sonatype-depshield[bot]

Results 539 issues of sonatype-depshield[bot]

**Vulnerabilities** DepShield reports that this application's usage of [browserslist:4.16.0](https://ossindex.sonatype.org/component/pkg:npm/[email protected]) results in the following vulnerability(s): - (CVSS **5.3**) [[CVE-2021-23364] The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular...

**Vulnerabilities** DepShield reports that this application's usage of [underscore:1.6.0](https://ossindex.sonatype.org/component/pkg:npm/[email protected]) results in the following vulnerability(s): - (CVSS **8.8**) [CWE-94: Improper Control of Generation of Code ('Code Injection')](https://ossindex.sonatype.org/vuln/59587c75-21ae-472e-ab66-b64ebff2e3f0) - (CVSS **7.2**) [[CVE-2021-23358]...

**Vulnerabilities** DepShield reports that this application's usage of [glob-parent:3.1.0](https://ossindex.sonatype.org/component/pkg:npm/[email protected]) results in the following vulnerability(s): - (CVSS **7.5**) [CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion')](https://ossindex.sonatype.org/vuln/64cd5f21-8af4-4eae-ac7d-a53241ea693a) **Occurrences** glob-parent:3.1.0 is a transitive dependency introduced...

**Vulnerabilities** DepShield reports that this application's usage of [socket.io-parser:3.3.1](https://ossindex.sonatype.org/component/pkg:npm/[email protected]) results in the following vulnerability(s): - (CVSS **7.5**) [[CVE-2020-36049] socket.io-parser before 3.4.1 allows attackers to cause a denial of service (mem...](https://ossindex.sonatype.org/vuln/d6bd264b-68c8-4051-b198-97847693ee93)...

**Vulnerabilities** DepShield reports that this application's usage of [path-parse:1.0.6](https://ossindex.sonatype.org/component/pkg:npm/[email protected]) results in the following vulnerability(s): - (CVSS **7.5**) [[CVE-2021-23343] All versions of package path-parse are vulnerable to Regular Expression Denial o...](https://ossindex.sonatype.org/vuln/c8574971-0fcc-4713-b46b-b3aebd4394ef)...

**Vulnerabilities** DepShield reports that this application's usage of [ws:7.4.0](https://ossindex.sonatype.org/component/pkg:npm/[email protected]) results in the following vulnerability(s): - (CVSS **5.3**) [[CVE-2021-32640] ws is an open source WebSocket client and server library for Node.js....

**Vulnerabilities** DepShield reports that this application's usage of [ws:7.4.1](https://ossindex.sonatype.org/component/pkg:npm/[email protected]) results in the following vulnerability(s): - (CVSS **5.3**) [[CVE-2021-32640] ws is an open source WebSocket client and server library for Node.js....

**Vulnerabilities** DepShield reports that this application's usage of [object-path:0.11.5](https://ossindex.sonatype.org/component/pkg:npm/[email protected]) results in the following vulnerability(s): - (CVSS **7.4**) [CWE-471: Modification of Assumed-Immutable Data (MAID)](https://ossindex.sonatype.org/vuln/028f6056-4710-427e-bcf8-947a6189d205) **Occurrences** object-path:0.11.5 is a transitive dependency introduced...

**Vulnerabilities** DepShield reports that this application's usage of [lodash.sortby:4.7.0](https://ossindex.sonatype.org/component/pkg:npm/[email protected]) results in the following vulnerability(s): - (CVSS **7.4**) [CWE-471: Modification of Assumed-Immutable Data (MAID)](https://ossindex.sonatype.org/vuln/0f23ff35-235f-404f-8118-bc1580673fd0) **Occurrences** lodash.sortby:4.7.0 is a transitive dependency introduced...

The project could not be analyzed because of maven build errors. Please review the [error messages here](https://depshield.sonatype.org/error/cdnjs/tutorials/rycCbaNXZqtpDnL3i2IkFA). Another build will be scheduled within 24 hours. If the build is successful...