Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 29 vulnerabilities #205

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

fix: package.json & package-lock.json to reduce vulnerabilities

4a0d3e8
Select commit
Loading
Failed to load commit list.
Open

[Snyk] Fix for 29 vulnerabilities #205

fix: package.json & package-lock.json to reduce vulnerabilities
4a0d3e8
Select commit
Loading
Failed to load commit list.
Debricked / Vulnerability analysis failed Dec 19, 2023 in 1m 20s

An automation triggered a pipeline failure

Found 60 vulnerabilities. An additional 0 vulnerabilities have been marked as unaffected.

Output from Automations

6 rules were checked:


If a new dependency is added where the license risk is at least medium

then notify all users in the group admins by email

✔️ The rule did not trigger. Manage rule



If a dependency contains a vulnerability which has not been marked as unaffected and which has not triggered this rule for this dependency before

then notify all users in the group admins by email

✔️ The rule did not trigger. Manage rule



If there is a dependency where the license risk is at least high

then send a pipeline warning

✔️ The rule did not trigger. Manage rule



If a new dependency is added where the license risk is at least high

then fail pipeline

✔️ The rule did not trigger. Manage rule



If a dependency contains a vulnerability which has not been marked as unaffected

then send a pipeline warning

⚠️ The rule triggered for the following vulnerabilities, causing a pipeline warning. Manage rule

Vulnerability CVSS2 CVSS3 Dependency Dependency Licenses
CVE-2020-28464 10 9.8 djv (npm) MIT
CVE-2022-29078 7.5 9.8 ejs (npm) Apache-2.0, Debricked Unknown License, MIT
CVE-2023-36665 N/A 9.8 protobufjs (npm) Apache-2.0, BSD-3-Clause
CVE-2021-23807 7.5 9.8 jsonpointer (npm) Debricked Unknown License, MIT
CVE-2023-45133 N/A 8.8 @babel/traverse (npm) MIT
CVE-2022-46175 N/A 8.8 json5 (npm) Debricked Unknown License, MIT
CVE-2021-37712 4.4 8.6 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2021-37701 4.4 8.6 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2021-37713 4.4 8.6 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2021-32804 5.8 8.1 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2021-32803 5.8 8.1 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2020-36604 N/A 8.1 @hapi/hoek (npm) BSD-3-Clause
CVE-2022-23539 N/A 8.1 jsonwebtoken (npm) MIT
CVE-2021-43138 6.8 7.8 async (npm) MIT
CVE-2022-23540 N/A 7.6 jsonwebtoken (npm) MIT
CVE-2021-3765 5 7.5 validator (npm) MIT
CVE-2016-20018 N/A 7.5 knex (npm) MIT
CVE-2022-25887 N/A 7.5 sanitize-html (npm) MIT
CVE-2022-25881 N/A 7.5 http-cache-semantics (npm) BSD-2-Clause
CVE-2022-38900 N/A 7.5 decode-uri-component (npm) MIT
CVE-2021-27290 4.3 7.5 ssri (npm) CC0-1.0, ISC
CVE-2022-25883 N/A 7.5 semver (npm) BSD-2-Clause, Debricked Unknown License, ISC, MIT
CVE-2022-3517 N/A 7.5 minimatch (npm) Debricked Unknown License, ISC, MIT
CVE-2023-26115 N/A 7.5 word-wrap (npm) MIT
CVE-2023-2251 N/A 7.5 yaml (npm) Debricked Unknown License, ISC, MIT
CVE-2022-25878 5 7.5 protobufjs (npm) Apache-2.0, BSD-3-Clause
CVE-2021-3749 7.8 7.5 axios (npm) MIT
CVE-2022-31129 5 7.5 moment (npm) MIT
CVE-2021-3807 7.8 7.5 ansi-regex (npm) MIT
CVE-2020-28469 5 7.5 glob-parent (npm) ISC
CVE-2021-33502 5 7.5 normalize-url (npm) MIT
CVE-2019-20149 5 7.5 kind-of (npm) MIT
CVE-2020-8203 5.8 7.4 lodash (npm) MIT
CVE-2020-7788 7.5 7.3 ini (npm) Debricked Unknown License, ISC, MIT
CVE-2020-7774 7.5 7.3 y18n (npm) ISC
CVE-2020-8116 7.5 7.3 dot-prop (npm) MIT
CVE-2021-23337 6.5 7.2 lodash (npm) MIT
CVE-2022-38778 N/A 6.5 decode-uri-component (npm) MIT
CVE-2023-45857 N/A 6.5 axios (npm) MIT
CVE-2019-10795 6.5 6.3 undefsafe (npm) MIT
CVE-2022-23541 N/A 6.3 jsonwebtoken (npm) MIT
CVE-2022-0235 5.8 6.1 node-fetch (npm) MIT
CVE-2020-15366 6.8 5.6 ajv (npm) MIT
CVE-2019-14939 2.1 5.5 mysql (npm) MIT
CVE-2021-29060 5 5.3 color-string (npm) Debricked Unknown License, MIT
CVE-2017-16137 5 5.3 debug (npm) Debricked Unknown License, MIT
CVE-2022-21670 5 5.3 markdown-it (npm) MIT
CVE-2020-15168 5 5.3 node-fetch (npm) MIT
CVE-2023-44270 N/A 5.3 postcss (npm) MIT
CVE-2021-26540 5 5.3 sanitize-html (npm) MIT
CVE-2021-26539 5 5.3 sanitize-html (npm) MIT
CVE-2022-33987 5 5.3 got (npm) MIT
CVE-2020-7608 4.6 5.3 yargs-parser (npm) ISC
CVE-2020-28500 5 5.3 lodash (npm) MIT
CVE-2021-23362 5 5.3 hosted-git-info (npm) ISC
debricked-124 N/A N/A acorn (npm) MIT
debricked-97171 N/A N/A npm-registry-fetch (npm) ISC, MIT
debricked-149739 N/A N/A yargs-parser (npm) ISC
debricked-155741 N/A N/A ini (npm) Debricked Unknown License, ISC, MIT
debricked-97165 N/A N/A lodash (npm) MIT


If a dependency contains a vulnerability which has not been marked as unaffected 
where CVSS is at least high (7.0-8.9)

then fail pipeline

❌ The rule triggered for the following vulnerabilities, causing a pipeline failure. Manage rule

Vulnerability CVSS2 CVSS3 Dependency Dependency Licenses
CVE-2020-28464 10 9.8 djv (npm) MIT
CVE-2022-29078 7.5 9.8 ejs (npm) Apache-2.0, Debricked Unknown License, MIT
CVE-2021-23807 7.5 9.8 jsonpointer (npm) Debricked Unknown License, MIT
CVE-2023-36665 N/A 9.8 protobufjs (npm) Apache-2.0, BSD-3-Clause
CVE-2023-45133 N/A 8.8 @babel/traverse (npm) MIT
CVE-2022-46175 N/A 8.8 json5 (npm) Debricked Unknown License, MIT
CVE-2021-37713 4.4 8.6 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2021-37701 4.4 8.6 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2021-37712 4.4 8.6 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2021-32803 5.8 8.1 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2021-32804 5.8 8.1 tar (npm) BSD-2-Clause, Debricked Unknown License, ISC
CVE-2020-36604 N/A 8.1 @hapi/hoek (npm) BSD-3-Clause
CVE-2022-23539 N/A 8.1 jsonwebtoken (npm) MIT
CVE-2021-43138 6.8 7.8 async (npm) MIT
CVE-2022-23540 N/A 7.6 jsonwebtoken (npm) MIT
CVE-2023-26115 N/A 7.5 word-wrap (npm) MIT
CVE-2022-25883 N/A 7.5 semver (npm) BSD-2-Clause, Debricked Unknown License, ISC, MIT
CVE-2022-25881 N/A 7.5 http-cache-semantics (npm) BSD-2-Clause
CVE-2021-3749 7.8 7.5 axios (npm) MIT
CVE-2022-25887 N/A 7.5 sanitize-html (npm) MIT
CVE-2016-20018 N/A 7.5 knex (npm) MIT
CVE-2021-3765 5 7.5 validator (npm) MIT
CVE-2022-31129 5 7.5 moment (npm) MIT
CVE-2022-38900 N/A 7.5 decode-uri-component (npm) MIT
CVE-2021-27290 4.3 7.5 ssri (npm) CC0-1.0, ISC
CVE-2022-3517 N/A 7.5 minimatch (npm) Debricked Unknown License, ISC, MIT
CVE-2022-25878 5 7.5 protobufjs (npm) Apache-2.0, BSD-3-Clause
CVE-2019-20149 5 7.5 kind-of (npm) MIT
CVE-2021-3807 7.8 7.5 ansi-regex (npm) MIT
CVE-2021-33502 5 7.5 normalize-url (npm) MIT
CVE-2020-28469 5 7.5 glob-parent (npm) ISC
CVE-2023-2251 N/A 7.5 yaml (npm) Debricked Unknown License, ISC, MIT
CVE-2020-8203 5.8 7.4 lodash (npm) MIT
CVE-2020-7788 7.5 7.3 ini (npm) Debricked Unknown License, ISC, MIT
CVE-2020-8116 7.5 7.3 dot-prop (npm) MIT
CVE-2020-7774 7.5 7.3 y18n (npm) ISC
CVE-2021-23337 6.5 7.2 lodash (npm) MIT