Skip to content

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Jun 24, 2025

Bumps axios from 0.21.4 to 0.30.0.

Release notes

Sourced from axios's releases.

Release v0.30.0

Release notes:

Bug Fixes

Contributors to this release

Full Changelog: axios/axios@v0.29.0...v0.30.0

v0.29.0

Release notes:

Bug Fixes

Contributors to this release

Release v0.28.1

Release notes:

Release notes:

Bug Fixes

  • fix(backport): custom params serializer support (#6263)
  • fix(backport): uncaught ReferenceError req is not defined (#6307)

Release v0.28.0

Release notes:

Bug Fixes

Backports from v1.x:

  • Allow null indexes on formSerializer and paramsSerializer v0.x (#4961)
  • Fixing content-type header repeated #4745

... (truncated)

Changelog

Sourced from axios's changelog.

0.30.0 (2025-03-26)

Release notes:

Bug Fixes

  • fix: modify log while request is aborted (#4917)
  • fix: update CHANGELOG.md for v0.x (#6271)
  • fix: modify upgrade guide for 0.28.1's breaking change (#6787)
  • fix: backport allowAbsoluteUrls vulnerability fix to v0.x (#6829)
  • fix: add allowAbsoluteUrls type (#6849)

0.29.0 (2024-11-21)

Release notes:

Bug Fixes

  • fix(backport): backport security fixes in commits #6167 and #6163 (#6402)
  • fix: omit nulls in params (#6394)
  • fix(backport): fix paramsSerializer function validation (#6361)
  • fix: regular expression denial of service (ReDoS) (#6708)

0.28.1 (2024-03-24)

Release notes:

Bug Fixes

  • fix(backport): custom params serializer support (#6263)
  • fix(backport): uncaught ReferenceError req is not defined (#6307)

0.28.0 (2024-02-12)

Release notes:

Bug Fixes

Backports from v1.x:

  • Allow null indexes on formSerializer and paramsSerializer v0.x (#4961)
  • Fixing content-type header repeated (#4745)
  • Fixed timeout error message for HTTP (#4738)
  • Added axios.formToJSON method (#4735)
  • URL params serializer (#4734)
  • Fixed toFormData Blob issue on node>v17 (#4728)
  • Adding types for progress event callbacks (#4675)
  • Fixed max body length defaults (#4731)

... (truncated)

Commits
  • 6e922e4 chore: added build artifacts
  • a06ed1e chore: added pre-release artifacts
  • c010622 feat: add type for allowAbsoluteUrls (#6849)
  • 02c3c69 fix: backport allowAbsoluteUrls vuln fix to v0.x (#6829)
  • 8603e67 docs: modify upgrade guide for 0.28.1's breaking change (#6787)
  • f0642ee fix(docs): update CHANGELOG.md for v0.x (#6271)
  • 0630c32 fix: modify log while request is aborted (#4917)
  • 7750b8c chore(release): prep release v0.29.0
  • 4840cb2 fix: regular expression denial of service issues (#6708)
  • 2e36cdb fix(backport): fix paramsSerializer function validation (#6361)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [axios](https://github.com/axios/axios) from 0.21.4 to 0.30.0.
- [Release notes](https://github.com/axios/axios/releases)
- [Changelog](https://github.com/axios/axios/blob/v0.30.0/CHANGELOG.md)
- [Commits](axios/axios@v0.21.4...v0.30.0)

---
updated-dependencies:
- dependency-name: axios
  dependency-version: 0.30.0
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels Jun 24, 2025
@TheRedHatter
Copy link
Owner

TheRedHatter commented Jun 24, 2025

🎉 Snyk checks have passed. No issues have been found so far.

security/snyk check is complete. No issues have been found. (View Details)

license/snyk check is complete. No issues have been found. (View Details)

Copy link

@prisma-cloud-devsecops prisma-cloud-devsecops bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Prisma Cloud has found errors in this PR ⬇️

"@sectester/runner": "^0.16.5",
"@sectester/scan": "^0.16.5",
"axios": "^0.21.4",
"axios": "^0.30.0",

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

axios 0.30.0 / package.json

Total vulnerabilities: 1

Critical: 0 High: 0 Medium: 1 Low: 0
Vulnerability IDSeverityCVSSFixed inStatus
CVE-2024-28849 MEDIUM MEDIUM 6.5 - Open

@semgrep-code-therredhatter
Copy link

Semgrep found 1 ssc-1676dcdc-09e4-4f68-8fa8-5ff232a5b53f finding:

Risk: Affected versions of jsonwebtoken are vulnerable to Improper Authentication. Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC.

Manual Review Advice: A vulnerability from this advisory is reachable if you are using a poorly implemented key retrieval function and your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function.

Fix: Upgrade this library to at least version 9.0.0 at brokencrystals/package-lock.json:10311.

Reference(s): GHSA-hjrf-2m68-5959, CVE-2022-23541

Semgrep found 1 ssc-30d12dd5-94ad-46fa-9d32-3d5477d86f3e finding:

Risk: Affected versions of jsonwebtoken are vulnerable to Use Of A Broken Or Risky Cryptographic Algorithm. The library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm.

Manual Review Advice: A vulnerability from this advisory is reachable if you are using a legacy, insecure key type with a supported algorithm; for example, DSA keys could be used with the RS256 algorithm

Fix: Upgrade this library to at least version 9.0.0 at brokencrystals/package-lock.json:10311.

Reference(s): GHSA-8cf7-32gw-wr33, CVE-2022-23539

Semgrep found 1 ssc-37ae9e0a-cbf0-4910-8f73-04f2275899a6 finding:

Risk: webpack 5.x before 5.76.0 is vulnerable to Improper Access Control due to ImportParserPlugin.js mishandling the magic comment feature. Due to this, webpack does not avoid cross-realm object access and an attacker who controls a property of an untrusted object can obtain access to the real global object.

Manual Review Advice: A vulnerability from this advisory is reachable if you host an application utilizing webpack and an attacker can control a property of an untrusted object

Fix: Upgrade this library to at least version 5.76.0 at brokencrystals/package-lock.json:15827.

Reference(s): GHSA-hc6q-2mpp-qw7j, CVE-2023-28154

@semgrep-code-theredhatter
Copy link

Semgrep found 1 ssc-1676dcdc-09e4-4f68-8fa8-5ff232a5b53f finding:

Risk: Affected versions of jsonwebtoken are vulnerable to Improper Authentication. Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC.

Manual Review Advice: A vulnerability from this advisory is reachable if you are using a poorly implemented key retrieval function and your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function.

Fix: Upgrade this library to at least version 9.0.0 at brokencrystals/package-lock.json:10311.

Reference(s): GHSA-hjrf-2m68-5959, CVE-2022-23541

Semgrep found 1 ssc-30d12dd5-94ad-46fa-9d32-3d5477d86f3e finding:

Risk: Affected versions of jsonwebtoken are vulnerable to Use Of A Broken Or Risky Cryptographic Algorithm. The library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm.

Manual Review Advice: A vulnerability from this advisory is reachable if you are using a legacy, insecure key type with a supported algorithm; for example, DSA keys could be used with the RS256 algorithm

Fix: Upgrade this library to at least version 9.0.0 at brokencrystals/package-lock.json:10311.

Reference(s): GHSA-8cf7-32gw-wr33, CVE-2022-23539

Semgrep found 1 ssc-37ae9e0a-cbf0-4910-8f73-04f2275899a6 finding:

Risk: webpack 5.x before 5.76.0 is vulnerable to Improper Access Control due to ImportParserPlugin.js mishandling the magic comment feature. Due to this, webpack does not avoid cross-realm object access and an attacker who controls a property of an untrusted object can obtain access to the real global object.

Manual Review Advice: A vulnerability from this advisory is reachable if you host an application utilizing webpack and an attacker can control a property of an untrusted object

Fix: Upgrade this library to at least version 5.76.0 at brokencrystals/package-lock.json:15827.

Reference(s): GHSA-hc6q-2mpp-qw7j, CVE-2023-28154

@TheRedHatter
Copy link
Owner

Logo
Checkmarx One – Scan Summary & Details1cf2235b-e5a0-465d-8f78-5e107f2259ee

New Issues (124)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2004-0989 Npm-libxmljs-0.19.7
detailsRecommended version: 1.0.0
Description: Multiple buffer overflows in libXML prior to 2.6.15 (libxml2), may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: VLQat3woxP7yoJ5%2FMkkmJUxixan8lvfh1lO8he6jnFs%3D
Vulnerable Package
CRITICAL CVE-2017-8872 Npm-libxmljs-0.19.7
detailsRecommended version: 1.0.0
Description: The "htmlParseTryOrFinish" function in "HTMLparser.c" in libxml2 versions prior to 2.9.4 allows attackers to cause a denial of service (buffer ove...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: TjdF0drsEppH%2FFxr4x36tF1YBQXSsq6syQZ3i7Hl5ZM%3D
Vulnerable Package
CRITICAL CVE-2021-44906 Npm-minimist-1.2.5
detailsRecommended version: 1.2.6
Description: Minimist through 1.2.5 is vulnerable to Prototype Pollution via file "index.js", function "setKey()" (lines 69-95).
Attack Vector: NETWORK
Attack Complexity: LOW

ID: QpWMezY4Gb%2F1Qv%2Fudna7xukZTkjFAlz85sqKSfNRxJo%3D
Vulnerable Package
CRITICAL CVE-2022-39353 Npm-xmldom-0.6.0
detailsDescription: xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. xmldom parses XML that is not well-fo...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: ARr4nsuDph%2FiI4%2FwrmcoS6TXqwAfST1mABtrpzHGH6Y%3D
Vulnerable Package
CRITICAL CVE-2023-26136 Npm-tough-cookie-2.5.0
detailsRecommended version: 4.1.3
Description: The package tough-cookie in versions prior to 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: PGjb8%2FVWG%2BwK5QtvGAxnwZkH5ocarNJTtQY2sWvaQfw%3D
Vulnerable Package
CRITICAL CVE-2023-28154 Npm-webpack-5.28.0
detailsRecommended version: 5.94.0
Description: Webpack 5.0.0-alpha.0 through 5.75.0 does not avoid cross-realm object access. ''ImportParserPlugin.js'' mishandles the magic comment feature. An a...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 75x1SR%2BCwByMFDCQf0frd1DG%2BNqabm5RR00iz2%2Bvh04%3D
Vulnerable Package
CRITICAL CVE-2023-42282 Npm-ip-2.0.0
detailsDescription: An issue in NPM ip package 0.0.2 through 2.0.1 allows an attacker to execute arbitrary code and obtain sensitive information via the "isPublic()" f...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 47Quq%2FLhoU9NIURZ1x9uaRM45NkClTHTO6CWJYQ0zX4%3D
Vulnerable Package
CRITICAL CVE-2024-42461 Npm-elliptic-6.5.4
detailsRecommended version: 6.6.1
Description: In the elliptic package, "ECDSA" signature malleability occurs because "BER-encoded" signatures are allowed which leads to Improper Verification of...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 6vluEx1K%2B9BJWTi7OIbUmTiWKVDaWuUlhOiSAZP6Uuc%3D
Vulnerable Package
CRITICAL CVE-2024-48949 Npm-elliptic-6.5.4
detailsRecommended version: 6.6.1
Description: The verify function in "lib/elliptic/eddsa/index.js" in the Elliptic versions 4.0.0 through 6.5.5 for Node.js omits "sig.S().gte(sig.eddsa.curve.n)...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: DYdO0%2Ff0nVnUgJO9gR5s3CQCd5b3DJsYnvnUnUshnCk%3D
Vulnerable Package
CRITICAL Cx88b46a98-47a5 Npm-elliptic-6.5.4
detailsRecommended version: 6.6.1
Description: The elliptic package is a plain JavaScript implementation of elliptic-curve cryptography. Versions of elliptic package prior to 6.6.1 are vulnerabl...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 2rqZwfNkVeLdi%2FRRAPCuFf3svvupzqPiA6Qkl3WK%2F48%3D
Vulnerable Package
HIGH CVE-2015-5312 Npm-libxmljs-0.19.7
detailsRecommended version: 1.0.0
Description: The "xmlStringLenDecodeEntities" function in "parser.c" in libxml2 prior to 2.9.3 does not properly prevent entity expansion, which allows context-...
Attack Vector: NETWORK
Attack Complexity: MEDIUM

ID: Smg22%2Fgpyzl1YJVr%2Bi05s2XEEZAOoB0xc01mkIucOHo%3D
Vulnerable Package
HIGH CVE-2016-20018 Npm-knex-0.21.19
detailsRecommended version: 2.4.0
Description: Knex.js prior to 2.4.0 has a limited SQL injection vulnerability that can be exploited to ignore the WHERE clause of a SQL query.
Attack Vector: NETWORK
Attack Complexity: LOW

ID: vq6FJJu1%2B55iDJ4Ia8cRm1YaW16%2B%2FUOpLfSkx8yG5h0%3D
Vulnerable Package
HIGH CVE-2017-9048 Npm-libxmljs-0.19.7
detailsRecommended version: 1.0.0
Description: libxml2 versions prior to v2.9.5-rc1 are vulnerable to a stack-based buffer overflow. The function "xmlSnprintfElementContent" in "valid.c" is supp...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: xPHjAVnOJdfKp%2FHahSgCgGdYIcvYIWqONveFXaOraXg%3D
Vulnerable Package
HIGH CVE-2018-14404 Npm-libxmljs-0.19.7
detailsRecommended version: 1.0.0
Description: A NULL pointer dereference vulnerability exists in the "xpath.c:xmlXPathCompOpEval()" function of libxml2 through 2.9.8 when parsing an invalid XPa...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: BjE2q962CbuLxRoFr10N22sbTKa8j%2BldKNFkMUnadiw%3D
Vulnerable Package
HIGH CVE-2021-3516 Npm-libxmljs-0.19.7
detailsRecommended version: 1.0.0
Description: There's a flaw in libxml2's "xmllint" in versions prior to 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint coul...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: SWgOFE19%2FKXQFGHrCIUmF51iMRRlSuGQIcsc8XaVckc%3D
Vulnerable Package
HIGH CVE-2021-3517 Npm-libxmljs-0.19.7
detailsRecommended version: 0.19.8
Description: There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: LE6FsMsbdWaqJ%2FORTBNJxy32sWaHoUi4ne8cPaR1BZg%3D
Vulnerable Package
HIGH CVE-2021-3518 Npm-libxmljs-0.19.7
detailsRecommended version: 0.19.8
Description: There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: %2BilC82XRlLecV482QzZK9SG1rKqA44QOPTvXnApmNCc%3D
Vulnerable Package
HIGH CVE-2021-3803 Npm-nth-check-1.0.2
detailsRecommended version: 2.0.1
Description: nth-check prior to 2.0.1 is vulnerable to Inefficient Regular Expression Complexity
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 2mABaWfyIOu9o9U73QxvgDsPL2pw%2FmrRwBgNZ3%2BpZWg%3D
Vulnerable Package
HIGH CVE-2021-3807 Npm-ansi-regex-2.1.1
detailsRecommended version: 3.0.1
Description: The package ansi-regex versions 3.x prior to 3.0.1, 4.x prior to 4.1.1, 5.x prior to 5.0.1 and 6.0.x prior to 6.0.1 is vulnerable to Inefficient Re...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: EgKK8LgbmdM8nC3CoJFP1fScxyrzvB4YoxSePJQ1HIw%3D
Vulnerable Package
HIGH CVE-2021-3807 Npm-ansi-regex-3.0.0
detailsRecommended version: 3.0.1
Description: The package ansi-regex versions 3.x prior to 3.0.1, 4.x prior to 4.1.1, 5.x prior to 5.0.1 and 6.0.x prior to 6.0.1 is vulnerable to Inefficient Re...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: XgLoHrFhS9CamgrdFNJ9qsH7vTCF9mPuJuei5ys8YYU%3D
Vulnerable Package
HIGH CVE-2022-0144 Npm-shelljs-0.8.4
detailsRecommended version: 0.8.5
Description: shelljs prior to 0.8.5 is vulnerable to Improper Privilege Management.
Attack Vector: LOCAL
Attack Complexity: LOW

ID: xTKNf1f2yQq8wBly0Sv6qF2ofJMz%2BwFPQOzCFHkCU1U%3D
Vulnerable Package
HIGH CVE-2022-21144 Npm-libxmljs-0.19.7
detailsRecommended version: 0.19.8
Description: This affects versions prior to 0.19.8 of libxmljs package. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: IWq%2FhqhRmBGliTyfO68QPK%2BAtXQROyJH5uAN6FZSRDE%3D
Vulnerable Package
HIGH CVE-2022-23308 Npm-libxmljs-0.19.7
detailsDescription: "valid.c" in libxml2 prior to 2.9.13 has a use-after-free of ID and IDREF attributes.
Attack Vector: NETWORK
Attack Complexity: LOW

ID: tE7ZNhqgcXbV%2BF0DXkv6gmhK51daPnQztBWiu28IYIQ%3D
Vulnerable Package
HIGH CVE-2022-23539 Npm-jsonwebtoken-8.5.1
detailsRecommended version: 9.0.0
Description: Versions prior to 9.0.0 `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For e...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: TKOLA2pQUXOOULhiA8dl6QHAF1QXMR2bqmwvuYSTMnE%3D
Vulnerable Package
HIGH CVE-2022-23540 Npm-jsonwebtoken-8.5.1
detailsRecommended version: 9.0.0
Description: Versions prior to 9.0.0 of `jsonwebtoken` library, lack of algorithm definition in the `jwt.verify()` function can lead to signature validation byp...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: DgZSRJUjxOBePqCGV%2Fl6ND%2BqSMT6SeQVXXROL4DRQoM%3D
Vulnerable Package
HIGH CVE-2022-24999 Npm-qs-6.5.2
detailsRecommended version: 6.5.3
Description: The qs package as used in Express through 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application becau...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 71mqRItF4BHH8IqlN%2BmdEssHOsBaMhiQZUWq6%2F3%2F9M0%3D
Vulnerable Package
HIGH CVE-2022-25883 Npm-semver-5.7.1
detailsRecommended version: 5.7.2
Description: The package semver versions prior to 5.7.2, 6.x through 6.3.0 and 7.x through 7.5.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: aSFev7A0jVE6aVD1wm%2FLxpIoqXpWJqvPOuAyTej%2FuhI%3D
Vulnerable Package
HIGH CVE-2022-25883 Npm-semver-7.3.8
detailsRecommended version: 7.5.2
Description: The package semver versions prior to 5.7.2, 6.x through 6.3.0 and 7.x through 7.5.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: OafgCai8NipzgtjO1PqLFz8oUvUpYion6hQkgtf1F84%3D
Vulnerable Package
HIGH CVE-2022-25883 Npm-semver-7.0.0
detailsRecommended version: 7.5.2
Description: The package semver versions prior to 5.7.2, 6.x through 6.3.0 and 7.x through 7.5.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: RnNR61ydzhIJUfYWj6skKhLIx%2Fgo%2FISJsUBTys3caYw%3D
Vulnerable Package
HIGH CVE-2022-25883 Npm-semver-6.3.0
detailsRecommended version: 6.3.1
Description: The package semver versions prior to 5.7.2, 6.x through 6.3.0 and 7.x through 7.5.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: v13zXuBoq6EyZzOEa3tu%2BRoJeCjUCShAbit8pmytkDs%3D
Vulnerable Package
HIGH CVE-2022-25883 Npm-semver-7.3.5
detailsRecommended version: 7.5.2
Description: The package semver versions prior to 5.7.2, 6.x through 6.3.0 and 7.x through 7.5.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: zvNMOZ9x062qLBFxRptsQHNs6pttr5MVlvDj5VSski8%3D
Vulnerable Package
HIGH CVE-2022-31129 Npm-moment-2.29.2
detailsRecommended version: 2.29.4
Description: moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an i...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: JfeFQwScswjSlxsPSyCfauf7dSfB1M94Y9r3juCR8r0%3D
Vulnerable Package
HIGH CVE-2022-3517 Npm-minimatch-3.0.4
detailsRecommended version: 3.0.5
Description: A vulnerability was found in the minimatch package versions prior to 3.0.5. This flaw allows a Regular Expression Denial of Service (ReDoS) when ca...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: JORm%2Fo5nc3mHpUiMM2JvcksNBUW72SoTtn1IDkns3Ec%3D
Vulnerable Package
HIGH CVE-2022-40303 Npm-libxmljs-0.19.7
detailsDescription: An issue was discovered in libxml2 prior to 2.10.3. When parsing a multi-gigabyte XML document with the "XML_PARSE_HUGE" parser option enabled, sev...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: OO%2B%2FwtLj2uitGbP3M7mQvbQ03HnIgZVCMZTTZn%2BNvqs%3D
Vulnerable Package
HIGH CVE-2022-40304 Npm-libxmljs-0.19.7
detailsDescription: An issue was discovered in libxml2 prior to 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to sub...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: BsjmLQ8vQDJeEIOdpMVB0oS8D1v7xO4abeJa8I0kSGc%3D
Vulnerable Package
HIGH CVE-2022-46175 Npm-json5-2.2.0
detailsRecommended version: 2.2.2
Description: JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` met...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: t6jGoyYVP6p2Qq8TSA1fQgxGk1sO5FeEElidFsT52%2BA%3D
Vulnerable Package
HIGH CVE-2023-26115 Npm-word-wrap-1.2.3
detailsRecommended version: 1.2.4
Description: Versions prior to 1.24 of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regu...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 4XXgj9Nw9pDr23Mr5yuFSv1Ub7obQrPWy4%2BXXLIv188%3D
Vulnerable Package
HIGH CVE-2023-45133 Npm-@babel/traverse-7.16.3
detailsRecommended version: 7.23.2
Description: Babel is a compiler for writing JavaScript. In `@babel/traverse` versions prior to 7.23.2 and 8.0.x prior to 8.0.0-alpha.4, using Babel to compile ...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: XCTzdKOSFmt7LGRpsqTdmJI3cZOY5D%2FkMNHBCuPm4rk%3D
Vulnerable Package
HIGH CVE-2024-21536 Npm-http-proxy-middleware-2.0.6
detailsRecommended version: 2.0.9
Description: The http-proxy-middleware versions through 2.0.7-beta.0 and 3.0.0-beta.0 through 3.0.2 are vulnerable to Denial of Service (DoS) due to an "Unhandl...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: tbUf2vPCZ1r%2BP9X056%2FS3IdZR2iuGTEq%2FnmgY3llWo0%3D
Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-7.0.3
detailsRecommended version: 7.0.5
Description: Versions of the package cross-spawn prior to 6.0.6 and 7.x prior to 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS), due to im...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: bUD18Kmk1wUcE45ELpkh3el73aQ8f2rU09eUjII3Uo4%3D
Vulnerable Package

More results are available on the CxOne platform

Fixed Issues (4)
Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 18
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 15
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 16
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 17

Copy link
Author

dependabot bot commented on behalf of github Sep 11, 2025

Superseded by #231.

@dependabot dependabot bot closed this Sep 11, 2025
@dependabot dependabot bot deleted the dependabot/npm_and_yarn/axios-0.30.0 branch September 11, 2025 23:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant