mirror of
https://github.com/denoland/deno.git
synced 2025-12-23 08:48:24 +00:00
|
Some checks are pending
ci / build libs (push) Blocked by required conditions
ci / test release macos-aarch64 (push) Blocked by required conditions
ci / bench release linux-x86_64 (push) Blocked by required conditions
ci / lint debug linux-x86_64 (push) Blocked by required conditions
ci / lint debug macos-x86_64 (push) Blocked by required conditions
ci / lint debug windows-x86_64 (push) Blocked by required conditions
ci / test debug linux-x86_64 (push) Blocked by required conditions
ci / test release linux-x86_64 (push) Blocked by required conditions
ci / test debug macos-x86_64 (push) Blocked by required conditions
ci / test release macos-x86_64 (push) Blocked by required conditions
ci / test debug windows-x86_64 (push) Blocked by required conditions
ci / test release windows-x86_64 (push) Blocked by required conditions
ci / pre-build (push) Waiting to run
ci / test debug linux-aarch64 (push) Blocked by required conditions
ci / test release linux-aarch64 (push) Blocked by required conditions
ci / test debug macos-aarch64 (push) Blocked by required conditions
ci / publish canary (push) Blocked by required conditions
This commit adds a new `deno audit` subcommand that collects all dependencies and queries npm registry for information about known vulnerabilities of used npm packages. ``` $ ../deno/target/debug/deno audit ... ╭ Prototype Pollution Protection Bypass in qs │ Severity: high │ Package: qs │ Vulnerable: <6.0.4 │ Patched: >=6.0.4 │ Info: https://github.com/advisories/GHSA-gqgv-6jq5-jjj9 ╰ Actions: install express@5.1.0 (major upgrade) ╭ qs vulnerable to Prototype Pollution │ Severity: high │ Package: qs │ Vulnerable: <6.2.4 │ Patched: >=6.2.4 │ Info: https://github.com/advisories/GHSA-hrpp-h998-j3pp ╰ Actions: install express@5.1.0 (major upgrade) ╭ send vulnerable to template injection that can lead to XSS │ Severity: low │ Package: send │ Vulnerable: <0.19.0 │ Patched: >=0.19.0 │ Info: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg ╰ Actions: install express@5.1.0 (major upgrade) ╭ serve-static vulnerable to template injection that can lead to XSS │ Severity: low │ Package: serve-static │ Vulnerable: <1.16.0 │ Patched: >=1.16.0 │ Info: https://github.com/advisories/GHSA-cm22-4g7w-348p ╰ Actions: install express@5.1.0 (major upgrade) Found 25 vulnerabilities Severity: 8 low, 6 moderate, 9 high, 2 critical ``` |
||
|---|---|---|
| .. | ||
| flags.rs | ||
| flags_net.rs | ||
| mod.rs | ||