Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # npm audit report
- axios 0.8.1 - 0.27.2
- Severity: moderate
- Axios Cross-Site Request Forgery Vulnerability - https://github.com/advisories/GHSA-wf5p-g6vw-rhxx
- fix available via `npm audit fix --force`
- Will install [email protected], which is a breaking change
- node_modules/axios
- body-parser <1.20.3
- Severity: high
- body-parser vulnerable to denial of service when url encoding is enabled - https://github.com/advisories/GHSA-qwcr-r2fm-qrc7
- fix available via `npm audit fix`
- node_modules/body-parser
- express *
- Depends on vulnerable versions of body-parser
- Depends on vulnerable versions of cookie
- Depends on vulnerable versions of path-to-regexp
- Depends on vulnerable versions of send
- node_modules/express
- braces <3.0.3
- Severity: high
- Uncontrolled resource consumption in braces - https://github.com/advisories/GHSA-grv7-fg5c-xmjg
- fix available via `npm audit fix`
- node_modules/braces
- cookie <0.7.0
- cookie accepts cookie name, path, and domain with out of bounds characters - https://github.com/advisories/GHSA-pxg6-pf52-xh8x
- fix available via `npm audit fix --force`
- Will install [email protected], which is a breaking change
- node_modules/cookie
- node_modules/express/node_modules/cookie
- cookie-parser >=1.0.1
- Depends on vulnerable versions of cookie
- node_modules/cookie-parser
- engine.io 0.7.8 - 0.7.9 || >=1.8.0
- Depends on vulnerable versions of cookie
- Depends on vulnerable versions of ws
- node_modules/engine.io
- express *
- Depends on vulnerable versions of body-parser
- Depends on vulnerable versions of cookie
- Depends on vulnerable versions of path-to-regexp
- Depends on vulnerable versions of send
- node_modules/express
- ejs <3.1.10
- Severity: moderate
- ejs lacks certain pollution protection - https://github.com/advisories/GHSA-ghr5-ch3p-vcr6
- fix available via `npm audit fix`
- node_modules/ejs
- engine.io 0.7.8 - 0.7.9 || >=1.8.0
- Severity: high
- Uncaught exception in engine.io - https://github.com/advisories/GHSA-r7qp-cfhv-p84w
- engine.io Uncaught Exception vulnerability - https://github.com/advisories/GHSA-q9mw-68c2-j6m5
- Depends on vulnerable versions of cookie
- Depends on vulnerable versions of ws
- fix available via `npm audit fix`
- node_modules/engine.io
- express *
- Severity: high
- Express.js Open Redirect in malformed URLs - https://github.com/advisories/GHSA-rv95-896h-c2vc
- express vulnerable to XSS via response.redirect() - https://github.com/advisories/GHSA-qw6h-vgh9-j6wx
- Depends on vulnerable versions of body-parser
- Depends on vulnerable versions of cookie
- Depends on vulnerable versions of path-to-regexp
- Depends on vulnerable versions of send
- fix available via `npm audit fix`
- node_modules/express
- follow-redirects <=1.15.5
- Severity: moderate
- Follow Redirects improperly handles URLs in the url.parse() function - https://github.com/advisories/GHSA-jchw-25xp-jwwc
- follow-redirects' Proxy-Authorization header kept across hosts - https://github.com/advisories/GHSA-cxjh-pqwp-8mfp
- fix available via `npm audit fix`
- node_modules/follow-redirects
- got <11.8.5
- Severity: moderate
- Got allows a redirect to a UNIX socket - https://github.com/advisories/GHSA-pfrx-2q88-qq97
- fix available via `npm audit fix`
- node_modules/got
- package-json <=6.5.0
- Depends on vulnerable versions of got
- node_modules/package-json
- latest-version 0.2.0 - 5.1.0
- Depends on vulnerable versions of package-json
- node_modules/latest-version
- update-notifier 0.2.0 - 5.1.0
- Depends on vulnerable versions of latest-version
- node_modules/update-notifier
- nodemon 1.3.5 - 2.0.16 || 2.0.18
- Depends on vulnerable versions of update-notifier
- node_modules/nodemon
- http-cache-semantics <4.1.1
- Severity: high
- http-cache-semantics vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-rc47-6667-2j5j
- fix available via `npm audit fix`
- node_modules/http-cache-semantics
- ip *
- Severity: high
- NPM IP package incorrectly identifies some private IP addresses as public - https://github.com/advisories/GHSA-78xj-cgh5-2h22
- ip SSRF improper categorization in isPublic - https://github.com/advisories/GHSA-2p57-rm9w-gvfp
- fix available via `npm audit fix`
- node_modules/ip
- jsonwebtoken <=8.5.1
- Severity: high
- jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify() - https://github.com/advisories/GHSA-qwph-4952-7xr6
- jsonwebtoken unrestricted key type could lead to legacy keys usage - https://github.com/advisories/GHSA-8cf7-32gw-wr33
- fix available via `npm audit fix --force`
- Will install [email protected], which is a breaking change
