groupfolders
groupfolders copied to clipboard
[stable30] Fix npm audit
Audit report
This audit fix resolves 24 of the total 32 vulnerabilities found in your project.
Updated dependencies
- @babel/helpers
- @babel/runtime
- @nextcloud/dialogs
- @nextcloud/l10n
- @nextcloud/password-confirmation
- @nextcloud/webpack-vue-config
- @vue/component-compiler-utils
- @vue/test-utils
- axios
- cross-spawn
- dompurify
- elliptic
- esbuild
- express
- http-proxy-middleware
- nanoid
- node-gettext
- path-to-regexp
- postcss
- tsx
- undici
- vue-loader
- vue-resize
- vue-template-compiler
Fixed vulnerabilities
@babel/helpers #
- Babel has inefficient RexExp complexity in generated code with .replace when transpiling named capturing groups
- Severity: moderate (CVSS 6.2)
- Reference: https://github.com/advisories/GHSA-968p-4wvh-cqc8
- Affected versions: <7.26.10
- Package usage:
node_modules/@babel/helpers
@babel/runtime #
- Babel has inefficient RexExp complexity in generated code with .replace when transpiling named capturing groups
- Severity: moderate (CVSS 6.2)
- Reference: https://github.com/advisories/GHSA-968p-4wvh-cqc8
- Affected versions: <7.26.10
- Package usage:
node_modules/@babel/runtime
@nextcloud/dialogs #
- Caused by vulnerable dependency:
- @nextcloud/vue
- vue
- vue-frag
- Affected versions: >=4.2.0-beta.1
- Package usage:
node_modules/@nextcloud/dialogs
@nextcloud/l10n #
- Caused by vulnerable dependency:
- node-gettext
- Affected versions: 1.1.0 - 3.1.0
- Package usage:
node_modules/@nextcloud/l10n
@nextcloud/password-confirmation #
- Caused by vulnerable dependency:
- @nextcloud/vue
- vue
- Affected versions: >=3.0.0
- Package usage:
node_modules/@nextcloud/password-confirmation
@nextcloud/webpack-vue-config #
- Caused by vulnerable dependency:
- vue
- vue-loader
- vue-template-compiler
- Affected versions: *
- Package usage:
node_modules/@nextcloud/webpack-vue-config
@vue/component-compiler-utils #
- Caused by vulnerable dependency:
- postcss
- Affected versions: *
- Package usage:
node_modules/@vue/component-compiler-utils
@vue/test-utils #
- Caused by vulnerable dependency:
- vue
- vue-template-compiler
- Affected versions: <=1.3.6
- Package usage:
node_modules/@vue/test-utils
axios #
- axios Requests Vulnerable To Possible SSRF and Credential Leakage via Absolute URL
- Severity: high
- Reference: https://github.com/advisories/GHSA-jr5f-v2jv-69x6
- Affected versions: <1.8.2
- Package usage:
node_modules/axios
cross-spawn #
- Regular Expression Denial of Service (ReDoS) in cross-spawn
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-3xgq-45jj-v275
- Affected versions: 7.0.0 - 7.0.4
- Package usage:
node_modules/cross-spawn
dompurify #
- DOMPurify allows Cross-site Scripting (XSS)
- Severity: moderate (CVSS 4.5)
- Reference: https://github.com/advisories/GHSA-vhxf-7vqr-mrjg
- Affected versions: <3.2.4
- Package usage:
node_modules/dompurify
elliptic #
- Valid ECDSA signatures erroneously rejected in Elliptic
- Severity: low (CVSS 4.8)
- Reference: https://github.com/advisories/GHSA-fc9h-whq2-v747
- Affected versions: <=6.6.0
- Package usage:
node_modules/elliptic
esbuild #
- esbuild enables any website to send any requests to the development server and read the response
- Severity: moderate (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-67mh-4wv8-2f99
- Affected versions: <=0.24.2
- Package usage:
node_modules/esbuild
express #
- Caused by vulnerable dependency:
- path-to-regexp
- Affected versions: 4.0.0-rc1 - 4.21.1 || 5.0.0-alpha.1 - 5.0.0-beta.3
- Package usage:
node_modules/express
http-proxy-middleware #
- Denial of service in http-proxy-middleware
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-c7qv-q95q-8v27
- Affected versions: <2.0.7
- Package usage:
node_modules/http-proxy-middleware
nanoid #
- Predictable results in nanoid generation when given non-integer values
- Severity: moderate (CVSS 4.3)
- Reference: https://github.com/advisories/GHSA-mwcw-c2x4-8c55
- Affected versions: <3.3.8
- Package usage:
node_modules/nanoid
node-gettext #
- node-gettext vulnerable to Prototype Pollution
- Severity: high (CVSS 5.9)
- Reference: https://github.com/advisories/GHSA-g974-hxvm-x689
- Affected versions: *
- Package usage:
node_modules/node-gettext
path-to-regexp #
- Unpatched
path-to-regexpReDoS in 0.1.x - Severity: high
- Reference: https://github.com/advisories/GHSA-rhx6-c78j-4q9w
- Affected versions: <0.1.12
- Package usage:
node_modules/path-to-regexp
postcss #
- PostCSS line return parsing error
- Severity: moderate (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-7fh5-64p2-3v2j
- Affected versions: <8.4.31
- Package usage:
node_modules/@vue/component-compiler-utils/node_modules/postcss
tsx #
- Caused by vulnerable dependency:
- esbuild
- Affected versions: 3.13.0 - 4.19.2
- Package usage:
node_modules/tsx
undici #
- Use of Insufficiently Random Values in undici
- Severity: moderate (CVSS 6.8)
- Reference: https://github.com/advisories/GHSA-c76h-2ccp-4975
- Affected versions: 4.5.0 - 5.28.4
- Package usage:
node_modules/undici
vue-loader #
- Caused by vulnerable dependency:
- @vue/component-compiler-utils
- Affected versions: 15.0.0-beta.1 - 15.11.1
- Package usage:
node_modules/vue-loader
vue-resize #
- Caused by vulnerable dependency:
- vue
- Affected versions: 0.4.0 - 1.0.1
- Package usage:
node_modules/vue-resize
vue-template-compiler #
- vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)
- Severity: moderate (CVSS 4.2)
- Reference: https://github.com/advisories/GHSA-g3ch-rx76-35fx
- Affected versions: >=2.0.0
- Package usage:
node_modules/vue-template-compiler