bruteforcesettings
bruteforcesettings copied to clipboard
[stable27] Fix npm audit
Audit report
This audit fix resolves 16 of the total 18 vulnerabilities found in your project.
Updated dependencies
- @babel/traverse
- @nextcloud/axios
- @vue/component-compiler-utils
- axios
- braces
- browserify-sign
- elliptic
- express
- fast-xml-parser
- follow-redirects
- postcss
- semver
- vue-loader
- webpack-dev-middleware
- word-wrap
- ws
Fixed vulnerabilities
@babel/traverse #
- Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code
- Severity: critical 🚨 (CVSS 9.4)
- Reference: https://github.com/advisories/GHSA-67hx-6x53-jw92
- Affected versions: <7.23.2
- Package usage:
node_modules/@babel/traverse
@nextcloud/axios #
- Caused by vulnerable dependency:
- axios
- Affected versions: <=2.3.0
- Package usage:
node_modules/@nextcloud/axios
@vue/component-compiler-utils #
- Caused by vulnerable dependency:
- postcss
- Affected versions: *
- Package usage:
node_modules/@vue/component-compiler-utils
axios #
- Axios Cross-Site Request Forgery Vulnerability
- Severity: moderate (CVSS 6.5)
- Reference: https://github.com/advisories/GHSA-wf5p-g6vw-rhxx
- Affected versions: 0.8.1 - 0.27.2
- Package usage:
node_modules/axios
braces #
- Uncontrolled resource consumption in braces
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-grv7-fg5c-xmjg
- Affected versions: <3.0.3
- Package usage:
node_modules/braces
browserify-sign #
- browserify-sign upper bound check issue in
dsaVerifyleads to a signature forgery attack - Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-x9w5-v3q2-3rhw
- Affected versions: 2.6.0 - 4.2.1
- Package usage:
node_modules/browserify-sign
elliptic #
- Elliptic's EDDSA missing signature length check
- Severity: low (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-f7q4-pwc6-w24p
- Affected versions: 2.0.0 - 6.5.6
- Package usage:
node_modules/elliptic
express #
- Express.js Open Redirect in malformed URLs
- Severity: moderate (CVSS 6.1)
- Reference: https://github.com/advisories/GHSA-rv95-896h-c2vc
- Affected versions: <4.19.2
- Package usage:
node_modules/express
fast-xml-parser #
- fast-xml-parser vulnerable to ReDOS at currency parsing
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-mpg4-rc92-vx8v
- Affected versions: <4.4.1
- Package usage:
node_modules/fast-xml-parser
follow-redirects #
- Follow Redirects improperly handles URLs in the url.parse() function
- Severity: moderate (CVSS 6.1)
- Reference: https://github.com/advisories/GHSA-jchw-25xp-jwwc
- Affected versions: <=1.15.5
- Package usage:
node_modules/follow-redirects
postcss #
- PostCSS line return parsing error
- Severity: moderate (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-7fh5-64p2-3v2j
- Affected versions: <8.4.31
- Package usage:
node_modules/@vue/component-compiler-utils/node_modules/postcssnode_modules/postcss
semver #
- semver vulnerable to Regular Expression Denial of Service
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
- Affected versions: 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
- Package usage:
node_modules/builtins/node_modules/semvernode_modules/css-loader/node_modules/semvernode_modules/eslint-plugin-jsdoc/node_modules/semvernode_modules/eslint-plugin-n/node_modules/semvernode_modules/eslint-plugin-vue/node_modules/semvernode_modules/semvernode_modules/stylelint-config-recommended-vue/node_modules/semvernode_modules/vue-eslint-parser/node_modules/semver
vue-loader #
- Caused by vulnerable dependency:
- @vue/component-compiler-utils
- Affected versions: 15.0.0-beta.1 - 15.11.1
- Package usage:
node_modules/vue-loader
webpack-dev-middleware #
- Path traversal in webpack-dev-middleware
- Severity: high (CVSS 7.4)
- Reference: https://github.com/advisories/GHSA-wr3j-pwj9-hqq6
- Affected versions: <=5.3.3
- Package usage:
node_modules/webpack-dev-middleware
word-wrap #
- word-wrap vulnerable to Regular Expression Denial of Service
- Severity: moderate (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-j8xg-fqg3-53r7
- Affected versions: <1.2.4
- Package usage:
node_modules/word-wrap
ws #
- ws affected by a DoS when handling a request with many HTTP headers
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
- Affected versions: 8.0.0 - 8.17.0
- Package usage:
node_modules/ws