server
server copied to clipboard
[master] Fix npm audit
Audit report
This audit fix resolves 11 of the total 16 vulnerabilities found in your project.
Updated dependencies
- @jimp/core
- @jimp/custom
- engine.io
- load-bmfont
- node-vibrant
- phin
- puppeteer
- puppeteer-core
- select2
- socket.io-adapter
- ws
Fixed vulnerabilities
@jimp/core #
- Caused by vulnerable dependency:
- phin
- Affected versions: <=0.21.4--canary.1163.d07ed6254d130e2995d24101e93427ec091016e6.0
- Package usage:
node_modules/@jimp/core
@jimp/custom #
- Caused by vulnerable dependency:
- @jimp/core
- Affected versions: <=0.21.4--canary.1163.d07ed6254d130e2995d24101e93427ec091016e6.0
- Package usage:
node_modules/@jimp/custom
engine.io #
- Caused by vulnerable dependency:
- ws
- Affected versions: 0.7.8 - 0.7.9 || 6.0.0 - 6.5.4
- Package usage:
node_modules/engine.io
load-bmfont #
- Caused by vulnerable dependency:
- phin
- Affected versions: >=1.4.0
- Package usage:
node_modules/load-bmfont
node-vibrant #
- Caused by vulnerable dependency:
- @jimp/custom
- Affected versions: 3.1.5 - 3.1.6
- Package usage:
node_modules/node-vibrant
phin #
- phin may include sensitive headers in subsequent requests after redirect
- Severity: moderate (CVSS 4.3)
- Reference: https://github.com/advisories/GHSA-x565-32qp-m3vf
- Affected versions: <3.7.1
- Package usage:
node_modules/phin
puppeteer #
- Caused by vulnerable dependency:
- puppeteer-core
- Affected versions: 18.2.0 - 22.11.1
- Package usage:
node_modules/puppeteer
puppeteer-core #
- Caused by vulnerable dependency:
- ws
- Affected versions: 11.0.0 - 22.11.1
- Package usage:
node_modules/puppeteer-core
select2 #
- Improper Neutralization of Input During Web Page Generation in Select2
- Severity: moderate (CVSS 6.1)
- Reference: https://github.com/advisories/GHSA-rf66-hmqf-q3fc
- Affected versions: <4.0.6
- Package usage:
node_modules/select2
socket.io-adapter #
- Caused by vulnerable dependency:
- ws
- Affected versions: 2.5.2 - 2.5.4
- Package usage:
node_modules/socket.io-adapter
ws #
- ws affected by a DoS when handling a request with many HTTP headers
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
- Affected versions: 8.0.0 - 8.17.0
- Package usage:
node_modules/engine.io/node_modules/wsnode_modules/socket.io-adapter/node_modules/wsnode_modules/ws