- node_modules/jsonwebtoken
- mongodb 4.0.0 - 4.16.0
- Severity: moderate
- MongoDB Driver may publish events containing authentication-related data - https://github.com/advisories/GHSA-vxvm-qww3-2fh7
- fix available via `npm audit fix`
- node_modules/mongodb
- mongoose 0.0.3 - 0.0.6 || 6.0.0-rc0 - 6.11.6
- Depends on vulnerable versions of mongodb
- node_modules/mongoose
- mongoose 0.0.3 - 0.0.6 || 6.0.0-rc0 - 6.11.6
- Severity: critical
- automattic/mongoose vulnerable to Prototype pollution via Schema.path - https://github.com/advisories/GHSA-f825-f98c-gj3g
- Mongoose Prototype Pollution vulnerability - https://github.com/advisories/GHSA-9m93-w8w6-76hh
- Depends on vulnerable versions of mongodb
- fix available via `npm audit fix`
- node_modules/mongoose
- nodemailer <=6.9.8
- Severity: moderate
- nodemailer ReDoS when trying to send a specially crafted email - https://github.com/advisories/GHSA-9h6g-pr28-7cqp
- fix available via `npm audit fix`
- node_modules/nodemailer
- path-to-regexp <0.1.10
- Severity: high
- path-to-regexp outputs backtracking regular expressions - https://github.com/advisories/GHSA-9wv6-86v2-598j
- fix available via `npm audit fix`
- node_modules/path-to-regexp
- express *
- Depends on vulnerable versions of body-parser
- Depends on vulnerable versions of cookie
- Depends on vulnerable versions of path-to-regexp
- Depends on vulnerable versions of send
- node_modules/express
- pug <=3.0.2
- Severity: moderate
- Pug allows JavaScript code execution if an application accepts untrusted input - https://github.com/advisories/GHSA-3965-hpx2-q597
- fix available via `npm audit fix`
- node_modules/pug
- request *
- Severity: moderate
- Server-Side Request Forgery in Request - https://github.com/advisories/GHSA-p8p7-x288-28g6
- Depends on vulnerable versions of tough-cookie
- No fix available
- node_modules/request
- semver <=5.7.1 || 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
- Severity: high
- semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
- semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
- semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
- fix available via `npm audit fix`
- node_modules/make-dir/node_modules/semver
- node_modules/package-json/node_modules/semver
- node_modules/semver
- node_modules/semver-diff/node_modules/semver
- node_modules/update-notifier/node_modules/semver
- send <0.19.0
- Severity: moderate
- send vulnerable to template injection that can lead to XSS - https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
- fix available via `npm audit fix`
- node_modules/send
- express *
- Depends on vulnerable versions of body-parser
- Depends on vulnerable versions of cookie
- Depends on vulnerable versions of path-to-regexp
- Depends on vulnerable versions of send
- node_modules/express
- serve-static <=1.16.0
- Depends on vulnerable versions of send
- node_modules/serve-static
- serve-static <=1.16.0
- Severity: moderate
- serve-static vulnerable to template injection that can lead to XSS - https://github.com/advisories/GHSA-cm22-4g7w-348p
- Depends on vulnerable versions of send
- fix available via `npm audit fix`
- node_modules/serve-static
- socket.io 3.0.0 - 4.6.1
- Severity: high
- socket.io has an unhandled 'error' event - https://github.com/advisories/GHSA-25hc-qcg6-38wj
- fix available via `npm audit fix`
- node_modules/socket.io
- socket.io-parser 4.0.0 - 4.2.2
- Severity: critical
- Insufficient validation when decoding a Socket.IO packet - https://github.com/advisories/GHSA-qm95-pgcg-qqfq
- Insufficient validation when decoding a Socket.IO packet - https://github.com/advisories/GHSA-cqmj-92xf-r6r9
- fix available via `npm audit fix`
- node_modules/socket.io-parser
- tough-cookie <4.1.3
- Severity: moderate
- tough-cookie Prototype Pollution vulnerability - https://github.com/advisories/GHSA-72xf-g2v4-qvf3
- No fix available
- node_modules/tough-cookie
- request *
- Depends on vulnerable versions of tough-cookie
- node_modules/request
- ws 8.0.0 - 8.17.0
- Severity: high
- ws affected by a DoS when handling a request with many HTTP headers - https://github.com/advisories/GHSA-3h5v-q93c-6h6q
- fix available via `npm audit fix`
- node_modules/ws
- engine.io 0.7.8 - 0.7.9 || >=1.8.0
- Depends on vulnerable versions of cookie
- Depends on vulnerable versions of ws
- node_modules/engine.io
- 30 vulnerabilities (2 low, 15 moderate, 11 high, 2 critical)
- To address issues that do not require attention, run:
- npm audit fix
- To address all issues possible (including breaking changes), run:
- npm audit fix --force
- Some issues need review, and may require choosing
- a different dependency.
Advertisement