gfu-nest's People
gfu-nest's Issues
[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.isboolean:3.0.3
Vulnerabilities
DepShield reports that this application's usage of lodash.isboolean:3.0.3 results in the following vulnerability(s):
Occurrences
lodash.isboolean:3.0.3 is a transitive dependency introduced by the following direct dependency(s):
• jsonwebtoken:8.4.0
└─ lodash.isboolean:3.0.3
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 6.5) Vulnerability due to usage of mysql:2.16.0
Vulnerabilities
DepShield reports that this application's usage of mysql:2.16.0 results in the following vulnerability(s):
- (CVSS 6.5) CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.5) Vulnerability due to usage of debug:2.6.9
Vulnerabilities
DepShield reports that this application's usage of debug:2.6.9 results in the following vulnerability(s):
Occurrences
debug:2.6.9 is a transitive dependency introduced by the following direct dependency(s):
• @nestjs/core:5.7.2
└─ body-parser:1.18.3
└─ debug:2.6.9
└─ express:4.16.3
└─ body-parser:1.18.2
└─ debug:2.6.9
└─ debug:2.6.9
└─ finalhandler:1.1.1
└─ debug:2.6.9
└─ send:0.16.2
└─ debug:2.6.9
• bcrypt:3.0.4
└─ node-pre-gyp:0.12.0
└─ needle:2.2.4
└─ debug:2.6.9
• jest:23.6.0
└─ jest-cli:23.6.0
└─ istanbul-lib-instrument:1.10.2
└─ babel-traverse:6.26.0
└─ debug:2.6.9
└─ jest-config:23.6.0
└─ babel-core:6.26.3
└─ debug:2.6.9
└─ jest-haste-map:23.6.0
└─ sane:2.5.2
└─ micromatch:3.1.10
└─ extglob:2.0.4
└─ expand-brackets:2.1.4
└─ debug:2.6.9
• nodemon:1.18.10
└─ chokidar:2.1.1
└─ anymatch:2.0.0
└─ micromatch:3.1.10
└─ extglob:2.0.4
└─ expand-brackets:2.1.4
└─ debug:2.6.9
└─ fsevents:1.2.7
└─ node-pre-gyp:0.10.3
└─ needle:2.2.4
└─ debug:2.6.9
└─ readdirp:2.2.1
└─ micromatch:3.1.10
└─ extglob:2.0.4
└─ expand-brackets:2.1.4
└─ debug:2.6.9
└─ undefsafe:2.0.2
└─ debug:2.6.9
• ts-loader:4.5.0
└─ micromatch:3.1.10
└─ snapdragon:0.8.2
└─ debug:2.6.9
└─ extglob:2.0.4
└─ expand-brackets:2.1.4
└─ debug:2.6.9
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.5) Vulnerability due to usage of set-value:2.0.0
Vulnerabilities
DepShield reports that this application's usage of set-value:2.0.0 results in the following vulnerability(s):
Occurrences
set-value:2.0.0 is a transitive dependency introduced by the following direct dependency(s):
• ts-loader:4.5.0
└─ micromatch:3.1.10
└─ snapdragon:0.8.2
└─ base:0.11.2
└─ cache-base:1.0.1
└─ set-value:2.0.0
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.4) Vulnerability due to usage of https-proxy-agent:2.2.1
Vulnerabilities
DepShield reports that this application's usage of https-proxy-agent:2.2.1 results in the following vulnerability(s):
Occurrences
https-proxy-agent:2.2.1 is a transitive dependency introduced by the following direct dependency(s):
• google-auth-library:3.1.0
└─ gaxios:1.7.0
└─ https-proxy-agent:2.2.1
└─ https-proxy-agent:2.2.1
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.isinteger:4.0.4
Vulnerabilities
DepShield reports that this application's usage of lodash.isinteger:4.0.4 results in the following vulnerability(s):
Occurrences
lodash.isinteger:4.0.4 is a transitive dependency introduced by the following direct dependency(s):
• jsonwebtoken:8.4.0
└─ lodash.isinteger:4.0.4
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.isstring:4.0.1
Vulnerabilities
DepShield reports that this application's usage of lodash.isstring:4.0.1 results in the following vulnerability(s):
- (CVSS 7.4) CWE-471: Modification of Assumed-Immutable Data (MAID)
- (CVSS 6.5) [CVE-2018-3721] lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutabl...
Occurrences
lodash.isstring:4.0.1 is a transitive dependency introduced by the following direct dependency(s):
• jsonwebtoken:8.4.0
└─ lodash.isstring:4.0.1
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.5) Vulnerability due to usage of mem:1.1.0
Vulnerabilities
DepShield reports that this application's usage of mem:1.1.0 results in the following vulnerability(s):
Occurrences
mem:1.1.0 is a transitive dependency introduced by the following direct dependency(s):
• jest:23.6.0
└─ jest-cli:23.6.0
└─ yargs:11.1.0
└─ os-locale:2.1.0
└─ mem:1.1.0
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.once:4.1.1
Vulnerabilities
DepShield reports that this application's usage of lodash.once:4.1.1 results in the following vulnerability(s):
Occurrences
lodash.once:4.1.1 is a transitive dependency introduced by the following direct dependency(s):
• jsonwebtoken:8.4.0
└─ lodash.once:4.1.1
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.sortby:4.7.0
Vulnerabilities
DepShield reports that this application's usage of lodash.sortby:4.7.0 results in the following vulnerability(s):
Occurrences
lodash.sortby:4.7.0 is a transitive dependency introduced by the following direct dependency(s):
• jest:23.6.0
└─ jest-cli:23.6.0
└─ jest-environment-jsdom:23.4.0
└─ jsdom:11.12.0
└─ data-urls:1.1.0
└─ whatwg-url:7.0.0
└─ lodash.sortby:4.7.0
└─ whatwg-url:6.5.0
└─ lodash.sortby:4.7.0
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.includes:4.3.0
Vulnerabilities
DepShield reports that this application's usage of lodash.includes:4.3.0 results in the following vulnerability(s):
Occurrences
lodash.includes:4.3.0 is a transitive dependency introduced by the following direct dependency(s):
• jsonwebtoken:8.4.0
└─ lodash.includes:4.3.0
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.5) Vulnerability due to usage of set-value:0.4.3
Vulnerabilities
DepShield reports that this application's usage of set-value:0.4.3 results in the following vulnerability(s):
Occurrences
set-value:0.4.3 is a transitive dependency introduced by the following direct dependency(s):
• ts-loader:4.5.0
└─ micromatch:3.1.10
└─ snapdragon:0.8.2
└─ base:0.11.2
└─ cache-base:1.0.1
└─ union-value:1.0.0
└─ set-value:0.4.3
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 9.8) Vulnerability due to usage of mixin-deep:1.3.1
Vulnerabilities
DepShield reports that this application's usage of mixin-deep:1.3.1 results in the following vulnerability(s):
- (CVSS 9.8) [CVE-2019-10746] mixin-deep is vulnerable to Prototype Pollution in versions before 1.3.2 and ver...
- (CVSS 7.5) CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion')
Occurrences
mixin-deep:1.3.1 is a transitive dependency introduced by the following direct dependency(s):
• ts-loader:4.5.0
└─ micromatch:3.1.10
└─ snapdragon:0.8.2
└─ base:0.11.2
└─ mixin-deep:1.3.1
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 8.8) Vulnerability due to usage of handlebars:4.1.0
Vulnerabilities
DepShield reports that this application's usage of handlebars:4.1.0 results in the following vulnerability(s):
- (CVSS 8.8) CWE-94: Improper Control of Generation of Code ('Code Injection')
- (CVSS 8.8) CWE-94: Improper Control of Generation of Code ('Code Injection')
- (CVSS 8.2) CWE-20: Improper Input Validation
- (CVSS 8.2) CWE-20: Improper Input Validation
- (CVSS 7.5) CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion')
- (CVSS 5.3) CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Occurrences
handlebars:4.1.0 is a transitive dependency introduced by the following direct dependency(s):
• jest:23.6.0
└─ jest-cli:23.6.0
└─ istanbul-api:1.3.7
└─ istanbul-reports:1.5.1
└─ handlebars:4.1.0
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.5) Vulnerability due to usage of d:1.0.0
Vulnerabilities
DepShield reports that this application's usage of d:1.0.0 results in the following vulnerability(s):
Occurrences
d:1.0.0 is a transitive dependency introduced by the following direct dependency(s):
• @nestjs/common:5.7.2
└─ cli-color:1.2.0
└─ d:1.0.0
└─ es5-ext:0.10.47
└─ es6-symbol:3.1.1
└─ d:1.0.0
└─ es6-iterator:2.0.3
└─ d:1.0.0
└─ memoizee:0.4.14
└─ d:1.0.0
└─ es6-weak-map:2.0.2
└─ d:1.0.0
└─ event-emitter:0.3.5
└─ d:1.0.0
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.isnumber:3.0.3
Vulnerabilities
DepShield reports that this application's usage of lodash.isnumber:3.0.3 results in the following vulnerability(s):
Occurrences
lodash.isnumber:3.0.3 is a transitive dependency introduced by the following direct dependency(s):
• jsonwebtoken:8.4.0
└─ lodash.isnumber:3.0.3
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 9.8) Vulnerability due to usage of lodash:4.17.11
Vulnerabilities
DepShield reports that this application's usage of lodash:4.17.11 results in the following vulnerability(s):
- (CVSS 9.8) [CVE-2019-10744] Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The...
- (CVSS 9.6) CWE-506: Embedded Malicious Code
Occurrences
lodash:4.17.11 is a transitive dependency introduced by the following direct dependency(s):
• @nestjs/core:5.7.2
└─ @nuxtjs/opencollective:0.1.0
└─ consola:1.4.5
└─ lodash:4.17.11
• @nestjs/swagger:2.5.1
└─ lodash:4.17.11
• jest:23.6.0
└─ jest-cli:23.6.0
└─ istanbul-api:1.3.7
└─ async:2.6.2
└─ lodash:4.17.11
└─ istanbul-lib-instrument:1.10.2
└─ babel-generator:6.26.1
└─ lodash:4.17.11
└─ babel-template:6.26.0
└─ lodash:4.17.11
└─ babel-traverse:6.26.0
└─ lodash:4.17.11
└─ babel-types:6.26.0
└─ lodash:4.17.11
└─ jest-config:23.6.0
└─ babel-core:6.26.3
└─ babel-register:6.26.0
└─ lodash:4.17.11
└─ lodash:4.17.11
└─ jest-environment-jsdom:23.4.0
└─ jsdom:11.12.0
└─ request-promise-native:1.0.7
└─ request-promise-core:1.1.2
└─ lodash:4.17.11
• mongoose:5.4.13
└─ async:2.6.1
└─ lodash:4.17.11
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 8.8) Vulnerability due to usage of js-yaml:3.12.1
Vulnerabilities
DepShield reports that this application's usage of js-yaml:3.12.1 results in the following vulnerability(s):
- (CVSS 8.8) CWE-94: Improper Control of Generation of Code ('Code Injection')
- (CVSS 7.5) CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion')
Occurrences
js-yaml:3.12.1 is a transitive dependency introduced by the following direct dependency(s):
• jest:23.6.0
└─ jest-cli:23.6.0
└─ istanbul-api:1.3.7
└─ js-yaml:3.12.1
• tslint:5.11.0
└─ js-yaml:3.12.1
• typeorm:0.2.14
└─ js-yaml:3.12.1
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.5) Vulnerability due to usage of axios:0.18.0
Vulnerabilities
DepShield reports that this application's usage of axios:0.18.0 results in the following vulnerability(s):
- (CVSS 7.5) [CVE-2019-10742] Improper Input Validation
Occurrences
axios:0.18.0 is a transitive dependency introduced by the following direct dependency(s):
• @nestjs/common:5.7.2
└─ axios:0.18.0
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.5) Vulnerability due to usage of braces:1.8.5
Vulnerabilities
DepShield reports that this application's usage of braces:1.8.5 results in the following vulnerability(s):
Occurrences
braces:1.8.5 is a transitive dependency introduced by the following direct dependency(s):
• jest:23.6.0
└─ jest-cli:23.6.0
└─ micromatch:2.3.11
└─ braces:1.8.5
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.isplainobject:4.0.6
Vulnerabilities
DepShield reports that this application's usage of lodash.isplainobject:4.0.6 results in the following vulnerability(s):
- (CVSS 7.4) CWE-471: Modification of Assumed-Immutable Data (MAID)
- (CVSS 6.5) [CVE-2018-3721] lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutabl...
Occurrences
lodash.isplainobject:4.0.6 is a transitive dependency introduced by the following direct dependency(s):
• jsonwebtoken:8.4.0
└─ lodash.isplainobject:4.0.6
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.