-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
- Loading branch information
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,6 +6,8 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages | |
|
||
@actions/[email protected] is affected by the following vulnerabilities: | ||
GHSA-7r3h-m5j6-3q42: @actions/core has Delimiter Injection Vulnerability in exportVariable (https://github.com/advisories/GHSA-7r3h-m5j6-3q42) | ||
@babel/[email protected] is affected by the following vulnerabilities: | ||
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-93q8-gq69-wqmw: Inefficient Regular Expression Complexity in chalk/ansi-regex (https://github.com/advisories/GHSA-93q8-gq69-wqmw) | ||
[email protected] is affected by the following vulnerabilities: | ||
|
@@ -103,4 +105,4 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages | |
[email protected] is affected by the following vulnerabilities: | ||
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7) | ||
|
||
58 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock | ||
59 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock |
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,6 +4,16 @@ Loaded the following OSV databases: | |
fixtures/locks-e2e/2-yarn.lock: found 1991 packages | ||
Using db npm (%% vulnerabilities, including withdrawn - last updated %%) | ||
|
||
@babel/[email protected] is affected by the following vulnerabilities: | ||
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92) | ||
@babel/[email protected] is affected by the following vulnerabilities: | ||
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92) | ||
@babel/[email protected] is affected by the following vulnerabilities: | ||
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92) | ||
@babel/[email protected] is affected by the following vulnerabilities: | ||
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92) | ||
@babel/[email protected] is affected by the following vulnerabilities: | ||
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92) | ||
@cypress/[email protected] is affected by the following vulnerabilities: | ||
GHSA-p8p7-x288-28g6: Server-Side Request Forgery in Request (https://github.com/advisories/GHSA-p8p7-x288-28g6) | ||
[email protected] is affected by the following vulnerabilities: | ||
|
@@ -113,4 +123,4 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages | |
[email protected] is affected by the following vulnerabilities: | ||
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7) | ||
|
||
62 known vulnerabilities found in fixtures/locks-e2e/2-yarn.lock | ||
67 known vulnerabilities found in fixtures/locks-e2e/2-yarn.lock |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,6 +4,8 @@ Loaded the following OSV databases: | |
fixtures/locks-e2e/3-yarn.lock: found 1225 packages | ||
Using db npm (%% vulnerabilities, including withdrawn - last updated %%) | ||
|
||
@babel/[email protected] is affected by the following vulnerabilities: | ||
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-93q8-gq69-wqmw: Inefficient Regular Expression Complexity in chalk/ansi-regex (https://github.com/advisories/GHSA-93q8-gq69-wqmw) | ||
[email protected] is affected by the following vulnerabilities: | ||
|
@@ -91,4 +93,4 @@ fixtures/locks-e2e/3-yarn.lock: found 1225 packages | |
[email protected] is affected by the following vulnerabilities: | ||
GHSA-p9pc-299p-vxgp: yargs-parser Vulnerable to Prototype Pollution (https://github.com/advisories/GHSA-p9pc-299p-vxgp) | ||
|
||
48 known vulnerabilities found in fixtures/locks-e2e/3-yarn.lock | ||
49 known vulnerabilities found in fixtures/locks-e2e/3-yarn.lock |