Skip to content

Conversation

@Angello-droid
Copy link
Contributor

I updated the links on the readme and grammar in some areas.

I updated the links on the readme and grammar in some areas.
@github-actions
Copy link

Logo
Checkmarx One – Scan Summary & Details974f8f9c-75b0-42bb-a4e2-70e8411b7d42

New Issues (5)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2025-7783 Npm-form-data-4.0.2
detailsRecommended version: 4.0.4
Description: Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: Lx1sOs6JEjaQhtrbwhBVKgCaWuTM7PmcbbqK6kwzRTo%3D
Vulnerable Package
CRITICAL CVE-2025-7783 Npm-axios-1.8.4
detailsRecommended version: 1.12.0
Description: Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: waQXUEmp8YMac2%2FVuwzlVILa%2Fl%2FhPXorFq4CRzoPj%2BY%3D
Vulnerable Package
CRITICAL CVE-2025-9288 Npm-sha.js-2.4.11
detailsRecommended version: 2.4.12
Description: Improper Input Validation vulnerability in sha.js allows Input Data Manipulation.This issue affects sha.js through 2.4.11.
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: X41%2F1Jdt0CruiHdbEZrSRh1Svj2Cp4ufJvfADt%2Fn8GA%3D
Vulnerable Package
HIGH CVE-2025-58754 Npm-axios-1.8.4
detailsRecommended version: 1.12.0
Description: Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to version 1.12.0 runs on Node.js and is given a URL with the "d...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: TNJ8Y7Il0PSHtM22SkmEDX6AizTiPV9bhE4JgjEngiA%3D
Vulnerable Package
LOW CVE-2025-5889 Npm-brace-expansion-1.1.11
detailsRecommended version: 1.1.12
Description: A vulnerability was found in juliangruber brace-expansion. It has been rated as problematic. Affected by this issue is the function "expand" of the...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: ym08HUAAw458B1q0mslTGS3r3bx36UyBTNjYTZRQzXI%3D
Vulnerable Package
Policy Management Violations (1)
Policy Name Rule(s) Break Build
Quality Gate - v3 Open Source Vulnerable Package true

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants