Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump serialize-javascript from 6.0.0 to 6.0.2 in /fixtures/flight #135

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Feb 19, 2025

Bumps serialize-javascript from 6.0.0 to 6.0.2.

Release notes

Sourced from serialize-javascript's releases.

v6.0.2

  • fix: serialize URL string contents to prevent XSS (#173) f27d65d
  • Bump @​babel/traverse from 7.10.1 to 7.23.7 (#171) 02499c0
  • docs: update readme with URL support (#146) 0d88527
  • chore: update node version and lock file e2a3a91
  • fix typo (#164) 5a1fa64

yahoo/serialize-javascript@v6.0.1...v6.0.2

v6.0.1

What's Changed

New Contributors

Full Changelog: yahoo/serialize-javascript@v6.0.0...v6.0.1

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [serialize-javascript](https://github.com/yahoo/serialize-javascript) from 6.0.0 to 6.0.2.
- [Release notes](https://github.com/yahoo/serialize-javascript/releases)
- [Commits](yahoo/serialize-javascript@v6.0.0...v6.0.2)

---
updated-dependencies:
- dependency-name: serialize-javascript
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Feb 19, 2025
@rafikmojr
Copy link
Collaborator

Logo
Checkmarx One – Scan Summary & Detailsc1762a0b-34b0-4617-a77e-0463718ff0e9

New Issues (75)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2024-4671 Npm-electron-23.1.2
detailsRecommended version: 28.3.2
Description: Use-After-Free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentiall...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL CVE-2024-6779 Npm-electron-23.1.2
detailsRecommended version: 31.3.0
Description: Out-of-bounds memory access in V8 in Google Chrome versions prior to 126.0.6478.182 allowed a remote attacker to potentially perform a sandbox esca...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
CRITICAL Cx1113a032-799e Npm-webmarker-js-0.0.3
detailsDescription: This package is loading pollyfill script from cdn.polyfill.io, which has been compromised to deliver malicious code. Click here to learn more about...
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.5.6
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.2.3
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.5.3
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2022-37620 Npm-html-minifier-3.5.21
detailsDescription: A Regular Expression Denial of Service (ReDoS) flaw was found in html-minifier versions 2.1.0 through 4.0.0 via the "candidate" variable in "htmlmi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-1674 Npm-electron-23.1.2
detailsRecommended version: 27.3.9
Description: Inappropriate implementation in Navigation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass navigation restrictions via ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-3170 Npm-electron-23.1.2
detailsRecommended version: 29.0.0
Description: Use after free in WebRTC in Google Chrome versions prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a cr...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-3173 Npm-electron-23.1.2
detailsRecommended version: 28.1.0
Description: Insufficient data validation in Updater in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to perform OS-level privilege escalation ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-3176 Npm-electron-23.1.2
detailsRecommended version: 27.0.0
Description: An Out-of-Bounds write in SwiftShader in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to perform an out-of-bounds memory write vi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-3840 Npm-electron-23.1.2
detailsRecommended version: 29.4.3
Description: Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.0.6367.60, allowed a remote attacker to bypass navigation restricti...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-4331 Npm-electron-23.1.2
detailsRecommended version: 28.3.2
Description: Use after free in Picture In Picture in Google Chrome versions prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corrup...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-4368 Npm-electron-23.1.2
detailsRecommended version: 28.3.2
Description: Use after free in Dawn in Google Chrome versions prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a cra...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-5158 Npm-electron-23.1.2
detailsRecommended version: 31.0.0
Description: Type Confusion in V8 in Google Chrome versions prior to 125.0.6422.76 allowed a remote attacker to potentially perform arbitrary read/write via a c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-5495 Npm-electron-23.1.2
detailsRecommended version: 31.0.0
Description: Use After Free in Dawn in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-5831 Npm-electron-23.1.2
detailsRecommended version: 29.4.3
Description: Use After Free in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-5832 Npm-electron-23.1.2
detailsRecommended version: 29.4.3
Description: Use After Free in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-5842 Npm-electron-23.1.2
detailsRecommended version: 29.4.3
Description: Use After Free in Browser UI in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestur...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-5844 Npm-electron-23.1.2
detailsRecommended version: 29.4.3
Description: Heap-based Buffer Overflow in Tab Strip in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform an Out-of-bounds Read via a cr...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-5847 Npm-electron-23.1.2
detailsRecommended version: 29.4.3
Description: Use After Free in PDFium in Google Chrome prior to 126.0.6478.54, allowed a remote attacker to potentially exploit heap corruption via a crafted PD...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-6290 Npm-electron-23.1.2
detailsRecommended version: 31.2.0
Description: Use After Free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-6775 Npm-electron-23.1.2
detailsRecommended version: 31.3.0
Description: Use After Free in Media Stream in Google Chrome versions prior to 126.0.6478.182, allowed a remote attacker who convinced a user to engage in speci...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-7255 Npm-electron-23.1.2
detailsRecommended version: 32.0.0
Description: Out-of-bounds read in "WebTransport" in Google Chrome versions prior to 127.0.6533.88 allowed a remote attacker to potentially perform out-of-bound...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-7974 Npm-electron-23.1.2
detailsRecommended version: 32.0.2
Description: Insufficient data validation in V8 API in Google Chrome versions prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corru...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-7979 Npm-electron-23.1.2
detailsRecommended version: 32.0.2
Description: Insufficient data validation in Installer in Google Chrome on Windows versions prior to 128.0.6613.84 allowed a local attacker to perform privilege...
Attack Vector: LOCAL
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-8638 Npm-electron-23.1.2
detailsRecommended version: 32.1.1
Description: Type Confusion in V8 in Google Chrome prior to 128.0.6613.137, allowed a remote attacker to potentially exploit object corruption via a crafted HTM...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-9121 Npm-electron-23.1.2
detailsRecommended version: 33.0.0
Description: Inappropriate implementation in V8 in Google Chrome versions prior to 129.0.6668.70 allowed a remote attacker to potentially perform out of bounds ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-9955 Npm-electron-23.1.2
detailsRecommended version: 32.3.1
Description: Use after free in WebAuthentication in Google Chrome versions prior to 130.0.6723.58 allowed a remote attacker to potentially exploit heap corrupti...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2025-0291 Npm-electron-23.1.2
detailsRecommended version: 32.3.1
Description: Type Confusion in V8 in Google Chrome prior to 131.0.6778.264 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HT...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
HIGH CVE-2025-0612 Npm-electron-23.1.2
detailsRecommended version: 34.0.2
Description: Out-of-bounds memory access in V8 in Google Chrome prior to 132.0.6834.110 allowed a remote attacker to potentially exploit heap corruption via a c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
MEDIUM CVE-2024-3845 Npm-electron-23.1.2
detailsRecommended version: 29.4.3
Description: Inappropriate implementation in Networks in Google Chrome prior to 124.0.6367.60, allowed a remote attacker to bypass mixed content policy via a cr...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
MEDIUM CVE-2024-4067 Npm-micromatch-4.0.4
detailsRecommended version: 4.0.8
Description: The NPM package "micromatch" prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in "micromatch....
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
MEDIUM CVE-2024-4067 Npm-micromatch-4.0.2
detailsRecommended version: 4.0.8
Description: The NPM package "micromatch" prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in "micromatch....
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
MEDIUM CVE-2024-4067 Npm-micromatch-2.3.11
detailsRecommended version: 4.0.8
Description: The NPM package "micromatch" prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in "micromatch....
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
MEDIUM CVE-2024-4067 Npm-micromatch-4.0.5
detailsRecommended version: 4.0.8
Description: The NPM package "micromatch" prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in "micromatch....
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
MEDIUM CVE-2024-4067 Npm-micromatch-3.1.10
detailsRecommended version: 4.0.8
Description: The NPM package "micromatch" prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in "micromatch....
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
MEDIUM CVE-2024-43796 Npm-express-4.18.2
detailsRecommended version: 4.20.0
Description: Express.js minimalist web framework for node. In express versions prior to 4.20.0 and 5.0.x prior to 5.0.0, passing untrusted user input even after...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
MEDIUM CVE-2024-43796 Npm-express-4.16.2
detailsRecommended version: 4.20.0
Description: Express.js minimalist web framework for node. In express versions prior to 4.20.0 and 5.0.x prior to 5.0.0, passing untrusted user input even after...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
MEDIUM CVE-2024-43796 Npm-express-4.14.0
detailsRecommended version: 4.20.0
Description: Express.js minimalist web framework for node. In express versions prior to 4.20.0 and 5.0.x prior to 5.0.0, passing untrusted user input even after...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
MEDIUM CVE-2024-43796 Npm-express-4.17.3
detailsRecommended version: 4.20.0
Description: Express.js minimalist web framework for node. In express versions prior to 4.20.0 and 5.0.x prior to 5.0.0, passing untrusted user input even after...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
MEDIUM CVE-2024-43796 Npm-express-4.15.4
detailsRecommended version: 4.20.0
Description: Express.js minimalist web framework for node. In express versions prior to 4.20.0 and 5.0.x prior to 5.0.0, passing untrusted user input even after...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
MEDIUM CVE-2024-43796 Npm-express-4.17.1
detailsRecommended version: 4.20.0
Description: Express.js minimalist web framework for node. In express versions prior to 4.20.0 and 5.0.x prior to 5.0.0, passing untrusted user input even after...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
MEDIUM CVE-2024-47068 Npm-rollup-0.36.4
detailsRecommended version: 2.79.2
Description: Rollup is a module bundler for JavaScript. In rollup versions prior to 2.79.2, 3.x prior to 3.29.5, and 4.x prior to 4.22.4 are susceptible to a DO...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package

More results are available on the CxOne platform

Fixed Issues (963)
Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
HIGH CVE-2017-1000048 Npm-qs-2.3.3
HIGH CVE-2017-1000048 Npm-qs-6.3.0
HIGH CVE-2017-1000048 Npm-qs-6.2.0
HIGH CVE-2017-15010 Npm-tough-cookie-2.3.2
HIGH CVE-2017-16032 Npm-brace-expansion-1.1.6
HIGH CVE-2017-16042 Npm-growl-1.8.1
HIGH CVE-2017-16099 Npm-no-case-2.3.1
HIGH CVE-2017-16114 Npm-marked-0.3.6
HIGH CVE-2017-16119 Npm-fresh-0.3.0
HIGH CVE-2017-16119 Npm-fresh-0.5.0
HIGH CVE-2017-16138 Npm-mime-1.2.11
HIGH CVE-2017-16138 Npm-mime-1.3.6
HIGH CVE-2017-16138 Npm-mime-1.3.4
HIGH CVE-2017-18077 Npm-brace-expansion-1.1.6
HIGH CVE-2018-1000620 Npm-cryptiles-3.1.2
HIGH CVE-2018-1000620 Npm-cryptiles-2.0.5
HIGH CVE-2018-13797 Npm-macaddress-0.2.8
HIGH CVE-2018-14732 Npm-webpack-dev-server-2.7.1
HIGH CVE-2018-14732 Npm-webpack-dev-server-1.16.2
HIGH CVE-2018-14732 Npm-webpack-dev-server-2.11.3
HIGH CVE-2018-14732 Npm-webpack-dev-server-2.9.4
HIGH CVE-2018-16472 Npm-cached-path-relative-1.0.1
HIGH CVE-2018-16492 Npm-extend-3.0.0
HIGH CVE-2018-16492 Npm-extend-3.0.1
HIGH CVE-2018-20834 Npm-tar-2.2.1
HIGH CVE-2018-20835 Npm-tar-fs-1.16.0
HIGH CVE-2018-3737 Npm-sshpk-1.10.1
HIGH CVE-2018-3737 Npm-sshpk-1.13.1
HIGH CVE-2018-3774 Npm-url-parse-1.0.5
HIGH CVE-2018-3774 Npm-url-parse-1.1.9
HIGH CVE-2018-3774 Npm-url-parse-1.1.7
HIGH CVE-2018-3774 Npm-url-parse-1.2.0
HIGH CVE-2018-6342 Npm-react-dev-utils-3.1.1
HIGH CVE-2018-6342 Npm-react-dev-utils-4.2.1
HIGH CVE-2019-10744 Npm-lodash-4.17.4
HIGH CVE-2019-10744 Npm-lodash-3.10.1
HIGH CVE-2019-10744 Npm-lodash-4.17.11
HIGH CVE-2019-10775 Npm-ecstatic-2.2.2
HIGH CVE-2019-13173 Npm-fstream-1.0.11
HIGH CVE-2019-13173 Npm-fstream-1.0.10
HIGH CVE-2019-1351 Npm-nodegit-0.18.3
HIGH CVE-2019-1352 Npm-nodegit-0.18.3
HIGH CVE-2019-1354 Npm-nodegit-0.18.3
HIGH CVE-2019-20149 Npm-kind-of-6.0.2
HIGH CVE-2020-13822 Npm-elliptic-6.4.0
HIGH CVE-2020-28469 Npm-glob-parent-3.1.0
HIGH CVE-2020-28469 Npm-glob-parent-2.0.0
HIGH CVE-2020-28469 Npm-glob-parent-5.1.1
HIGH CVE-2020-28499 Npm-merge-1.2.1
HIGH CVE-2020-28499 Npm-merge-1.2.0
HIGH CVE-2020-7645 Npm-chrome-launcher-0.10.5
HIGH CVE-2020-7662 Npm-websocket-extensions-0.1.3
HIGH CVE-2020-7662 Npm-websocket-extensions-0.1.1
HIGH CVE-2020-7677 Npm-thenify-3.3.0
HIGH CVE-2020-7720 Npm-node-forge-0.6.33
HIGH CVE-2020-7720 Npm-node-forge-0.7.6
HIGH CVE-2020-7733 Npm-ua-parser-js-0.7.12
HIGH CVE-2020-7733 Npm-ua-parser-js-0.7.20
HIGH CVE-2020-7733 Npm-ua-parser-js-0.7.14
HIGH CVE-2020-7733 Npm-ua-parser-js-0.7.17
HIGH CVE-2020-7753 Npm-trim-0.0.1
HIGH CVE-2020-7774 Npm-y18n-4.0.0
HIGH CVE-2020-7774 Npm-y18n-3.2.1
HIGH CVE-2020-7792 Npm-mout-1.1.0
HIGH CVE-2020-7793 Npm-ua-parser-js-0.7.17
HIGH CVE-2020-7793 Npm-ua-parser-js-0.7.14
HIGH CVE-2020-7793 Npm-ua-parser-js-0.7.22
HIGH CVE-2020-7793 Npm-ua-parser-js-0.7.12
HIGH CVE-2020-7793 Npm-ua-parser-js-0.7.20
HIGH CVE-2020-8116 Npm-dot-prop-4.2.0
HIGH CVE-2020-8116 Npm-dot-prop-3.0.0
HIGH CVE-2021-23337 Npm-lodash.template-4.5.0
HIGH CVE-2021-23337 Npm-lodash.template-4.4.0
HIGH CVE-2021-23337 Npm-lodash-3.10.1
HIGH CVE-2021-23337 Npm-lodash-4.17.15
HIGH CVE-2021-23337 Npm-lodash-4.17.20
HIGH CVE-2021-23337 Npm-lodash-4.17.11
HIGH CVE-2021-23337 Npm-lodash-4.17.4
HIGH CVE-2021-23369 Npm-handlebars-4.7.6
HIGH CVE-2021-23369 Npm-handlebars-4.5.3
HIGH CVE-2021-23383 Npm-handlebars-4.7.6
HIGH CVE-2021-23383 Npm-handlebars-4.5.3
HIGH CVE-2021-23807 Npm-jsonpointer-4.0.1
HIGH CVE-2021-27516 Npm-urijs-1.19.2
HIGH CVE-2021-27516 Npm-urijs-1.19.0
HIGH CVE-2021-27516 Npm-urijs-1.18.12
HIGH CVE-2021-29059 Npm-is-svg-2.1.0
HIGH CVE-2021-32803 Npm-tar-2.2.1
HIGH CVE-2021-32803 Npm-tar-2.2.2
HIGH CVE-2021-32804 Npm-tar-2.2.1
HIGH CVE-2021-32804 Npm-tar-2.2.2
HIGH CVE-2021-33623 Npm-trim-newlines-1.0.0
HIGH CVE-2021-37701 Npm-tar-2.2.1
HIGH CVE-2021-37701 Npm-tar-2.2.2
HIGH CVE-2021-37712 Npm-tar-2.2.2
HIGH CVE-2021-37712 Npm-tar-2.2.1
HIGH CVE-2021-37713 Npm-tar-2.2.1
HIGH CVE-2021-37713 Npm-tar-2.2.2
HIGH CVE-2021-3777 Npm-tmpl-1.0.4
HIGH CVE-2021-3795 Npm-semver-regex-2.0.0
HIGH CVE-2021-3803 Npm-nth-check-1.0.2
HIGH CVE-2021-3803 Npm-nth-check-1.0.1
HIGH CVE-2021-3807 Npm-ansi-regex-4.1.0
HIGH CVE-2021-3807 Npm-ansi-regex-0.2.1
HIGH CVE-2021-3807 Npm-ansi-regex-5.0.0
HIGH CVE-2021-3807 Npm-ansi-regex-2.0.0
HIGH CVE-2021-3807 Npm-ansi-regex-3.0.0
HIGH CVE-2021-3807 Npm-ansi-regex-2.1.1
HIGH CVE-2021-3918 Npm-json-schema-0.2.3
HIGH CVE-2021-42740 Npm-shell-quote-1.7.1
HIGH CVE-2021-42740 Npm-shell-quote-1.6.1
HIGH CVE-2021-4279 Npm-fast-json-patch-2.2.1
HIGH CVE-2021-43138 Npm-async-1.5.2
HIGH CVE-2021-43138 Npm-async-2.1.4
HIGH CVE-2021-43138 Npm-async-0.2.10
HIGH CVE-2021-43138 Npm-async-0.9.2
HIGH CVE-2021-43138 Npm-async-2.6.0
HIGH CVE-2021-43138 Npm-async-2.6.3
HIGH CVE-2021-43138 Npm-async-3.2.0
HIGH CVE-2021-43138 Npm-async-2.5.0
HIGH CVE-2021-43307 Npm-semver-regex-2.0.0
HIGH CVE-2021-44906 Npm-minimist-1.2.3
HIGH CVE-2021-44906 Npm-minimist-0.0.8
HIGH CVE-2021-44906 Npm-minimist-1.2.0
HIGH CVE-2021-44906 Npm-minimist-0.0.10
HIGH CVE-2021-44906 Npm-minimist-1.2.5
HIGH CVE-2022-0144 Npm-shelljs-0.7.8
HIGH CVE-2022-0144 Npm-shelljs-0.7.7
HIGH CVE-2022-0144 Npm-shelljs-0.7.6
HIGH CVE-2022-0691 Npm-url-parse-1.4.7
HIGH CVE-2022-0691 Npm-url-parse-1.5.1
HIGH CVE-2022-21681 Npm-marked-0.7.0
HIGH CVE-2022-21681 Npm-marked-0.3.6
HIGH CVE-2022-23539 Npm-jsonwebtoken-8.5.1
HIGH CVE-2022-23540 Npm-jsonwebtoken-8.5.1
HIGH CVE-2022-24772 Npm-node-forge-0.10.0
HIGH CVE-2022-24772 Npm-node-forge-0.7.6
HIGH CVE-2022-24772 Npm-node-forge-0.6.33
HIGH CVE-2022-24999 Npm-qs-2.3.3
HIGH CVE-2022-24999 Npm-qs-6.2.0
HIGH CVE-2022-24999 Npm-qs-6.7.0
HIGH CVE-2022-24999 Npm-qs-6.5.2
HIGH CVE-2022-24999 Npm-qs-6.3.0
HIGH CVE-2022-24999 Npm-qs-6.4.0
HIGH CVE-2022-24999 Npm-qs-6.5.1
HIGH CVE-2022-24999 Npm-qs-6.5.0
HIGH CVE-2022-25881 Npm-http-cache-semantics-4.0.3
HIGH CVE-2022-25881 Npm-http-cache-semantics-3.8.1
HIGH CVE-2022-25883 Npm-semver-4.3.6
HIGH CVE-2022-25883 Npm-semver-5.3.0
HIGH CVE-2022-25883 Npm-semver-7.3.4
HIGH CVE-2022-25883 Npm-semver-7.3.5
HIGH CVE-2022-25883 Npm-semver-5.4.1
HIGH CVE-2022-25883 Npm-semver-7.3.7
HIGH CVE-2022-25883 Npm-semver-7.3.2
HIGH CVE-2022-25883 Npm-semver-7.0.0
HIGH CVE-2022-25883 Npm-semver-7.3.8
HIGH CVE-2022-25883 Npm-semver-5.7.1
HIGH CVE-2022-25883 Npm-semver-7.1.1
HIGH CVE-2022-25883 Npm-semver-5.5.0
HIGH CVE-2022-25883 Npm-semver-6.3.0
HIGH CVE-2022-25883 Npm-semver-5.5.1
HIGH CVE-2022-25883 Npm-semver-5.7.0
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.14
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.23
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.20
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.28
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.12
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.22
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.17
HIGH CVE-2022-29167 Npm-hawk-6.0.2
HIGH CVE-2022-29167 Npm-hawk-3.1.3
HIGH CVE-2022-3517 Npm-minimatch-3.0.3
HIGH CVE-2022-3517 Npm-minimatch-3.0.4
HIGH CVE-2022-37599 Npm-loader-utils-3.2.0
HIGH CVE-2022-37599 Npm-loader-utils-1.2.3
HIGH CVE-2022-37599 Npm-loader-utils-1.1.0
HIGH CVE-2022-37599 Npm-loader-utils-2.0.0
HIGH CVE-2022-37599 Npm-loader-utils-1.4.0
HIGH CVE-2022-37601 Npm-loader-utils-0.2.16
HIGH CVE-2022-37601 Npm-loader-utils-1.4.0
HIGH CVE-2022-37601 Npm-loader-utils-1.2.3
HIGH CVE-2022-37601 Npm-loader-utils-1.1.0
HIGH CVE-2022-37601 Npm-loader-utils-0.2.17
HIGH CVE-2022-37601 Npm-loader-utils-2.0.0
HIGH CVE-2022-37603 Npm-loader-utils-1.4.0
HIGH CVE-2022-37603 Npm-loader-utils-2.0.0

More results are available on the CxOne platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant