Skip to content

fix: package.json to reduce vulnerabilities

f670cf9
Select commit
Loading
Failed to load commit list.
Open

[Snyk] Fix for 1 vulnerabilities #44

fix: package.json to reduce vulnerabilities
f670cf9
Select commit
Loading
Failed to load commit list.
Debricked / Vulnerability analysis failed Mar 28, 2025 in 13s

An automation triggered a pipeline failure

Found 78 vulnerabilities. An additional 0 vulnerabilities have been marked as unaffected.

Output from Automations

6 rules were checked:


If a new dependency is added where the license risk is at least medium

then notify all users in the group admins by email

✔️ The rule did not trigger. Manage rule



If a dependency contains a vulnerability which has not been marked as unaffected and which has not triggered this rule for this dependency before

then notify all users in the group admins by email

✔️ The rule did not trigger. Manage rule



If there is a dependency where the license risk is at least high

then send a pipeline warning

✔️ The rule did not trigger. Manage rule



If a new dependency is added where the license risk is at least high

then fail pipeline

✔️ The rule did not trigger. Manage rule



If a dependency contains a vulnerability which has not been marked as unaffected

then send a pipeline warning

⚠️ The rule triggered for the following vulnerabilities, causing a pipeline warning. Manage rule

Vulnerability CVSS2 CVSS3 Dependency Dependency Licenses
CVE-2020-28464 10 9.8 djv (npm) MIT
debricked-233443 10 9.8 execa (npm) MIT
CVE-2021-23369 7.5 9.8 handlebars (npm) MIT
CVE-2021-23383 7.5 9.8 handlebars (npm) MIT
CVE-2021-3918 7.5 9.8 json-schema (npm) BSD-3-Clause
CVE-2023-26136 N/A 9.8 tough-cookie (npm) BSD-3-Clause
CVE-2023-42282 N/A 9.8 ip (npm) MIT
CVE-2022-46175 N/A 8.8 json5 (npm) MIT
CVE-2021-37712 4.4 8.6 tar (npm) ISC
CVE-2021-37701 4.4 8.6 tar (npm) ISC
CVE-2021-37713 4.4 8.6 tar (npm) ISC
CVE-2020-36604 N/A 8.1 @hapi/hoek (npm) BSD-3-Clause
CVE-2022-23539 N/A 8.1 jsonwebtoken (npm) MIT
CVE-2020-36604 N/A 8.1 hoek (npm) BSD-3-Clause
CVE-2024-29415 N/A 8.1 ip (npm) MIT
CVE-2021-32804 5.8 8.1 tar (npm) ISC
CVE-2021-32803 5.8 8.1 tar (npm) ISC
CVE-2021-43138 6.8 7.8 async (npm) MIT
CVE-2022-23540 N/A 7.6 jsonwebtoken (npm) MIT
CVE-2024-45296 N/A 7.5 path-to-regexp (npm) MIT
CVE-2022-25881 N/A 7.5 http-cache-semantics (npm) BSD-2-Clause
CVE-2022-24785 5 7.5 moment (npm) MIT
CVE-2022-31129 5 7.5 moment (npm) MIT
CVE-2021-23343 5 7.5 path-parse (npm) MIT
CVE-2021-27290 4.3 7.5 ssri (npm) ISC
CVE-2020-28469 5 7.5 glob-parent (npm) ISC
CVE-2021-3749 7.8 7.5 axios (npm) MIT
CVE-2024-21538 N/A 7.5 cross-spawn (npm) MIT
CVE-2021-3765 5 7.5 validator (npm) MIT
CVE-2021-3807 7.8 7.5 ansi-regex (npm) MIT
CVE-2022-24999 N/A 7.5 qs (npm) BSD-3-Clause
CVE-2021-33502 5 7.5 normalize-url (npm) MIT
CVE-2020-7768 5 7.5 grpc (npm) Apache-2.0
CVE-2022-25883 N/A 7.5 semver (npm) ISC
debricked-234478 N/A 7.5 acorn (npm) MIT
CVE-2022-3517 N/A 7.5 minimatch (npm) ISC
CVE-2020-8203 5.8 7.4 lodash (npm) MIT
CVE-2020-7788 7.5 7.3 ini (npm) ISC
CVE-2020-7774 7.5 7.3 y18n (npm) ISC
CVE-2020-8116 7.5 7.3 dot-prop (npm) MIT
CVE-2021-23337 6.5 7.2 lodash (npm) MIT
CVE-2024-28863 N/A 6.5 tar (npm) ISC
CVE-2024-28849 N/A 6.5 follow-redirects (npm) MIT
CVE-2022-0155 4.3 6.5 follow-redirects (npm) MIT
CVE-2023-45857 N/A 6.5 axios (npm) MIT
CVE-2022-23541 N/A 6.3 jsonwebtoken (npm) MIT
CVE-2023-26159 N/A 6.1 follow-redirects (npm) MIT
CVE-2023-28155 N/A 6.1 request (npm) Apache-2.0
CVE-2021-46708 4.3 6.1 swagger-ui-dist (npm) Apache-2.0
CVE-2020-28168 4.3 5.9 axios (npm) MIT
CVE-2022-0536 4.3 5.9 follow-redirects (npm) MIT
CVE-2020-15366 6.8 5.6 ajv (npm) MIT
CVE-2020-7608 4.6 5.3 yargs-parser (npm) ISC
CVE-2017-16137 5 5.3 debug (npm) MIT
CVE-2022-33987 5 5.3 got (npm) MIT
CVE-2020-28500 5 5.3 lodash (npm) MIT
CVE-2021-29060 5 5.3 color-string (npm) MIT
CVE-2021-23362 5 5.3 hosted-git-info (npm) ISC
debricked-234637 N/A N/A @hapi/hoek (npm) BSD-3-Clause
debricked-233495 N/A N/A npm-registry-fetch (npm) ISC
debricked-234640 N/A N/A @hapi/subtext (npm) BSD-3-Clause
debricked-233982 N/A N/A swagger-ui-dist (npm) Apache-2.0
debricked-234642 N/A N/A @hapi/hapi (npm) BSD-3-Clause
debricked-234643 N/A N/A @hapi/ammo (npm) BSD-3-Clause
debricked-234641 N/A N/A @hapi/subtext (npm) BSD-3-Clause
debricked-155741 N/A N/A ini (npm) ISC
debricked-234477 N/A N/A acorn (npm) MIT
debricked-97171 N/A N/A npm-registry-fetch (npm) ISC
debricked-97165 N/A N/A lodash (npm) MIT
debricked-149739 N/A N/A yargs-parser (npm) ISC
debricked-149355 N/A N/A @hapi/hapi (npm) BSD-3-Clause
debricked-149361 N/A N/A @hapi/subtext (npm) BSD-3-Clause
debricked-149362 N/A N/A @hapi/accept (npm) BSD-3-Clause
debricked-124 N/A N/A acorn (npm) MIT
debricked-149363 N/A N/A @hapi/ammo (npm) BSD-3-Clause
debricked-149357 N/A N/A @hapi/subtext (npm) BSD-3-Clause
debricked-149742 N/A N/A @hapi/hoek (npm) BSD-3-Clause
debricked-177472 N/A N/A swagger-ui-dist (npm) Apache-2.0
CVE-2025-27152 N/A N/A axios (npm) MIT


If a dependency contains a vulnerability which has not been marked as unaffected 
where CVSS is at least high (7.0-8.9)

then fail pipeline

❌ The rule triggered for the following vulnerabilities, causing a pipeline failure. Manage rule

Vulnerability CVSS2 CVSS3 Dependency Dependency Licenses
CVE-2021-23369 7.5 9.8 handlebars (npm) MIT
CVE-2023-42282 N/A 9.8 ip (npm) MIT
CVE-2021-23383 7.5 9.8 handlebars (npm) MIT
CVE-2020-28464 10 9.8 djv (npm) MIT
CVE-2021-3918 7.5 9.8 json-schema (npm) BSD-3-Clause
debricked-233443 10 9.8 execa (npm) MIT
CVE-2023-26136 N/A 9.8 tough-cookie (npm) BSD-3-Clause
CVE-2022-46175 N/A 8.8 json5 (npm) MIT
CVE-2021-37713 4.4 8.6 tar (npm) ISC
CVE-2021-37712 4.4 8.6 tar (npm) ISC
CVE-2021-37701 4.4 8.6 tar (npm) ISC
CVE-2022-23539 N/A 8.1 jsonwebtoken (npm) MIT
CVE-2020-36604 N/A 8.1 hoek (npm) BSD-3-Clause
CVE-2020-36604 N/A 8.1 @hapi/hoek (npm) BSD-3-Clause
CVE-2024-29415 N/A 8.1 ip (npm) MIT
CVE-2021-32803 5.8 8.1 tar (npm) ISC
CVE-2021-32804 5.8 8.1 tar (npm) ISC
CVE-2021-43138 6.8 7.8 async (npm) MIT
CVE-2022-23540 N/A 7.6 jsonwebtoken (npm) MIT
debricked-234478 N/A 7.5 acorn (npm) MIT
CVE-2022-24999 N/A 7.5 qs (npm) BSD-3-Clause
CVE-2024-45296 N/A 7.5 path-to-regexp (npm) MIT
CVE-2021-3765 5 7.5 validator (npm) MIT
CVE-2021-3749 7.8 7.5 axios (npm) MIT
CVE-2022-25881 N/A 7.5 http-cache-semantics (npm) BSD-2-Clause
CVE-2022-3517 N/A 7.5 minimatch (npm) ISC
CVE-2021-27290 4.3 7.5 ssri (npm) ISC
CVE-2022-31129 5 7.5 moment (npm) MIT
CVE-2022-25883 N/A 7.5 semver (npm) ISC
CVE-2022-24785 5 7.5 moment (npm) MIT
CVE-2020-7768 5 7.5 grpc (npm) Apache-2.0
CVE-2021-3807 7.8 7.5 ansi-regex (npm) MIT
CVE-2020-28469 5 7.5 glob-parent (npm) ISC
CVE-2021-23343 5 7.5 path-parse (npm) MIT
CVE-2021-33502 5 7.5 normalize-url (npm) MIT
CVE-2024-21538 N/A 7.5 cross-spawn (npm) MIT
CVE-2020-8203 5.8 7.4 lodash (npm) MIT
CVE-2020-7788 7.5 7.3 ini (npm) ISC
CVE-2020-7774 7.5 7.3 y18n (npm) ISC
CVE-2020-8116 7.5 7.3 dot-prop (npm) MIT
CVE-2021-23337 6.5 7.2 lodash (npm) MIT