ugh, npm.
There are 160 npm security advisories affecting our repositories.
Severity: critical
Insufficient Entropy in cryptiles
Severity: critical
Prototype Pollution in property-expr
Severity: critical
json-pointer vulnerable to Prototype Pollution
Severity: critical
flat vulnerable to Prototype Pollution
Severity: critical
ejs template injection vulnerability
Severity: critical
Prototype Pollution in immer
Severity: critical
Improper parsing of octal bytes in netmask
Severity: critical
Prototype Pollution in lodash
Severity: critical
xmldom allows multiple root nodes in a DOM
Severity: critical
Remote code execution in simple-git
Severity: critical
Prototype Pollution in minimist
Severity: critical
Prototype Pollution in minimist
Severity: critical
Prototype pollution in webpack loader-utils
Severity: critical
Prototype pollution in webpack loader-utils
Severity: critical
Improper Neutralization of Special Elements used in a Command in Shell-quote
Severity: critical
Arbitrary Code Execution in underscore
Severity: critical
json-schema is vulnerable to Prototype Pollution
Severity: high
Regular Expression Denial of Service (ReDoS)
Severity: high
Cross-Site Scripting in Prism
Severity: high
Prototype Pollution in async
Severity: high
Prototype Pollution in async
Severity: high
ReDoS Vulnerability in ua-parser-js version
Severity: high
ReDoS Vulnerability in ua-parser-js version
Severity: high
Command injection in simple-git
Severity: high
Insecure template handling in Express-handlebars
Severity: high
Infinite loop in jpeg-js
Severity: high
Crash in HeaderParser in dicer
Severity: high
tmpl vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion
Severity: high
Node-Redis potential exponential regex in monitor mode
Severity: high
Prototype Pollution in immer
Severity: high
TaffyDB can allow access to any data items in the DB
Severity: high
Inefficient Regular Expression Complexity in marked
Severity: high
Inefficient Regular Expression Complexity in marked
Severity: high
Denial of service vulnerability exists in libxmljs
Severity: high
Command injection in simple-git
Severity: high
simple-git vulnerable to Remote Code Execution when enabling the ext transport protocol
Severity: high
Command injection in git-clone
Severity: high
Race Condition in Grunt
Severity: high
GraphiQL introspection schema template injection attack
Severity: high
Regular Expression Denial of Service (ReDOS)
Severity: high
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
Severity: high
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
Severity: high
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
Severity: high
Regular Expression Denial of Service (ReDoS) in Prism
Severity: high
Regular Expression Denial of Service in trim
Severity: high
Prototype pollution in pathval
Severity: high
Denial of service in chrono-node
Severity: high
Prototype Pollution in merge
Severity: high
Denial of service in prismjs
Severity: high
Prototype Pollution in immer
Severity: high
qs vulnerable to Prototype Pollution
Severity: high
qs vulnerable to Prototype Pollution
Severity: high
qs vulnerable to Prototype Pollution
Severity: high
qs vulnerable to Prototype Pollution
Severity: high
Luxon Inefficient Regular Expression Complexity vulnerability
Severity: high
Code Injection in pac-resolver
Severity: high
Code Injection in pac-resolver
Severity: high
Cookie exposure in requestretry
Severity: high
Cross-site Scripting in Prism
Severity: high
Exposure of Sensitive Information in simple-get
Severity: high
http-cache-semantics vulnerable to Regular Expression Denial of Service
Severity: high
Prototype Pollution in JSON5 via Parse Method
Severity: high
Prototype Pollution in JSON5 via Parse Method
Severity: high
minimatch ReDoS vulnerability
Severity: high
glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex
Severity: high
Command Injection in lodash
Severity: high
Inefficient Regular Expression Complexity in chalk/ansi-regex
Severity: high
Inefficient Regular Expression Complexity in chalk/ansi-regex
Severity: high
Inefficient Regular Expression Complexity in chalk/ansi-regex
Severity: high
Prototype Pollution in y18n
Severity: high
Inefficient Regular Expression Complexity in nth-check
Severity: high
Uncontrolled Resource Consumption in ansi-html
Severity: high
Exposure of sensitive information in follow-redirects
Severity: high
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS)
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS)
Severity: high
ini before 1.3.6 vulnerable to Prototype Pollution via ini.parse
Severity: high
Prototype Pollution in lodash
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning
Severity: high
ReDoS in normalize-url
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
Severity: high
Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization
Severity: high
Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
Severity: high
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
Severity: high
Improper Verification of Cryptographic Signature in node-forge
Severity: high
Improper Verification of Cryptographic Signature in node-forge
Severity: high
Prototype Pollution in node-forge
Severity: high
Terser insecure use of regular expressions leads to ReDoS
Severity: high
Terser insecure use of regular expressions leads to ReDoS
Severity: high
Uncontrolled Resource Consumption in trim-newlines
Severity: high
axios Inefficient Regular Expression Complexity vulnerability
Severity: high
Cross-realm object access in Webpack 5
Severity: high
Code Injection in js-yaml
Severity: high
Path Traversal: 'dir/../../filename' in moment.locale
Severity: high
Uncontrolled Resource Consumption in Hawk
Severity: high
Moment.js vulnerable to Inefficient Regular Expression Complexity
Severity: high
Improper Privilege Management in shelljs
Severity: high
Prototype Pollution in protobufjs
Severity: moderate
Server side request forgery in SwaggerUI
Severity: moderate
Denial of Service in mem
Severity: moderate
Denial of Service in js-yaml
Severity: moderate
ReDOS vulnerabities: multiple grammars
Severity: moderate
Uncontrolled resource consumption in jpeg-js
Severity: moderate
Improper Privilege Management in shelljs
Severity: moderate
Inefficient Regular Expression Complexity in Validator.js
Severity: moderate
cookiejar Regular Expression Denial of Service via Cookie.parse function
Severity: moderate
Incorrect Authorization in cross-fetch
Severity: moderate
Path Traversal in Grunt
Severity: moderate
Improper Verification of Cryptographic Signature in `node-forge`
Severity: moderate
Spoofing attack in swagger-ui-dist
Severity: moderate
yargs-parser Vulnerable to Prototype Pollution
Severity: moderate
Vercel ms Inefficient Regular Expression Complexity vulnerability
Severity: moderate
JOSE vulnerable to resource exhaustion via specifically crafted JWE
Severity: moderate
Prototype Pollution in json-pointer
Severity: moderate
Got allows a redirect to a UNIX socket
Severity: moderate
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
Severity: moderate
Prototype Pollution in Ajv
Severity: moderate
Regular Expression Denial of Service (ReDoS) in lodash
Severity: moderate
react-dev-utils OS Command Injection in function `getProcessForPort`
Severity: moderate
Potential XSS vulnerability in jQuery
Severity: moderate
Potential XSS vulnerability in jQuery
Severity: moderate
deep-object-diff vulnerable to Prototype Pollution
Severity: moderate
Vitejs Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service
Severity: moderate
Insufficient Granularity of Access Control in JSDom
Severity: moderate
prismjs Regular Expression Denial of Service vulnerability
Severity: moderate
Prototype poisoning
Severity: moderate
Vuetify Cross-site Scripting vulnerability
Severity: moderate
jsonwebtoken unrestricted key type could lead to legacy keys usage
Severity: moderate
Regular Expression Denial of Service in postcss
Severity: moderate
Inefficient Regular Expression Complexity in validator.js
Severity: moderate
Regular Expression Denial of Service in path-parse
Severity: moderate
Regular Expression Denial of Service (ReDOS)
Severity: moderate
Passing in a non-string 'html' argument can lead to unsanitized output
Severity: moderate
Regular Expression Denial of Service in browserslist
Severity: moderate
Regular Expression Denial of Service in hosted-git-info
Severity: moderate
netmask npm package vulnerable to octal input data
Severity: moderate
Prototype Pollution in highlight.js
Severity: moderate
Prototype Pollution in minimist
Severity: moderate
Prototype Pollution in minimist
Severity: moderate
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects
Severity: moderate
Open Redirect in node-forge
Severity: moderate
Uncontrolled Resource Consumption in markdown-it
Severity: moderate
ReDoS in Sec-Websocket-Protocol header
Severity: moderate
@sideway/formula contains Regular Expression Denial of Service (ReDoS) Vulnerability
Severity: moderate
jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC
Severity: moderate
jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()
Severity: moderate
Server-Side Request Forgery in Request
Severity: moderate
Server-Side Request Forgery in Request
Severity: low
The `size` option isn't honored after following a redirect in node-fetch
Severity: low
Prototype Pollution in node-forge debug API.
Severity: low
Prototype Pollution in node-forge util.setPath API
Severity: low
URL parsing in node-forge could lead to undesired behavior.
Severity: low
decode-uri-component vulnerable to Denial of Service (DoS)
Severity: low
Regular expression denial of service in semver-regex