twofactor_webauthn
twofactor_webauthn copied to clipboard
[stable1.4] Fix npm audit
Audit report
This audit fix resolves 16 of the total 18 vulnerabilities found in your project.
Updated dependencies
- @nextcloud/l10n
- @nextcloud/moment
- @nextcloud/password-confirmation
- @nextcloud/vue
- @vue/component-compiler-utils
- @vue/test-utils
- body-parser
- cookie
- dompurify
- express
- node-gettext
- path-to-regexp
- postcss
- send
- serve-static
- vue-loader
Fixed vulnerabilities
@nextcloud/l10n #
- Caused by vulnerable dependency:
- node-gettext
- Affected versions: >=1.1.0
- Package usage:
node_modules/@nextcloud/l10n
@nextcloud/moment #
- Caused by vulnerable dependency:
- @nextcloud/l10n
- node-gettext
- Affected versions: >=1.1.1
- Package usage:
node_modules/@nextcloud/moment
@nextcloud/password-confirmation #
- Caused by vulnerable dependency:
- @nextcloud/l10n
- @nextcloud/vue
- Affected versions: >=3.0.0
- Package usage:
node_modules/@nextcloud/password-confirmation
@nextcloud/vue #
- Caused by vulnerable dependency:
- @nextcloud/l10n
- Affected versions: >=1.4.0
- Package usage:
node_modules/@nextcloud/vue
@vue/component-compiler-utils #
- Caused by vulnerable dependency:
- postcss
- Affected versions: *
- Package usage:
node_modules/@vue/component-compiler-utils
@vue/test-utils #
- Caused by vulnerable dependency:
- vue-template-compiler
- Affected versions: <=1.3.6
- Package usage:
node_modules/@vue/test-utils
body-parser #
- body-parser vulnerable to denial of service when url encoding is enabled
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-qwcr-r2fm-qrc7
- Affected versions: <1.20.3
- Package usage:
node_modules/body-parser
cookie #
- cookie accepts cookie name, path, and domain with out of bounds characters
- Severity: low
- Reference: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
- Affected versions: <0.7.0
- Package usage:
node_modules/cookie
dompurify #
- DOMPurify allows tampering by prototype pollution
- Severity: high (CVSS 7)
- Reference: https://github.com/advisories/GHSA-mmhx-hmjr-r674
- Affected versions: 3.0.0 - 3.1.2
- Package usage:
node_modules/dompurify
express #
- express vulnerable to XSS via response.redirect()
- Severity: moderate (CVSS 5)
- Reference: https://github.com/advisories/GHSA-qw6h-vgh9-j6wx
- Affected versions: *
- Package usage:
node_modules/express
node-gettext #
- node-gettext vulnerable to Prototype Pollution
- Severity: moderate (CVSS 5.9)
- Reference: https://github.com/advisories/GHSA-g974-hxvm-x689
- Affected versions: *
- Package usage:
node_modules/node-gettext
path-to-regexp #
- path-to-regexp outputs backtracking regular expressions
- Severity: high (CVSS 7.5)
- Reference: https://github.com/advisories/GHSA-9wv6-86v2-598j
- Affected versions: <0.1.10
- Package usage:
node_modules/express/node_modules/path-to-regexp
postcss #
- PostCSS line return parsing error
- Severity: moderate (CVSS 5.3)
- Reference: https://github.com/advisories/GHSA-7fh5-64p2-3v2j
- Affected versions: <8.4.31
- Package usage:
node_modules/@vue/component-compiler-utils/node_modules/postcss
send #
- send vulnerable to template injection that can lead to XSS
- Severity: moderate (CVSS 5)
- Reference: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
- Affected versions: <0.19.0
- Package usage:
node_modules/send
serve-static #
- serve-static vulnerable to template injection that can lead to XSS
- Severity: moderate (CVSS 5)
- Reference: https://github.com/advisories/GHSA-cm22-4g7w-348p
- Affected versions: <=1.16.0
- Package usage:
node_modules/serve-static
vue-loader #
- Caused by vulnerable dependency:
- @vue/component-compiler-utils
- Affected versions: 15.0.0-beta.1 - 15.11.1
- Package usage:
node_modules/vue-loader