express-jwt <=7.7.7 || 8.3.0 Severity: high Authorization bypass in express-jwt - https://github.com/advisories/GHSA-6g6m-m6h5-w9gf Depends on vulnerable versions of jsonwebtoken Depends on vulnerable versions of lodash.set fix available via `npm audit fix --force` Will install express-jwt@8.4.1, which is a breaking change node_modules/express-jwt
hoek * Severity: high Prototype Pollution in hoek - https://github.com/advisories/GHSA-jp4x-w63m-7wgm hoek subject to prototype pollution via the clone function. - https://github.com/advisories/GHSA-c429-5p7v-vgjp fix available via `npm audit fix --force` Will install jsonwebtoken@9.0.2, which is a breaking change node_modules/hoek joi 0.0.2 - 8.0.5 Depends on vulnerable versions of hoek Depends on vulnerable versions of topo node_modules/joi jsonwebtoken <=8.5.1 Depends on vulnerable versions of joi node_modules/express-jwt/node_modules/jsonwebtoken node_modules/jsonwebtoken topo <=2.0.0 Depends on vulnerable versions of hoek node_modules/topo
html-minifier * Severity: high kangax html-minifier REDoS vulnerability - https://github.com/advisories/GHSA-pfq8-rq6v-vf5m fix available via `npm audit fix --force` Will install art-template@4.1.0, which is a breaking change node_modules/html-minifier art-template >=4.2.0 Depends on vulnerable versions of html-minifier node_modules/art-template
lodash <=4.17.20 Severity: critical Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-x5rq-j2xg-h7qm Prototype Pollution in lodash - https://github.com/advisories/GHSA-4xc9-xhrj-v574 Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-29mw-wpgm-hmr9 Prototype Pollution in lodash - https://github.com/advisories/GHSA-p6mc-m468-83gw Command Injection in lodash - https://github.com/advisories/GHSA-35jh-r3h4-6jhm Prototype Pollution in lodash - https://github.com/advisories/GHSA-fvqr-27wr-82fm Prototype Pollution in lodash - https://github.com/advisories/GHSA-jf85-cpcp-j695 No fix available node_modules/lodash xmlbuilder 2.5.0 - 4.2.0 Depends on vulnerable versions of lodash node_modules/xmlbuilder plist <=3.0.4 Depends on vulnerable versions of xmlbuilder Depends on vulnerable versions of xmldom node_modules/plist chrome * Depends on vulnerable versions of plist node_modules/chrome
lodash.set * Severity: high Prototype Pollution in lodash - https://github.com/advisories/GHSA-p6mc-m468-83gw fix available via `npm audit fix --force` Will install express-jwt@8.4.1, which is a breaking change node_modules/lodash.set
node-serialize * Severity: critical Code Execution through IIFE in node-serialize - https://github.com/advisories/GHSA-q4v7-4rhw-9hqm No fix available node_modules/node-serialize
xmldom * Severity: critical Misinterpretation of malicious XML input - https://github.com/advisories/GHSA-h6q6-9hqw-rwfv xmldom allows multiple root nodes in a DOM - https://github.com/advisories/GHSA-crh6-fp67-6883 Misinterpretation of malicious XML input - https://github.com/advisories/GHSA-5fg8-2547-mr8q No fix available node_modules/xmldom
14 vulnerabilities (9 high, 5 critical)
To address all issues possible (including breaking changes), run: npm audit fix --force
Some issues need review, and may require choosing a different dependency.