You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Depends on vulnerable versions of mpath Depends on vulnerable versions of mquery fix available via npm audit fix --force`
Will install [email protected], which is outside the stated dependency range
node_modules/mongoose
mpath <0.8.4
Severity: moderate
Type confusion in mpath - GHSA-p92x-r36w-9395
fix available via npm audit fix --force
Will install [email protected], which is outside the stated dependency range
node_modules/mpath
mquery <3.2.3
Severity: moderate
Code Injection in mquery - GHSA-45q2-34rf-mr94
fix available via npm audit fix --force
Will install [email protected], which is outside the stated dependency range
node_modules/mquery
pug <=3.0.2
Severity: high
Remote code execution via the pretty option. - GHSA-p493-635q-r6gr
Pug allows JavaScript code execution if an application accepts untrusted input - GHSA-3965-hpx2-q597
Depends on vulnerable versions of pug-code-gen
fix available via npm audit fix --force
Will install [email protected], which is a breaking change
node_modules/pug
pug-code-gen <=2.0.3
Severity: high
Pug allows JavaScript code execution if an application accepts untrusted input - GHSA-3965-hpx2-q597
fix available via npm audit fix --force
Will install [email protected], which is a breaking change
node_modules/pug-code-gen
request *
Severity: moderate
Server-Side Request Forgery in Request - GHSA-p8p7-x288-28g6
Depends on vulnerable versions of tough-cookie
No fix available
node_modules/request
@uphold/request-logger <=2.0.0
Depends on vulnerable versions of request
node_modules/@uphold/request-logger
tough-cookie <4.1.3
Severity: moderate
tough-cookie Prototype Pollution vulnerability - GHSA-72xf-g2v4-qvf3
No fix available
node_modules/tough-cookie
Where in the instructions do you see to run npm audit fix --force? This project hasn't been updated in a few years and there are lots of outdated dependencies. A few of the dependencies cannot be updated without changes to the explorer code to accommodate for breaking changes, so unless you are planning to rewrite the codebase you should stick with the dependencies that the project is asking for. If you follow the setup instructions it works fine without updating the dependencies.
If you're interested in using a more modern version of the iquidus explorer that already has the code changes in place to support all the updated dependencies, take a look at my explorer: https://github.com/team-exor/eiquidus
Depends on vulnerable versions of mpath Depends on vulnerable versions of mquery fix available via
npm audit fix --force`Will install [email protected], which is outside the stated dependency range
node_modules/mongoose
mpath <0.8.4
Severity: moderate
Type confusion in mpath - GHSA-p92x-r36w-9395
fix available via
npm audit fix --force
Will install [email protected], which is outside the stated dependency range
node_modules/mpath
mquery <3.2.3
Severity: moderate
Code Injection in mquery - GHSA-45q2-34rf-mr94
fix available via
npm audit fix --force
Will install [email protected], which is outside the stated dependency range
node_modules/mquery
pug <=3.0.2
Severity: high
Remote code execution via the
pretty
option. - GHSA-p493-635q-r6grPug allows JavaScript code execution if an application accepts untrusted input - GHSA-3965-hpx2-q597
Depends on vulnerable versions of pug-code-gen
fix available via
npm audit fix --force
Will install [email protected], which is a breaking change
node_modules/pug
pug-code-gen <=2.0.3
Severity: high
Pug allows JavaScript code execution if an application accepts untrusted input - GHSA-3965-hpx2-q597
fix available via
npm audit fix --force
Will install [email protected], which is a breaking change
node_modules/pug-code-gen
request *
Severity: moderate
Server-Side Request Forgery in Request - GHSA-p8p7-x288-28g6
Depends on vulnerable versions of tough-cookie
No fix available
node_modules/request
@uphold/request-logger <=2.0.0
Depends on vulnerable versions of request
node_modules/@uphold/request-logger
tough-cookie <4.1.3
Severity: moderate
tough-cookie Prototype Pollution vulnerability - GHSA-72xf-g2v4-qvf3
No fix available
node_modules/tough-cookie
15 vulnerabilities (1 low, 8 moderate, 5 high, 1 critical)
To address all issues possible (including breaking changes), run:
npm audit fix --force
Some issues need review, and may require choosing
a different dependency.
root@ubuntu:~/explorer#
`
The text was updated successfully, but these errors were encountered: