bruteforcesettings
bruteforcesettings copied to clipboard
[stable28] Fix npm audit
Audit report
This audit fix resolves 22 of the total 24 vulnerabilities found in your project.
Updated dependencies
- @nextcloud/dialogs
- @nextcloud/l10n
- @nextcloud/vue
- @vue/component-compiler-utils
- axios
- body-parser
- braces
- dompurify
- elliptic
- express
- fast-xml-parser
- follow-redirects
- micromatch
- node-gettext
- path-to-regexp
- postcss
- send
- serve-static
- vue-loader
- webpack
- webpack-dev-middleware
- ws
Fixed vulnerabilities
@nextcloud/dialogs #
- Caused by vulnerable dependency:
- @nextcloud/l10n
- Affected versions: >=2.0.0
- Package usage:
node_modules/@nextcloud/dialogs
@nextcloud/l10n #
- Caused by vulnerable dependency:
- node-gettext
- Affected versions: >=1.1.0
- Package usage:
node_modules/@nextcloud/l10n
@nextcloud/vue #
- Caused by vulnerable dependency:
- @nextcloud/dialogs
- @nextcloud/l10n
- Affected versions: >=1.4.0
- Package usage:
node_modules/@nextcloud/vue
@vue/component-compiler-utils #
- Caused by vulnerable dependency:
- postcss
- Affected versions: *
- Package usage:
node_modules/@vue/component-compiler-utils
axios #
- Server-Side Request Forgery in axios
- Severity: high
- Reference: https://github.com/advisories/GHSA-8hc4-vh64-cxmj
- Affected versions: 1.3.2 - 1.7.3
- Package usage:
node_modules/axios
body-parser #
- body-parser vulnerable to denial of service when url encoding is enabled
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-qwcr-r2fm-qrc7
- Affected versions: <1.20.3
- Package usage:
node_modules/body-parser
braces #
- Uncontrolled resource consumption in braces
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-grv7-fg5c-xmjg
- Affected versions: <3.0.3
- Package usage:
node_modules/braces
dompurify #
- DOMPurify allows tampering by prototype pollution
- Severity: high (CVSS 7)
- Reference: https://github.com/advisories/GHSA-mmhx-hmjr-r674
- Affected versions: 3.0.0 - 3.1.2
- Package usage:
node_modules/dompurify
elliptic #
- Elliptic's EDDSA missing signature length check
- Severity: low (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-f7q4-pwc6-w24p
- Affected versions: 2.0.0 - 6.5.6
- Package usage:
node_modules/elliptic
express #
- Express.js Open Redirect in malformed URLs
- Severity: moderate (CVSS 6.1)
- Reference: https://github.com/advisories/GHSA-rv95-896h-c2vc
- Affected versions: <=4.19.2 || 5.0.0-alpha.1 - 5.0.0-beta.3
- Package usage:
node_modules/express
fast-xml-parser #
- fast-xml-parser vulnerable to ReDOS at currency parsing
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-mpg4-rc92-vx8v
- Affected versions: <4.4.1
- Package usage:
node_modules/fast-xml-parser
follow-redirects #
- follow-redirects' Proxy-Authorization header kept across hosts
- Severity: moderate (CVSS 6.5)
- Reference: https://github.com/advisories/GHSA-cxjh-pqwp-8mfp
- Affected versions: <=1.15.5
- Package usage:
node_modules/follow-redirects
micromatch #
- Regular Expression Denial of Service (ReDoS) in micromatch
- Severity: moderate (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-952p-6rrq-rcjv
- Affected versions: <4.0.8
- Package usage:
node_modules/micromatch
node-gettext #
- node-gettext vulnerable to Prototype Pollution
- Severity: moderate (CVSS 5.9)
- Reference: https://github.com/advisories/GHSA-g974-hxvm-x689
- Affected versions: *
- Package usage:
node_modules/node-gettext
path-to-regexp #
- path-to-regexp outputs backtracking regular expressions
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-9wv6-86v2-598j
- Affected versions: <0.1.10
- Package usage:
node_modules/path-to-regexp
postcss #
- PostCSS line return parsing error
- Severity: moderate (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-7fh5-64p2-3v2j
- Affected versions: <8.4.31
- Package usage:
node_modules/@vue/component-compiler-utils/node_modules/postcss
send #
- send vulnerable to template injection that can lead to XSS
- Severity: moderate (CVSS 5)
- Reference: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
- Affected versions: <0.19.0
- Package usage:
node_modules/send
serve-static #
- serve-static vulnerable to template injection that can lead to XSS
- Severity: moderate (CVSS 5)
- Reference: https://github.com/advisories/GHSA-cm22-4g7w-348p
- Affected versions: <=1.16.0
- Package usage:
node_modules/serve-static
vue-loader #
- Caused by vulnerable dependency:
- @vue/component-compiler-utils
- Affected versions: 15.0.0-beta.1 - 15.11.1
- Package usage:
node_modules/vue-loader
webpack #
- Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads to XSS
- Severity: moderate (CVSS 6.4)
- Reference: https://github.com/advisories/GHSA-4vvj-4cpr-p986
- Affected versions: 5.0.0-alpha.0 - 5.93.0
- Package usage:
node_modules/webpack
webpack-dev-middleware #
- Path traversal in webpack-dev-middleware
- Severity: high (CVSS 7.4)
- Reference: https://github.com/advisories/GHSA-wr3j-pwj9-hqq6
- Affected versions: <=5.3.3
- Package usage:
node_modules/webpack-dev-middleware
ws #
- ws affected by a DoS when handling a request with many HTTP headers
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
- Affected versions: 8.0.0 - 8.17.0
- Package usage:
node_modules/ws