New flow of documentation #2179
18 new alerts including 1 critical severity security vulnerability
New alerts in code changed by this pull request
Security Alerts:
- 1 critical
- 7 high
- 9 medium
- 1 low
Alerts not introduced by this pull request might have been detected because the code changes were too large.
See annotations below for details.
Annotations
Check failure on line 11019 in package-lock.json
Code scanning / Trivy
nodejs-axios: Regular expression denial of service in trim function High
Check warning on line 11019 in package-lock.json
Code scanning / Trivy
nodejs-axios: allows an attacker to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address Medium
Check warning on line 11019 in package-lock.json
Code scanning / Trivy
axios: exposure of confidential data stored in cookies Medium
Check failure on line 11019 in package-lock.json
Code scanning / Trivy
axios: Possible SSRF and Credential Leakage via Absolute URL in axios Requests High
Check failure on line 12243 in package-lock.json
Code scanning / Trivy
cipher-base: Cipher-base hash manipulation Critical
Check warning on line 12669 in package-lock.json
Code scanning / Trivy
nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets Medium
Check failure on line 16637 in package-lock.json
Code scanning / Trivy
follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor High
Check warning on line 16637 in package-lock.json
Code scanning / Trivy
follow-redirects: Exposure of Sensitive Information via Authorization Header leak Medium
Check warning on line 16637 in package-lock.json
Code scanning / Trivy
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() Medium
Check warning on line 16637 in package-lock.json
Code scanning / Trivy
follow-redirects: Possible credential leak Medium
Check failure on line 17884 in package-lock.json
Code scanning / Trivy
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability High
Check failure on line 19980 in package-lock.json
Code scanning / Trivy
nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode High
Check failure on line 27849 in package-lock.json
Code scanning / Trivy
node-fetch: exposure of sensitive information to an unauthorized actor High
Check warning on line 29426 in package-lock.json
Code scanning / Trivy
index.js in the ssri module before 5.2.2 for Node.js is prone to a reg ... Medium
Check failure on line 30341 in package-lock.json
Code scanning / Trivy
cross-spawn: regular expression denial of service High
Check notice on line 30687 in package-lock.json
Code scanning / Trivy
tmp: tmp Symbolic Link Write Vulnerability Low
Check warning on line 31955 in package-lock.json
Code scanning / Trivy
webpack-dev-server: webpack-dev-server information exposure Medium
Check warning on line 31955 in package-lock.json
Code scanning / Trivy
webpack-dev-server: webpack-dev-server information exposure Medium