You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please update url-parse to latest non vulnerable version.
npm audit provides info:
url-parse <=1.5.8
fixed in 1.5.9 Severity: critical
Authorization bypass in url-parse - GHSA-rqff-837h-mm52
Incorrect returned href via an '@' sign but no user info and hostname - GHSA-8v38-pw62-9cw2
Incorrect hostname / protocol due to unstripped leading control characters. - GHSA-jf5r-8hm2-f872
Authorization Bypass Through User-Controlled Key in url-parse - GHSA-hgjh-723h-mx2j
fix available via npm audit fix
node_modules/url-parse`
% npm ls url-parse
myproject@1.0.0
└─┬ webdav@4.8.0
└── url-parse@1.5.3
The text was updated successfully, but these errors were encountered:
Please update url-parse to latest non vulnerable version.
npm audit provides info:
url-parse <=1.5.8
fixed in 1.5.9
Severity: critical
Authorization bypass in url-parse - GHSA-rqff-837h-mm52
Incorrect returned href via an '@' sign but no user info and hostname - GHSA-8v38-pw62-9cw2
Incorrect hostname / protocol due to unstripped leading control characters. - GHSA-jf5r-8hm2-f872
Authorization Bypass Through User-Controlled Key in url-parse - GHSA-hgjh-723h-mx2j
fix available via
npm audit fix
node_modules/url-parse`
The text was updated successfully, but these errors were encountered: