You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Multiple vulnerabilities have been detected in the following NPM packages. Action is required to patch or upgrade these packages to mitigate potential security risks.
send - Vulnerable to template injection that can lead to XSS
Severity: Moderate
Package: send
Detected in: package-lock.json
serve-static - Vulnerable to template injection that can lead to XSS
Severity: Moderate
Package: serve-static
Detected in: package-lock.json
express - Vulnerable to XSS via response.redirect()
Severity: Moderate
Package: express
Detected in: package-lock.json
webpack - DOM Clobbering Gadget in AutoPublicPathRuntimeModule
Severity: Moderate
Package: webpack
Detected in: package-lock.json
Steps to Reproduce
Analyze the package-lock.json for the listed vulnerabilities.
Upgrade the vulnerable packages to their latest secure versions.
If no patch is available, consider removing the vulnerable packages or using an alternative.
Expected Outcome
All vulnerabilities should be addressed, either by upgrading to secure versions or implementing workarounds where necessary, to ensure the security of the system.
The text was updated successfully, but these errors were encountered:
Description
Multiple vulnerabilities have been detected in the following NPM packages. Action is required to patch or upgrade these packages to mitigate potential security risks.
Vulnerabilities List
protobufjs - Prototype Pollution Vulnerability
protobufjs
package-lock.json
Babel - Arbitrary Code Execution when compiling specifically crafted malicious code
babel/traverse
package-lock.json
rollup - DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS
rollup
package-lock.json
body-parser - Vulnerable to denial of service when URL encoding is enabled
body-parser
package-lock.json
path-to-regexp - Outputs backtracking regular expressions
path-to-regexp
package-lock.json
axios - Server-Side Request Forgery
axios
package-lock.json
ws - Vulnerable to a DoS attack when handling requests with many HTTP headers
ws
package-lock.json
braces - Uncontrolled resource consumption
braces
package-lock.json
webpack-dev-middleware - Path traversal vulnerability
webpack-dev-middleware
package-lock.json
semver - Regular Expression Denial of Service (ReDoS)
semver
package-lock.json
nth-check - Inefficient Regular Expression Complexity
nth-check
package-lock.json
send - Vulnerable to template injection that can lead to XSS
send
package-lock.json
serve-static - Vulnerable to template injection that can lead to XSS
serve-static
package-lock.json
express - Vulnerable to XSS via
response.redirect()
express
package-lock.json
webpack - DOM Clobbering Gadget in
AutoPublicPathRuntimeModule
webpack
package-lock.json
Steps to Reproduce
package-lock.json
for the listed vulnerabilities.Expected Outcome
The text was updated successfully, but these errors were encountered: