Skip to content

Instantly share code, notes, and snippets.

@roguh
Created August 22, 2018 03:34
Show Gist options
  • Save roguh/9110197de6543e3fea2c94acc67917fa to your computer and use it in GitHub Desktop.
Save roguh/9110197de6543e3fea2c94acc67917fa to your computer and use it in GitHub Desktop.
{
"actions": [
{
"action": "install",
"module": "nodeunit",
"target": "0.11.3",
"isMajor": false,
"resolves": [
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-generator>babel-types>babel-traverse>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-generator>babel-types>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-generator>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-traverse>babel-types>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-traverse>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-types>babel-traverse>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-types>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-traverse>babel-types>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-traverse>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-types>babel-traverse>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 577,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-types>lodash",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 534,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-generator>babel-types>babel-traverse>debug",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 534,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-traverse>debug",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 534,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-types>babel-traverse>debug",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 534,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-traverse>debug",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 534,
"path": "nodeunit>tap>nyc>istanbul-lib-instrument>babel-types>babel-traverse>debug",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 338,
"path": "nodeunit>tap>nyc>glob>minimatch>brace-expansion",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 338,
"path": "nodeunit>tap>nyc>istanbul-lib-report>rimraf>glob>minimatch>brace-expansion",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 338,
"path": "nodeunit>tap>nyc>istanbul-lib-source-maps>rimraf>glob>minimatch>brace-expansion",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 338,
"path": "nodeunit>tap>nyc>rimraf>glob>minimatch>brace-expansion",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 338,
"path": "nodeunit>tap>nyc>spawn-wrap>rimraf>glob>minimatch>brace-expansion",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 598,
"path": "nodeunit>tap>coveralls>request>tunnel-agent",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 566,
"path": "nodeunit>tap>coveralls>request>hawk>boom>hoek",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 566,
"path": "nodeunit>tap>coveralls>request>hawk>cryptiles>boom>hoek",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 566,
"path": "nodeunit>tap>coveralls>request>hawk>hoek",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 566,
"path": "nodeunit>tap>coveralls>request>hawk>sntp>hoek",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 157,
"path": "nodeunit>tap>nyc>micromatch>braces>expand-range>fill-range>randomatic",
"dev": true,
"optional": false,
"bundled": true
},
{
"id": 157,
"path": "nodeunit>tap>nyc>test-exclude>micromatch>braces>expand-range>fill-range>randomatic",
"dev": true,
"optional": false,
"bundled": true
}
]
},
{
"action": "install",
"module": "gulp",
"target": "4.0.0",
"isMajor": true,
"resolves": [
{
"id": 577,
"path": "gulp>vinyl-fs>glob-watcher>gaze>globule>lodash",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 118,
"path": "gulp>vinyl-fs>glob-stream>glob>minimatch",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 118,
"path": "gulp>vinyl-fs>glob-stream>minimatch",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 118,
"path": "gulp>vinyl-fs>glob-watcher>gaze>globule>glob>minimatch",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 118,
"path": "gulp>vinyl-fs>glob-watcher>gaze>globule>minimatch",
"dev": true,
"optional": false,
"bundled": false
}
]
},
{
"action": "install",
"module": "gulp-htmlhint",
"target": "2.1.1",
"isMajor": true,
"resolves": [
{
"id": 577,
"path": "gulp-htmlhint>htmlhint>jshint>lodash",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 95,
"path": "gulp-htmlhint>htmlhint>jshint>cli",
"dev": true,
"optional": false,
"bundled": false
}
]
},
{
"action": "install",
"module": "gulp-stylelint",
"target": "7.0.0",
"isMajor": true,
"resolves": [
{
"id": 612,
"path": "gulp-stylelint>deep-extend",
"dev": true,
"optional": false,
"bundled": false
}
]
},
{
"action": "review",
"module": "minimatch",
"resolves": [
{
"id": 118,
"path": "gulp-htmlhint>htmlhint>jshint>minimatch",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 118,
"path": "gulp-htmlhint>htmlhint>jshint>cli>glob>minimatch",
"dev": true,
"optional": false,
"bundled": false
}
]
}
],
"advisories": {
"95": {
"findings": [
{
"version": "0.6.6",
"paths": [
"gulp-htmlhint>htmlhint>jshint>cli"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 95,
"created": "2016-03-28T21:24:14.000Z",
"updated": "2018-02-28T20:41:10.792Z",
"deleted": null,
"title": "Arbitrary File Write",
"found_by": {
"name": "Steve Kemp"
},
"reported_by": {
"name": "Steve Kemp"
},
"module_name": "cli",
"cves": [
"CVE-2016-10538"
],
"vulnerable_versions": "<1.0.0",
"patched_versions": ">=1.0.0",
"overview": "Affected versions of `cli` use predictable temporary file names. If an attacker can create a symbolic link at the location of one of these temporarly file names, the attacker can arbitrarily write to any file that the user which owns the `cli` process has permission to write to.\n\n\n## Proof of Concept\n\nBy creating Symbolic Links at the following locations, the target of the link can be written to.\n```\nlock_file = '/tmp/' + cli.app + '.pid',\nlog_file = '/tmp/' + cli.app + '.log';\n```",
"recommendation": "Update to version 1.0.0 or later.",
"references": "[Debian Bugtracker #809252](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809252)\n[Issue #81](https://github.com/node-js-libs/cli/issues/81)",
"access": "public",
"severity": "low",
"cwe": "CWE-22",
"metadata": {
"module_type": "CLI.Library",
"exploitability": 3,
"affected_components": ""
},
"url": "https://nodesecurity.io/advisories/95"
},
"118": {
"findings": [
{
"version": "2.0.10",
"paths": [
"gulp>vinyl-fs>glob-stream>glob>minimatch",
"gulp>vinyl-fs>glob-stream>minimatch",
"gulp-htmlhint>htmlhint>jshint>minimatch"
],
"dev": true,
"optional": false,
"bundled": false
},
{
"version": "0.2.14",
"paths": [
"gulp>vinyl-fs>glob-watcher>gaze>globule>glob>minimatch",
"gulp>vinyl-fs>glob-watcher>gaze>globule>minimatch"
],
"dev": true,
"optional": false,
"bundled": false
},
{
"version": "0.3.0",
"paths": [
"gulp-htmlhint>htmlhint>jshint>cli>glob>minimatch"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 118,
"created": "2016-05-25T16:37:20.000Z",
"updated": "2018-03-01T21:58:01.072Z",
"deleted": null,
"title": "Regular Expression Denial of Service",
"found_by": {
"name": "Nick Starke"
},
"reported_by": {
"name": "Nick Starke"
},
"module_name": "minimatch",
"cves": [
"CVE-2016-10540"
],
"vulnerable_versions": "<=3.0.1",
"patched_versions": ">=3.0.2",
"overview": "Affected versions of `minimatch` are vulnerable to regular expression denial of service attacks when user input is passed into the `pattern` argument of `minimatch(path, pattern)`.\n\n\n## Proof of Concept\n```\nvar minimatch = require(“minimatch”);\n\n// utility function for generating long strings\nvar genstr = function (len, chr) {\n var result = “”;\n for (i=0; i<=len; i++) {\n result = result + chr;\n }\n return result;\n}\n\nvar exploit = “[!” + genstr(1000000, “\\\\”) + “A”;\n\n// minimatch exploit.\nconsole.log(“starting minimatch”);\nminimatch(“foo”, exploit);\nconsole.log(“finishing minimatch”);\n```",
"recommendation": "Update to version 3.0.2 or later.",
"references": "",
"access": "public",
"severity": "high",
"cwe": "CWE-400",
"metadata": {
"module_type": "Multi.Library",
"exploitability": 4,
"affected_components": "Internal::Code::Function::minimatch({type:'args', key:0, vector:{type:'string'}})"
},
"url": "https://nodesecurity.io/advisories/118"
},
"157": {
"findings": [
{
"version": "1.1.5",
"paths": [
"nodeunit>tap>nyc>micromatch>braces>expand-range>fill-range>randomatic",
"nodeunit>tap>nyc>test-exclude>micromatch>braces>expand-range>fill-range>randomatic"
],
"dev": true,
"optional": false,
"bundled": true
}
],
"id": 157,
"created": "2016-11-09T20:03:19.000Z",
"updated": "2018-05-08T15:23:56.190Z",
"deleted": null,
"title": "Cryptographically Weak PRNG",
"found_by": {
"name": "Sven Slootweg"
},
"reported_by": {
"name": "Sven Slootweg"
},
"module_name": "randomatic",
"cves": [
"CVE-2017-16028"
],
"vulnerable_versions": "<3.0.0",
"patched_versions": ">=3.0.0",
"overview": "Affected versions of `randomatic` generate random values using a cryptographically weak psuedo-random number generator. This may result in predictable values instead of random values as intended.\r\n\r\n",
"recommendation": "Update to version 3.0.0 or later.\r\n",
"references": "- [Commit #4a52695](https://github.com/jonschlinkert/randomatic/commit/4a526959b3a246ae8e4a82f9c182180907227fe1#diff-b9cfc7f2cdf78a7f4b91a753d10865a2)",
"access": "public",
"severity": "low",
"cwe": "CWE-330",
"metadata": {
"module_type": "Multi.Library",
"exploitability": 5,
"affected_components": ""
},
"url": "https://nodesecurity.io/advisories/157"
},
"338": {
"findings": [
{
"version": "1.1.6",
"paths": [
"nodeunit>tap>nyc>glob>minimatch>brace-expansion",
"nodeunit>tap>nyc>istanbul-lib-report>rimraf>glob>minimatch>brace-expansion",
"nodeunit>tap>nyc>istanbul-lib-source-maps>rimraf>glob>minimatch>brace-expansion",
"nodeunit>tap>nyc>rimraf>glob>minimatch>brace-expansion",
"nodeunit>tap>nyc>spawn-wrap>rimraf>glob>minimatch>brace-expansion"
],
"dev": true,
"optional": false,
"bundled": true
}
],
"id": 338,
"created": "2017-04-25T18:07:05.988Z",
"updated": "2018-03-28T20:04:39.123Z",
"deleted": null,
"title": "ReDoS",
"found_by": {
"name": "myvyang"
},
"reported_by": {
"name": "myvyang"
},
"module_name": "brace-expansion",
"cves": [
"CVE-2017-16032"
],
"vulnerable_versions": "<=1.1.6",
"patched_versions": ">=1.1.7",
"overview": "Affected versions of `brace-expansion` are vulnerable to a regular expression denial of service condition.\n\n## Proof of Concept\n\n```\nvar expand = require('brace-expansion');\nexpand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\\n}');\n```",
"recommendation": "Update to version 1.1.7 or later.",
"references": "[Issue #33](https://github.com/juliangruber/brace-expansion/issues/33)\n[PR #35](https://github.com/juliangruber/brace-expansion/pull/35)\n[PR #35](https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3)",
"access": "public",
"severity": "moderate",
"cwe": "CWE-400",
"metadata": {
"module_type": "Multi.Library",
"exploitability": 5,
"affected_components": ""
},
"url": "https://nodesecurity.io/advisories/338"
},
"534": {
"findings": [
{
"version": "2.2.0",
"paths": [
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-generator>babel-types>babel-traverse>debug",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-traverse>debug",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-types>babel-traverse>debug",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-traverse>debug",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-types>babel-traverse>debug"
],
"dev": true,
"optional": false,
"bundled": true
}
],
"id": 534,
"created": "2017-09-25T18:55:55.956Z",
"updated": "2018-05-16T19:37:43.686Z",
"deleted": null,
"title": "Regular Expression Denial of Service",
"found_by": {
"name": "Cristian-Alexandru Staicu"
},
"reported_by": {
"name": "Cristian-Alexandru Staicu"
},
"module_name": "debug",
"cves": [
"CVE-2017-16137"
],
"vulnerable_versions": "<= 2.6.8 || >= 3.0.0 <= 3.0.1",
"patched_versions": ">= 2.6.9 < 3.0.0 || >= 3.1.0",
"overview": "Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter. \n\nAs it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.",
"recommendation": "Version 2.x.x: Update to version 2.6.9 or later.\nVersion 3.x.x: Update to version 3.1.0 or later.\n",
"references": "- [Issue #501](https://github.com/visionmedia/debug/issues/501)\n- [PR #504](https://github.com/visionmedia/debug/pull/504)",
"access": "public",
"severity": "low",
"cwe": "CWE-400",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://nodesecurity.io/advisories/534"
},
"566": {
"findings": [
{
"version": "2.16.3",
"paths": [
"nodeunit>tap>coveralls>request>hawk>boom>hoek",
"nodeunit>tap>coveralls>request>hawk>cryptiles>boom>hoek",
"nodeunit>tap>coveralls>request>hawk>hoek",
"nodeunit>tap>coveralls>request>hawk>sntp>hoek"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 566,
"created": "2018-04-20T21:25:58.421Z",
"updated": "2018-04-20T21:25:58.421Z",
"deleted": null,
"title": "Prototype pollution",
"found_by": {
"name": "HoLyVieR"
},
"reported_by": {
"name": "HoLyVieR"
},
"module_name": "hoek",
"cves": [],
"vulnerable_versions": "<= 4.2.0 || >= 5.0.0 < 5.0.3",
"patched_versions": "> 4.2.0 < 5.0.0 || >= 5.0.3",
"overview": "Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution.\n\nThe `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an _unvalidated_ payload created from a JSON string containing the `__proto__` property.\n\nThis can be demonstrated like so:\n\n```javascript\nvar Hoek = require('hoek');\nvar malicious_payload = '{\"__proto__\":{\"oops\":\"It works !\"}}';\n\nvar a = {};\nconsole.log(\"Before : \" + a.oops);\nHoek.merge({}, JSON.parse(malicious_payload));\nconsole.log(\"After : \" + a.oops);\n```\n\nThis type of attack can be used to overwrite existing properties causing a potential denial of service.",
"recommendation": "Update to version 4.2.1, 5.0.3 or later.",
"references": "",
"access": "public",
"severity": "moderate",
"cwe": "CWE-471",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://nodesecurity.io/advisories/566"
},
"577": {
"findings": [
{
"version": "1.0.2",
"paths": [
"gulp>vinyl-fs>glob-watcher>gaze>globule>lodash"
],
"dev": true,
"optional": false,
"bundled": false
},
{
"version": "3.7.0",
"paths": [
"gulp-htmlhint>htmlhint>jshint>lodash"
],
"dev": true,
"optional": false,
"bundled": false
},
{
"version": "4.13.1",
"paths": [
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-generator>babel-types>babel-traverse>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-generator>babel-types>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-generator>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-traverse>babel-types>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-traverse>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-types>babel-traverse>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>babel-types>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-template>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-traverse>babel-types>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-traverse>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-types>babel-traverse>lodash",
"nodeunit>tap>nyc>istanbul-lib-instrument>babel-types>lodash"
],
"dev": true,
"optional": false,
"bundled": true
}
],
"id": 577,
"created": "2018-04-24T14:27:02.796Z",
"updated": "2018-04-24T14:27:13.049Z",
"deleted": null,
"title": "Prototype Pollution",
"found_by": {
"name": "Olivier Arteau (HoLyVieR)"
},
"reported_by": {
"name": "Olivier Arteau (HoLyVieR)"
},
"module_name": "lodash",
"cves": [
"CVE-2018-3721"
],
"vulnerable_versions": "<4.17.5",
"patched_versions": ">=4.17.5",
"overview": "Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution. \n\nThe vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.\n\n",
"recommendation": "Update to version 4.17.5 or later.",
"references": "- [HackerOne Report](https://hackerone.com/reports/310443)",
"access": "public",
"severity": "low",
"cwe": "CWE-471",
"metadata": {
"module_type": "",
"exploitability": 1,
"affected_components": ""
},
"url": "https://nodesecurity.io/advisories/577"
},
"598": {
"findings": [
{
"version": "0.4.3",
"paths": [
"nodeunit>tap>coveralls>request>tunnel-agent"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 598,
"created": "2018-04-24T20:30:16.099Z",
"updated": "2018-04-24T20:31:15.816Z",
"deleted": null,
"title": "Memory Exposure",
"found_by": {
"name": "Сковорода Никита Андреевич"
},
"reported_by": {
"name": "Сковорода Никита Андреевич"
},
"module_name": "tunnel-agent",
"cves": [],
"vulnerable_versions": "<0.6.0",
"patched_versions": ">=0.6.0",
"overview": "Versions of `tunnel-agent` before 0.6.0 are vulnerable to memory exposure.\n\nThis is exploitable if user supplied input is provided to the auth value and is a number.\n\nProof-of-concept:\n```js\nrequire('request')({\n method: 'GET',\n uri: 'http://www.example.com',\n tunnel: true,\n proxy:{\n protocol: 'http:',\n host:'127.0.0.1',\n port:8080,\n auth:USERSUPPLIEDINPUT // number\n }\n});\n```",
"recommendation": "Update to version 0.6.0 or later.",
"references": "- [GitHub Commit #9ca95ec](https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0)\n- [Proof of Concept](https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4)",
"access": "public",
"severity": "moderate",
"cwe": "CWE-20",
"metadata": {
"module_type": "",
"exploitability": 3,
"affected_components": ""
},
"url": "https://nodesecurity.io/advisories/598"
},
"612": {
"findings": [
{
"version": "0.4.2",
"paths": [
"gulp-stylelint>deep-extend"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 612,
"created": "2018-04-24T23:13:13.134Z",
"updated": "2018-05-08T01:46:15.050Z",
"deleted": null,
"title": "Prototype Pollution",
"found_by": {
"name": "Olivier Arteau (HoLyVieR)"
},
"reported_by": {
"name": "Olivier Arteau (HoLyVieR)"
},
"module_name": "deep-extend",
"cves": [],
"vulnerable_versions": "<=0.5.0",
"patched_versions": ">=0.5.1",
"overview": "Versions of `deep-extend` before 0.5.1 are vulnerable to prototype pollution.",
"recommendation": "Update to version 0.5.1 or later.",
"references": "- [HackerOne Report](https://hackerone.com/reports/311333)",
"access": "public",
"severity": "low",
"cwe": "CWE-471",
"metadata": {
"module_type": "",
"exploitability": 2,
"affected_components": ""
},
"url": "https://nodesecurity.io/advisories/612"
}
},
"muted": [],
"metadata": {
"vulnerabilities": {
"info": 0,
"low": 23,
"moderate": 10,
"high": 6,
"critical": 0
},
"dependencies": 19,
"devDependencies": 8381,
"optionalDependencies": 178,
"totalDependencies": 8400
},
"runId": "d08ecf98-b0fd-4231-afa7-344b2b815059"
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment