Dev #698
Dev #698
2 issues fixed. 16 issues found.
Annotations
Check warning on line 0 in server/package-lock.json
codefactor-io / CodeFactor
server/package-lock.json#L0
Use of vulnerable tar-fs (CVE-2025-48387) [update to 1.16.5, 2.1.3, 3.0.9] (trivy-CVE-2025-48387-tar-fs)
Check warning on line 0 in server/package-lock.json
codefactor-io / CodeFactor
server/package-lock.json#L0
Use of vulnerable tar-fs (CVE-2024-12905) [update to 1.16.4, 2.1.2, 3.0.7] (trivy-CVE-2024-12905-tar-fs)
Check warning on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable ws (CVE-2024-37890) [update to 5.2.4, 6.2.3, 7.5.10, 8.17.1] (trivy-CVE-2024-37890-ws)
Check failure on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable @babel/traverse (CVE-2023-45133) [update to 7.23.2, 8.0.0-alpha.4] (trivy-CVE-2023-45133-@babel/traverse)
Check warning on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable semver (CVE-2022-25883) [update to 7.5.2, 6.3.1, 5.7.2] (trivy-CVE-2022-25883-semver)
Check warning on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable braces (CVE-2024-4068) [update to 3.0.3] (trivy-CVE-2024-4068-braces)
Check warning on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable braces (CVE-2024-4068) [update to 3.0.3] (trivy-CVE-2024-4068-braces)
Check warning on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable semver (CVE-2022-25883) [update to 7.5.2, 6.3.1, 5.7.2] (trivy-CVE-2022-25883-semver)
Check warning on line 0 in server/package-lock.json
codefactor-io / CodeFactor
server/package-lock.json#L0
Use of vulnerable tar-fs (CVE-2025-59343) [update to 3.1.1, 2.1.4, 1.16.6] (trivy-CVE-2025-59343-tar-fs)
Check warning on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable semver (CVE-2022-25883) [update to 7.5.2, 6.3.1, 5.7.2] (trivy-CVE-2022-25883-semver)
Check warning on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable cross-spawn (CVE-2024-21538) [update to 7.0.5, 6.0.6] (trivy-CVE-2024-21538-cross-spawn)
Check failure on line 0 in server/package-lock.json
codefactor-io / CodeFactor
server/package-lock.json#L0
Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)
Check warning on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable ip (CVE-2024-29415) (trivy-CVE-2024-29415-ip)
Check warning on line 0 in client/package-lock.json
codefactor-io / CodeFactor
client/package-lock.json#L0
Use of vulnerable ws (CVE-2024-37890) [update to 5.2.4, 6.2.3, 7.5.10, 8.17.1] (trivy-CVE-2024-37890-ws)
Check warning on line 0 in server/package-lock.json
codefactor-io / CodeFactor
server/package-lock.json#L0
Use of vulnerable axios (CVE-2025-27152) [update to 1.8.2, 0.30.0] (trivy-CVE-2025-27152-axios)
Check warning on line 0 in server/package-lock.json
codefactor-io / CodeFactor
server/package-lock.json#L0
Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)