chore(deps): update dependency cors to v2.8.6 #767
26 issues found.
Annotations
Check warning on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable body-parser (CVE-2024-45590) [update to 1.20.3] (trivy-CVE-2024-45590-body-parser)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable cross-spawn (CVE-2024-21538) [update to 7.0.5, 6.0.6] (trivy-CVE-2024-21538-cross-spawn)
Check warning on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable jsonpath-plus (CVE-2025-1302) [update to 10.3.0] (trivy-CVE-2025-1302-jsonpath-plus)
Check failure on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)
Check failure on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)
Check warning on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable cross-spawn (CVE-2024-21538) [update to 7.0.5, 6.0.6] (trivy-CVE-2024-21538-cross-spawn)
Check failure on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable jsonpath-plus (CVE-2024-21534) [update to 10.2.0] (trivy-CVE-2024-21534-jsonpath-plus)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable node-fetch (CVE-2022-0235) [update to 3.1.1, 2.6.7] (trivy-CVE-2022-0235-node-fetch)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable path-to-regexp (CVE-2024-52798) [update to 0.1.12] (trivy-CVE-2024-52798-path-to-regexp)
Check failure on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable jsonpath-plus (CVE-2024-21534) [update to 10.2.0] (trivy-CVE-2024-21534-jsonpath-plus)
Check warning on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable path-to-regexp (CVE-2024-45296) [update to 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0] (trivy-CVE-2024-45296-path-to-regexp)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable jsonpath-plus (CVE-2025-1302) [update to 10.3.0] (trivy-CVE-2025-1302-jsonpath-plus)
Check warning on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable body-parser (CVE-2024-45590) [update to 1.20.3] (trivy-CVE-2024-45590-body-parser)
Check failure on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)
Check warning on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable axios (CVE-2024-39338) [update to 1.7.4] (trivy-CVE-2024-39338-axios)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable axios (CVE-2025-27152) [update to 1.8.2, 0.30.0] (trivy-CVE-2025-27152-axios)
Check failure on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable axios (CVE-2025-27152) [update to 1.8.2, 0.30.0] (trivy-CVE-2025-27152-axios)
Check warning on line 0 in package-lock.json
codefactor-io / CodeFactor
package-lock.json#L0
Use of vulnerable path-to-regexp (CVE-2024-45296) [update to 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0] (trivy-CVE-2024-45296-path-to-regexp)
Check warning on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable axios (CVE-2025-27152) [update to 1.8.2, 0.30.0] (trivy-CVE-2025-27152-axios)
Check warning on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable path-to-regexp (CVE-2024-52798) [update to 0.1.12] (trivy-CVE-2024-52798-path-to-regexp)
Check warning on line 0 in yarn.lock
codefactor-io / CodeFactor
yarn.lock#L0
Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)