Skip to content

chore(deps): update dependency cors to v2.8.6

d5ec262
Select commit
Loading
Failed to load commit list.
Open

chore(deps): update dependency cors to v2.8.6 #767

chore(deps): update dependency cors to v2.8.6
d5ec262
Select commit
Loading
Failed to load commit list.
codefactor.io / CodeFactor failed Mar 28, 2026 in 1s

26 issues found.

Annotations

Check warning on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable body-parser (CVE-2024-45590) [update to 1.20.3] (trivy-CVE-2024-45590-body-parser)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable cross-spawn (CVE-2024-21538) [update to 7.0.5, 6.0.6] (trivy-CVE-2024-21538-cross-spawn)

Check warning on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable jsonpath-plus (CVE-2025-1302) [update to 10.3.0] (trivy-CVE-2025-1302-jsonpath-plus)

Check failure on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)

Check failure on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)

Check warning on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable cross-spawn (CVE-2024-21538) [update to 7.0.5, 6.0.6] (trivy-CVE-2024-21538-cross-spawn)

Check failure on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable jsonpath-plus (CVE-2024-21534) [update to 10.2.0] (trivy-CVE-2024-21534-jsonpath-plus)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable node-fetch (CVE-2022-0235) [update to 3.1.1, 2.6.7] (trivy-CVE-2022-0235-node-fetch)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable path-to-regexp (CVE-2024-52798) [update to 0.1.12] (trivy-CVE-2024-52798-path-to-regexp)

Check failure on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable jsonpath-plus (CVE-2024-21534) [update to 10.2.0] (trivy-CVE-2024-21534-jsonpath-plus)

Check warning on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable path-to-regexp (CVE-2024-45296) [update to 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0] (trivy-CVE-2024-45296-path-to-regexp)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable jsonpath-plus (CVE-2025-1302) [update to 10.3.0] (trivy-CVE-2025-1302-jsonpath-plus)

Check warning on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable body-parser (CVE-2024-45590) [update to 1.20.3] (trivy-CVE-2024-45590-body-parser)

Check failure on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)

Check warning on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable axios (CVE-2024-39338) [update to 1.7.4] (trivy-CVE-2024-39338-axios)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable axios (CVE-2025-27152) [update to 1.8.2, 0.30.0] (trivy-CVE-2025-27152-axios)

Check failure on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable axios (CVE-2025-27152) [update to 1.8.2, 0.30.0] (trivy-CVE-2025-27152-axios)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable path-to-regexp (CVE-2024-45296) [update to 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0] (trivy-CVE-2024-45296-path-to-regexp)

Check warning on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable axios (CVE-2025-27152) [update to 1.8.2, 0.30.0] (trivy-CVE-2025-27152-axios)

Check warning on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable path-to-regexp (CVE-2024-52798) [update to 0.1.12] (trivy-CVE-2024-52798-path-to-regexp)

Check warning on line 0 in yarn.lock

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

yarn.lock#L0

Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)