-javascript: allows remote attackers to inject arbitrary code via the function deleteFunctions within index.js High
Check failure on line 22000 in package-lock.json
Code scanning / Trivy
form-data: Unsafe random function in form-data Critical
Check failure on line 21452 in package-lock.json
Code scanning / Trivy
prismjs: improperly escaped output allows a XSS High
Check failure on line 21452 in package-lock.json
Code scanning / Trivy
npm-prismjs: a malicious (long) string will take a long time to highlight may result in ReDoS High
Check failure on line 21452 in package-lock.json
Code scanning / Trivy
nodejs-prismjs: Regular expression denial of service via prism-asciidoc prism-rest prism-tap and prism-eiffel components High
Check failure on line 21452 in package-lock.json
Code scanning / Trivy
nodejs-prismjs: xss vulnerability that allows attackers to execute arbitrary code High
Check failure on line 20610 in package-lock.json
Code scanning / Trivy
path-to-regexp: Backtracking regular expressions cause ReDoS High