ugh, npm.
There are 92 npm security advisories affecting our repositories.
Severity: critical
Prototype Pollution in property-expr
Severity: critical
flat vulnerable to Prototype Pollution
Severity: critical
ejs template injection vulnerability
Severity: critical
Prototype Pollution in immer
Severity: critical
xmldom allows multiple root nodes in a DOM
Severity: critical
Remote code execution in simple-git
Severity: critical
Prototype Pollution in minimist
Severity: critical
Prototype Pollution in minimist
Severity: critical
Prototype pollution in webpack loader-utils
Severity: critical
Prototype pollution in webpack loader-utils
Severity: critical
Insufficient validation when decoding a Socket.IO packet
Severity: critical
Improper Neutralization of Special Elements used in a Command in Shell-quote
Severity: critical
Arbitrary Code Execution in underscore
Severity: critical
json-schema is vulnerable to Prototype Pollution
Severity: high
Regular Expression Denial of Service (ReDoS)
Severity: high
Cross-Site Scripting in Prism
Severity: high
Prototype Pollution in async
Severity: high
ReDoS Vulnerability in ua-parser-js version
Severity: high
ReDoS Vulnerability in ua-parser-js version
Severity: high
Command injection in simple-git
Severity: high
Infinite loop in jpeg-js
Severity: high
Prototype Pollution in immer
Severity: high
TaffyDB can allow access to any data items in the DB
Severity: high
Inefficient Regular Expression Complexity in marked
Severity: high
Inefficient Regular Expression Complexity in marked
Severity: high
Command injection in simple-git
Severity: high
simple-git vulnerable to Remote Code Execution when enabling the ext transport protocol
Severity: high
Race Condition in Grunt
Severity: high
GraphiQL introspection schema template injection attack
Severity: high
Regular Expression Denial of Service (ReDOS)
Severity: high
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
Severity: high
Regular Expression Denial of Service (ReDoS) in Prism
Severity: high
Regular Expression Denial of Service in trim
Severity: high
Denial of service in prismjs
Severity: high
Prototype Pollution in immer
Severity: high
qs vulnerable to Prototype Pollution
Severity: high
qs vulnerable to Prototype Pollution
Severity: high
qs vulnerable to Prototype Pollution
Severity: high
Cross-site Scripting in Prism
Severity: high
Exposure of Sensitive Information in simple-get
Severity: high
http-cache-semantics vulnerable to Regular Expression Denial of Service
Severity: high
Prototype Pollution in JSON5 via Parse Method
Severity: high
Prototype Pollution in JSON5 via Parse Method
Severity: high
minimatch ReDoS vulnerability
Severity: high
glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex
Severity: high
Inefficient Regular Expression Complexity in chalk/ansi-regex
Severity: high
Inefficient Regular Expression Complexity in chalk/ansi-regex
Severity: high
Inefficient Regular Expression Complexity in nth-check
Severity: high
Exposure of sensitive information in follow-redirects
Severity: high
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS)
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS)
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
Severity: high
Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
Severity: high
Terser insecure use of regular expressions leads to ReDoS
Severity: high
Uncontrolled Resource Consumption in trim-newlines
Severity: high
Regular expression denial of service in scss-tokenizer
Severity: high
Improper Privilege Management in shelljs
Severity: moderate
ReDOS vulnerabities: multiple grammars
Severity: moderate
Uncontrolled resource consumption in jpeg-js
Severity: moderate
Improper Privilege Management in shelljs
Severity: moderate
Inefficient Regular Expression Complexity in Validator.js
Severity: moderate
cookiejar Regular Expression Denial of Service via Cookie.parse function
Severity: moderate
Incorrect Authorization in cross-fetch
Severity: moderate
Path Traversal in Grunt
Severity: moderate
Got allows a redirect to a UNIX socket
Severity: moderate
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
Severity: moderate
Prototype Pollution in Ajv
Severity: moderate
react-dev-utils OS Command Injection in function `getProcessForPort`
Severity: moderate
Potential XSS vulnerability in jQuery
Severity: moderate
Potential XSS vulnerability in jQuery
Severity: moderate
Insufficient Granularity of Access Control in JSDom
Severity: moderate
prismjs Regular Expression Denial of Service vulnerability
Severity: moderate
Uncaught exception in engine.io
Severity: moderate
Regular Expression Denial of Service in postcss
Severity: moderate
Improper Certificate Validation in node-sass
Severity: moderate
Inefficient Regular Expression Complexity in validator.js
Severity: moderate
Regular Expression Denial of Service in browserslist
Severity: moderate
Prototype Pollution in highlight.js
Severity: moderate
Prototype Pollution in minimist
Severity: moderate
Open redirect in karma
Severity: moderate
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects
Severity: moderate
Cross-site Scripting in karma
Severity: moderate
Uncontrolled Resource Consumption in markdown-it
Severity: moderate
Server-Side Request Forgery in Request
Severity: low
The `size` option isn't honored after following a redirect in node-fetch
Severity: low
decode-uri-component vulnerable to Denial of Service (DoS)
Severity: low
Regular expression denial of service in semver-regex