recommendations
recommendations copied to clipboard
[stable31] Fix npm audit
Audit report
This audit fix resolves 15 of the total 33 vulnerabilities found in your project.
Updated dependencies
- @babel/helpers
- @nextcloud/typings
- @nextcloud/webpack-vue-config
- @vue/component-compiler-utils
- cross-spawn
- dompurify
- elliptic
- express
- http-proxy-middleware
- nanoid
- path-to-regexp
- postcss
- vue-loader
- vue-template-compiler
- vuex
Fixed vulnerabilities
@babel/helpers #
- Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups
- Severity: moderate (CVSS 6.2)
- Reference: https://github.com/advisories/GHSA-968p-4wvh-cqc8
- Affected versions: <7.26.10
- Package usage:
node_modules/@babel/helpers
@nextcloud/typings #
- Caused by vulnerable dependency:
- vue
- Affected versions: 1.7.0 - 1.8.0
- Package usage:
node_modules/@nextcloud/typings
@nextcloud/webpack-vue-config #
- Caused by vulnerable dependency:
- vue
- vue-loader
- vue-template-compiler
- Affected versions: <=6.2.0
- Package usage:
node_modules/@nextcloud/webpack-vue-config
@vue/component-compiler-utils #
- Caused by vulnerable dependency:
- postcss
- Affected versions: *
- Package usage:
node_modules/@vue/component-compiler-utils
cross-spawn #
- Regular Expression Denial of Service (ReDoS) in cross-spawn
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-3xgq-45jj-v275
- Affected versions: 7.0.0 - 7.0.4
- Package usage:
node_modules/cross-spawn
dompurify #
- DOMPurify allows Cross-site Scripting (XSS)
- Severity: moderate (CVSS 4.5)
- Reference: https://github.com/advisories/GHSA-vhxf-7vqr-mrjg
- Affected versions: <3.2.4
- Package usage:
node_modules/dompurify
elliptic #
- Valid ECDSA signatures erroneously rejected in Elliptic
- Severity: low (CVSS 4.8)
- Reference: https://github.com/advisories/GHSA-fc9h-whq2-v747
- Affected versions: <=6.6.0
- Package usage:
node_modules/elliptic
express #
- Caused by vulnerable dependency:
- path-to-regexp
- Affected versions: 4.0.0-rc1 - 4.21.1 || 5.0.0-alpha.1 - 5.0.0-beta.3
- Package usage:
node_modules/express
http-proxy-middleware #
- http-proxy-middleware allows fixRequestBody to proceed even if bodyParser has failed
- Severity: moderate (CVSS 4)
- Reference: https://github.com/advisories/GHSA-9gqv-wp59-fq42
- Affected versions: 1.3.0 - 2.0.8
- Package usage:
node_modules/http-proxy-middleware
nanoid #
- Predictable results in nanoid generation when given non-integer values
- Severity: moderate (CVSS 4.3)
- Reference: https://github.com/advisories/GHSA-mwcw-c2x4-8c55
- Affected versions: <3.3.8
- Package usage:
node_modules/nanoid
path-to-regexp #
- Unpatched
path-to-regexpReDoS in 0.1.x - Severity: high
- Reference: https://github.com/advisories/GHSA-rhx6-c78j-4q9w
- Affected versions: <0.1.12
- Package usage:
node_modules/path-to-regexp
postcss #
- PostCSS line return parsing error
- Severity: moderate (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-7fh5-64p2-3v2j
- Affected versions: <8.4.31
- Package usage:
node_modules/@vue/component-compiler-utils/node_modules/postcss
vue-loader #
- Caused by vulnerable dependency:
- @vue/component-compiler-utils
- Affected versions: 15.0.0-beta.1 - 15.11.1
- Package usage:
node_modules/vue-loader
vue-template-compiler #
- vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)
- Severity: moderate (CVSS 4.2)
- Reference: https://github.com/advisories/GHSA-g3ch-rx76-35fx
- Affected versions: >=2.0.0
- Package usage:
node_modules/vue-template-compiler
vuex #
- Caused by vulnerable dependency:
- vue
- Affected versions: 3.1.3 - 3.6.2
- Package usage:
node_modules/vuex