[Snyk] Security upgrade pkg from 4.3.4 to 5.0.0 #145
Pull Request #145 Alerts: Complete with warnings WARNING: Free tier size exceeded
| Report | Status | Message |
|---|---|---|
| PR #145 Alerts | Found 6 project alerts |
Pull request alerts notify when new issues are detected between the diff of the pull request and it's target branch.
Details
Warning
Review the following alerts detected in dependencies.
According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.
| Action | Severity | Alert (click "▶" to expand/collapse) |
|---|---|---|
| Warn | Critical CVE: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code in npm
|
|
| Warn | Critical CVE: Insufficient Entropy in npm
|
|
| Warn | Critical CVE: npm
|
|
| Warn | Critical CVE: Growl before 1.10.0 vulnerable to Command InjectionCVE: GHSA-qh2h-chj9-jffq Growl before 1.10.0 vulnerable to Command Injection (CRITICAL) Affected versions: < 1.10.0 Patched version: 1.10.0 From: deps/v8/tools/clusterfuzz/js_fuzzer/package-lock.json → ℹ Read more on: This package | This alert | What is a critical CVE?
|
|
| Warn | Critical CVE: Prototype Pollution in npm
|
|
| Warn | Critical CVE: Prototype Pollution in npm
|