GHSA-6fc8-4gx4-v693

By advisories

GHSA-6fc8-4gx4-v693 Alternatives

Similar projects and alternatives to GHSA-6fc8-4gx4-v693

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better GHSA-6fc8-4gx4-v693 alternative or higher similarity.

GHSA-6fc8-4gx4-v693 reviews and mentions

Posts with mentions or reviews of GHSA-6fc8-4gx4-v693. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-10-19.
  • Try to install git repository with Hardhat and got a lot of vulnerabilities
    22 projects | /r/ethdev | 19 Oct 2022
    127 packages are looking for funding run `npm fund` for details # npm audit report async 2.0.0 - 2.6.3 Severity: high Prototype Pollution in async - https://github.com/advisories/GHSA-fwr7-v2mv-hh25 No fix available node_modules/ganache-core/node_modules/async ganache-core <=2.1.0-beta.7 || >=2.1.1 Depends on vulnerable versions of async Depends on vulnerable versions of lodash Depends on vulnerable versions of web3 Depends on vulnerable versions of web3-provider-engine node_modules/ganache-core @ethereum-waffle/provider <=4.0.1-dev.37f589d || 4.0.2-dev.0a87072 - 4.0.2-dev.c513a49 || 4.0.3-dev.0c13fb9 - 4.0.3-dev.e7e18f6 || 4.0.5-dev.06c4b26 - 4.0.5-dev.90390a9 Depends on vulnerable versions of @ethereum-waffle/ens Depends on vulnerable versions of ganache-core node_modules/@ethereum-waffle/provider @ethereum-waffle/chai 2.5.0 - 4.0.0-dev.e3fa452 Depends on vulnerable versions of @ethereum-waffle/provider node_modules/@ethereum-waffle/chai ethereum-waffle 2.3.0-istanbul.0 - 4.0.0-dev.e3fa452 Depends on vulnerable versions of @ethereum-waffle/chai Depends on vulnerable versions of @ethereum-waffle/provider node_modules/ethereum-waffle @nomiclabs/hardhat-waffle * Depends on vulnerable versions of ethereum-waffle node_modules/@nomiclabs/hardhat-waffle cross-fetch <=2.2.5 || 3.0.0 - 3.0.5 Severity: moderate Incorrect Authorization in cross-fetch - https://github.com/advisories/GHSA-7gc6-qh9x-w6h8 Depends on vulnerable versions of node-fetch fix available via `npm audit fix` node_modules/ganache-core/node_modules/cross-fetch elliptic <6.5.4 Severity: moderate Use of a Broken or Risky Cryptographic Algorithm - https://github.com/advisories/GHSA-r9p9-mrjm-926w fix available via `npm audit fix` node_modules/ganache-core/node_modules/elliptic @ethersproject/signing-key <=5.0.9 Depends on vulnerable versions of elliptic node_modules/ganache-core/node_modules/@ethersproject/signing-key got <11.8.5 Severity: moderate Got allows a redirect to a UNIX socket - https://github.com/advisories/GHSA-pfrx-2q88-qq97 No fix available node_modules/ganache-core/node_modules/got node_modules/ganache-core/node_modules/swarm-js/node_modules/got swarm-js 0.1.1 - 0.1.17 || 0.1.35 - 0.1.40 Depends on vulnerable versions of got node_modules/ganache-core/node_modules/swarm-js web3-bzz <=1.7.4 Depends on vulnerable versions of got Depends on vulnerable versions of underscore node_modules/ganache-core/node_modules/web3-bzz web3 <=1.7.4 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of web3-bzz Depends on vulnerable versions of web3-core Depends on vulnerable versions of web3-eth Depends on vulnerable versions of web3-eth-personal Depends on vulnerable versions of web3-net Depends on vulnerable versions of web3-shh Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3 json-schema <0.4.0 Severity: critical json-schema is vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-896r-f27r-55mw fix available via `npm audit fix` node_modules/ganache-core/node_modules/json-schema jsprim 0.3.0 - 1.4.1 || 2.0.0 - 2.0.1 Depends on vulnerable versions of json-schema node_modules/ganache-core/node_modules/jsprim lodash <=4.17.20 Severity: high Command Injection in lodash - https://github.com/advisories/GHSA-35jh-r3h4-6jhm Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-29mw-wpgm-hmr9 fix available via `npm audit fix` node_modules/ganache-core/node_modules/lodash minimist <1.2.6 Severity: critical Prototype Pollution in minimist - https://github.com/advisories/GHSA-xvch-5gv4-984h fix available via `npm audit fix` node_modules/ganache-core/node_modules/minimist node-fetch <=2.6.6 Severity: high The `size` option isn't honored after following a redirect in node-fetch - https://github.com/advisories/GHSA-w7rc-rwvf-8q5r node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor - https://github.com/advisories/GHSA-r683-j2x4-v87g No fix available node_modules/ganache-core/node_modules/fetch-ponyfill/node_modules/node-fetch node_modules/ganache-core/node_modules/node-fetch fetch-ponyfill 1.0.0 - 6.0.2 Depends on vulnerable versions of node-fetch node_modules/ganache-core/node_modules/fetch-ponyfill eth-json-rpc-middleware 1.1.0 - 5.0.2 Depends on vulnerable versions of fetch-ponyfill node_modules/ganache-core/node_modules/eth-json-rpc-middleware eth-json-rpc-infura <=5.0.0 Depends on vulnerable versions of eth-json-rpc-middleware node_modules/ganache-core/node_modules/eth-json-rpc-infura web3-provider-engine 14.0.0 - 15.0.12 Depends on vulnerable versions of eth-json-rpc-infura node_modules/ganache-core/node_modules/web3-provider-engine normalize-url 4.3.0 - 4.5.0 Severity: high ReDoS in normalize-url - https://github.com/advisories/GHSA-px4h-xg32-q955 fix available via `npm audit fix` node_modules/ganache-core/node_modules/normalize-url path-parse <1.0.7 Severity: moderate Regular Expression Denial of Service in path-parse - https://github.com/advisories/GHSA-hj48-42vr-x3v9 fix available via `npm audit fix` node_modules/ganache-core/node_modules/path-parse s imple-get <2.8.2 Severity: high Exposure of Sensitive Information in simple-get - https://github.com/advisories/GHSA-wpg7-2c88-r8xv fix available via `npm audit fix` node_modules/ganache-core/node_modules/simple-get tar <=4.4.17 Severity: high Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization - https://github.com/advisories/GHSA-5955-9wpr-37jh Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links - https://github.com/advisories/GHSA-qq89-hq3f-393p Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links - https://github.com/advisories/GHSA-9r2w-394v-53qc Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization - https://github.com/advisories/GHSA-3jfq-g458-7qm9 Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning - https://github.com/advisories/GHSA-r628-mhmh-qjhw fix available via `npm audit fix` node_modules/ganache-core/node_modules/tar underscore 1.3.2 - 1.12.0 Severity: critical Arbitrary Code Execution in underscore - https://github.com/advisories/GHSA-cf4h-3jhx-xvhq No fix available node_modules/ganache-core/node_modules/underscore web3-core-helpers <=1.3.6-rc.2 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-eth-iban Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-core-helpers web3-core <=1.3.5 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of web3-core-helpers Depends on vulnerable versions of web3-core-method Depends on vulnerable versions of web3-core-requestmanager Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-core web3-eth-ens <=1.3.6-rc.2 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-core Depends on vulnerable versions of web3-core-helpers Depends on vulnerable versions of web3-eth-abi Depends on vulnerable versions of web3-eth-contract Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-eth-ens web3-eth <=1.3.6-rc.2 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-core Depends on vulnerable versions of web3-core-helpers Depends on vulnerable versions of web3-core-method Depends on vulnerable versions of web3-core-subscriptions Depends on vulnerable versions of web3-eth-abi Depends on vulnerable versions of web3-eth-accounts Depends on vulnerable versions of web3-eth-contract Depends on vulnerable versions of web3-eth-ens Depends on vulnerable versions of web3-eth-iban Depends on vulnerable versions of web3-eth-personal Depends on vulnerable versions of web3-net Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-eth web3-core-method <=1.3.6-rc.2 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-core-helpers Depends on vulnerable versions of web3-core-subscriptions Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-core-method web3-net 1.2.0 - 1.3.5 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of web3-core Depends on vulnerable versions of web3-core-method Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-net web3-eth-personal <=1.3.5 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of web3-core Depends on vulnerable versions of web3-core-helpers Depends on vulnerable versions of web3-core-method Depends on vulnerable versions of web3-net Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-eth-personal web3-shh <=1.3.5 Depends on vulnerable versions of web3-core Depends on vulnerable versions of web3-core-method Depends on vulnerable versions of web3-core-subscriptions Depends on vulnerable versions of web3-net node_modules/ganache-core/node_modules/web3-shh web3-core-subscriptions <=1.3.6-rc.2 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-core-helpers node_modules/ganache-core/node_modules/web3-core-subscriptions web3-eth-contract <=1.3.6-rc.2 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-core Depends on vulnerable versions of web3-core-helpers Depends on vulnerable versions of web3-core-method Depends on vulnerable versions of web3-core-subscriptions Depends on vulnerable versions of web3-eth-abi Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-eth-contract web3-providers-http <=1.0.0 || 1.2.0 - 1.3.5 || 3.0.0-rc.0 - 3.0.0-rc.4 Depends on vulnerable versions of web3-core-helpers node_modules/ganache-core/node_modules/web3-providers-http web3-providers-ipc <=1.3.6-rc.2 || 3.0.0-rc.0 - 3.0.0-rc.5 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-core-helpers node_modules/ganache-core/node_modules/web3-providers-ipc web3-providers-ws <=1.3.6-rc.2 || 3.0.0-rc.0 - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-core-helpers node_modules/ganache-core/node_modules/web3-providers-ws web3-core-requestmanager <=1.3.5 || 3.0.0-rc.0 - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-core-helpers Depends on vulnerable versions of web3-providers-http Depends on vulnerable versions of web3-providers-ipc Depends on vulnerable versions of web3-providers-ws node_modules/ganache-core/node_modules/web3-core-requestmanager web3-eth-abi <=1.3.6-rc.2 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-eth-abi web3-eth-accounts <=1.3.5 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of underscore Depends on vulnerable versions of web3-core Depends on vulnerable versions of web3-core-helpers Depends on vulnerable versions of web3-core-method Depends on vulnerable versions of web3-utils n ode_modules/ganache-core/node_modules/web3-eth-accounts web3-utils 1.0.0-beta.8 - 1.3.5 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of underscore node_modules/ganache-core/node_modules/web3-utils web3-eth-iban <=1.3.5 || 2.0.0-alpha - 3.0.0-rc.4 Depends on vulnerable versions of web3-utils node_modules/ganache-core/node_modules/web3-eth-iban ws 5.0.0 - 5.2.2 Severity: moderate ReDoS in Sec-Websocket-Protocol header - https://github.com/advisories/GHSA-6fc8-4gx4-v693 fix available via `npm audit fix` node_modules/ganache-core/node_modules/web3-provider-engine/node_modules/ws yargs-parser <=5.0.0 Severity: moderate yargs-parser Vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-p9pc-299p-vxgp No fix available node_modules/@ensdomains/ens/node_modules/yargs-parser yargs 4.0.0-alpha1 - 7.0.0-alpha.3 || 7.1.1 Depends on vulnerable versions of yargs-parser node_modules/@ensdomains/ens/node_modules/yargs solc 0.3.6 - 0.4.26 Depends on vulnerable versions of yargs node_modules/@ensdomains/ens/node_modules/solc @ensdomains/ens * Depends on vulnerable versions of solc node_modules/@ensdomains/ens @ethereum-waffle/ens <=4.0.1-dev.e7e18f6 || 4.0.3-dev.06c4b26 - 4.0.3-dev.90390a9 Depends on vulnerable versions of @ensdomains/ens node_modules/@ethereum-waffle/ens 51 vulnerabilities (4 low, 12 moderate, 11 high, 24 critical) To address issues that do not require attention, run: npm audit fix Some issues need review, and may require choosing a different dependency.
  • First time playing with gatsby, error running npm develop
    7 projects | /r/gatsbyjs | 27 Nov 2021
    # npm audit report ansi-html * Severity: high Uncontrolled Resource Consumption in ansi-html - https://github.com/advisories/GHSA-whgm-jr23-g3j9 fix available via `npm audit fix --force` Will install [email protected], which is a breaking change node_modules/ansi-html @pmmmwh/react-refresh-webpack-plugin <=0.5.0-rc.6 Depends on vulnerable versions of ansi-html Depends on vulnerable versions of webpack-dev-server node_modules/@pmmmwh/react-refresh-webpack-plugin gatsby >=1.9.99 Depends on vulnerable versions of @pmmmwh/react-refresh-webpack-plugin Depends on vulnerable versions of @typescript-eslint/parser Depends on vulnerable versions of ansi-html Depends on vulnerable versions of eslint Depends on vulnerable versions of eslint-config-react-app Depends on vulnerable versions of gatsby-cli Depends on vulnerable versions of optimize-css-assets-webpack-plugin Depends on vulnerable versions of react-dev-utils Depends on vulnerable versions of strip-ansi Depends on vulnerable versions of webpack Depends on vulnerable versions of webpack-dev-server node_modules/gatsby ansi-regex >2.1.1 <5.0.1 Severity: moderate Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw fix available via `npm audit fix --force` Will install [email protected], which is a breaking change node_modules/react-dev-utils/node_modules/inquirer/node_modules/ansi-regex node_modules/string-width/node_modules/ansi-regex node_modules/strip-ansi/node_modules/ansi-regex node_modules/webpack-dev-server/node_modules/cliui/node_modules/ansi-regex node_modules/webpack-dev-server/node_modules/string-width/node_modules/ansi-regex node_modules/webpack-dev-server/node_modules/wrap-ansi/node_modules/ansi-regex strip-ansi 4.0.0 - 5.2.0 Depends on vulnerable versions of ansi-regex node_modules/react-dev-utils/node_modules/inquirer/node_modules/strip-ansi node_modules/string-width/node_modules/strip-ansi node_modules/strip-ansi node_modules/webpack-dev-server/node_modules/cliui/node_modules/strip-ansi node_modules/webpack-dev-server/node_modules/string-width/node_modules/strip-ansi node_modules/webpack-dev-server/node_modules/wrap-ansi/node_modules/strip-ansi cliui 4.0.0 - 5.0.0 Depends on vulnerable versions of strip-ansi Depends on vulnerable versions of wrap-ansi node_modules/webpack-dev-server/node_modules/cliui yargs 10.1.0 - 15.0.0 Depends on vulnerable versions of cliui Depends on vulnerable versions of string-width node_modules/webpack-dev-server/node_modules/yargs webpack-dev-server 2.0.0-beta - 3.11.3 Depends on vulnerable versions of chokidar Depends on vulnerable versions of yargs node_modules/webpack-dev-server @pmmmwh/react-refresh-webpack-plugin <=0.5.0-rc.6 Depends on vulnerable versions of ansi-html Depends on vulnerable versions of webpack-dev-server node_modules/@pmmmwh/react-refresh-webpack-plugin gatsby >=1.9.99 Depends on vulnerable versions of @pmmmwh/react-refresh-webpack-plugin Depends on vulnerable versions of @typescript-eslint/parser Depends on vulnerable versions of ansi-html Depends on vulnerable versions of eslint Depends on vulnerable versions of eslint-config-react-app Depends on vulnerable versions of gatsby-cli Depends on vulnerable versions of optimize-css-assets-webpack-plugin Depends on vulnerable versions of react-dev-utils Depends on vulnerable versions of strip-ansi Depends on vulnerable versions of webpack Depends on vulnerable versions of webpack-dev-server node_modules/gatsby eslint 4.5.0 - 7.15.0 Depends on vulnerable versions of strip-ansi Depends on vulnerable versions of table node_modules/eslint @typescript-eslint/eslint-plugin <=3.0.0-alpha.27 Depends on vulnerable versions of @typescript-eslint/parser Depends on vulnerable versions of eslint node_modules/@typescript-eslint/eslint-plugin eslint-config-react-app 3.0.0-next.03604a46 - 5.2.1 Depends on vulnerable versions of @typescript-eslint/eslint-plugin Depends on vulnerable versions of @typescript-eslint/parser Depends on vulnerable versions of eslint node_modules/eslint-config-react-app @typescript-eslint/parser 1.1.1-alpha.0 - 2.34.1-alpha.2 Depends on vulnerable versions of eslint node_modules/@typescript-eslint/parser gatsby-cli 2.5.9-ink.60 - 2.5.9-ink.61 || >=2.6.0-0 Depends on vulnerable versions of gatsby-recipes Depends on vulnerable versions of strip-ansi node_modules/gatsby-cli inquirer 3.2.0 - 7.0.4 Depends on vulnerable versions of string-width Depends on vulnerable versions of strip-ansi node_modules/react-dev-utils/node_modules/inquirer react-dev-utils 0.4.0 - 11.0.3 Depends on vulnerable versions of inquirer node_modules/react-dev-utils string-width 2.1.0 - 4.1.0 Depends on vulnerable versions of strip-ansi node_modules/string-width node_modules/table/node_modules/string-width node_modules/webpack-dev-server/node_modules/string-width table 4.0.2 - 5.4.6 Depends on vulnerable versions of string-width node_modules/table wrap-ansi 3.0.0 - 6.1.0 Depends on vulnerable versions of string-width Depends on vulnerable versions of strip-ansi node_modules/webpack-dev-server/node_modules/wrap-ansi yurnalist >=1.0.5 Depends on vulnerable versions of strip-ansi node_modules/yurnalist glob-parent <5.1.2 Severity: high Regular expression denial of service - https://github.com/advisories/GHSA-ww39-953v-wcq6 fix available via `npm audit fix --force` Will install [email protected], which is a breaking change node_modules/watchpack-chokidar2/node_modules/glob-parent node_modules/webpack-dev-server/node_modules/glob-parent chokidar 1.0.0-rc1 - 2.1.8 Depends on vulnerable versions of glob-parent node_modules/watchpack-chokidar2/node_modules/chokidar node_modules/webpack-dev-server/node_modules/chokidar watchpack-chokidar2 * Depends on vulnerable versions of chokidar node_modules/watchpack-chokidar2 watchpack 1.7.2 - 1.7.5 Depends on vulnerable versions of watchpack-chokidar2 node_modules/watchpack webpack 4.44.0 - 4.46.0 Depends on vulnerable versions of watchpack node_modules/webpack gatsby >=1.9.99 Depends on vulnerable versions of @pmmmwh/react-refresh-webpack-plugin Depends on vulnerable versions of @typescript-eslint/parser Depends on vulnerable versions of ansi-html Depends on vulnerable versions of eslint Depends on vulnerable versions of eslint-config-react-app Depends on vulnerable versions of gatsby-cli Depends on vulnerable versions of optimize-css-assets-webpack-plugin Depends on vulnerable versions of react-dev-utils Depends on vulnerable versions of strip-ansi Depends on vulnerable versions of webpack Depends on vulnerable versions of webpack-dev-server node_modules/gatsby webpack-dev-server 2.0.0-beta - 3.11.3 Depends on vulnerable versions of chokidar Depends on vulnerable versions of yargs node_modules/webpack-dev-server @pmmmwh/react-refresh-webpack-plugin <=0.5.0-rc.6 Depends on vulnerable versions of ansi-html Depends on vulnerable versions of webpack-dev-server node_modules/@pmmmwh/react-refresh-webpack-plugin nth-check <2.0.1 Severity: moderate Inefficient Regular Expression Complexity in nth-check - https://github.com/advisories/GHSA-rp65-9cf3-cjxr fix available via `npm audit fix --force` Will install [email protected], which is a breaking change node_modules/svgo/node_modules/nth-check css-select <=3.1.0 Depends on vulnerable versions of nth-check node_modules/svgo/node_modules/css-select svgo 1.0.0 - 1.3.2 Depends on vulnerable versions of css-select node_modules/svgo postcss-svgo 4.0.0-nightly.2020.1.9 - 5.0.0-rc.2 Depends on vulnerable versions of svgo node_modules/postcss-svgo cssnano-preset-default <=4.0.8 Depends on vulnerable versions of postcss-svgo node_modules/cssnano-preset-default cssnano 4.0.0-nightly.2020.1.9 - 4.1.11 Depends on vulnerable versions of cssnano-preset-default node_modules/cssnano optimize-css-assets-webpack-plugin 3.2.1 || 5.0.0 - 5.0.8 Depends on vulnerable versions of cssnano node_modules/optimize-css-assets-webpack-plugin gatsby >=1.9.99 Depends on vulnerable versions of @pmmmwh/react-refresh-webpack-plugin Depends on vulnerable versions of @typescript-eslint/parser Depends on vulnerable versions of ansi-html Depends on vulnerable versions of eslint Depends on vulnerable versions of eslint-config-react-app Depends on vulnerable versions of gatsby-cli Depends on vulnerable versions of optimize-css-assets-webpack-plugin Depends on vulnerable versions of react-dev-utils Depends on vulnerable versions of strip-ansi Depends on vulnerable versions of webpack Depends on vulnerable versions of webpack-dev-server node_modules/gatsby react-dev-utils 0.4.0 - 11.0.3 Severity: moderate Improper Neutralization of Special Elements used in an OS Command. - https://github.com/advisories/GHSA-5q6m-3h65-w53x Depends on vulnerable versions of inquirer fix available via `npm audit fix --force` Will install [email protected], which is a breaking change node_modules/react-dev-utils gatsby >=1.9.99 Depends on vulnerable versions of @pmmmwh/react-refresh-webpack-plugin Depends on vulnerable versions of @typescript-eslint/parser Depends on vulnerable versions of ansi-html Depends on vulnerable versions of eslint Depends on vulnerable versions of eslint-config-react-app Depends on vulnerable versions of gatsby-cli Depends on vulnerable versions of optimize-css-assets-webpack-plugin Depends on vulnerable versions of react-dev-utils Depends on vulnerable versions of strip-ansi Depends on vulnerable versions of webpack Depends on vulnerable versions of webpack-dev-server node_modules/gatsby trim <0.0.3 Severity: high Regular Expression Denial of Service in trim - https://github.com/advisories/GHSA-w5p7-h5w8-2hfq fix available via `npm audit fix --force` Will install [email protected], which is a breaking change node_modules/trim remark-parse <=8.0.3 Depends on vulnerable versions of trim node_modules/remark-parse gatsby-recipes 0.0.7-unifiedroutes.76 - 0.0.7-unifiedroutes-v2.135 || >=0.1.31 Depends on vulnerable versions of remark-parse node_modules/gatsby-recipes gatsby-cli 2.5.9-ink.60 - 2.5.9-ink.61 || >=2.6.0-0 Depends on vulnerable versions of gatsby-recipes Depends on vulnerable versions of strip-ansi node_modules/gatsby-cli gatsby >=1.9.99 Depends on vulnerable versions of @pmmmwh/react-refresh-webpack-plugin Depends on vulnerable versions of @typescript-eslint/parser Depends on vulnerable versions of ansi-html Depends on vulnerable versions of eslint Depends on vulnerable versions of eslint-config-react-app Depends on vulnerable versions of gatsby-cli Depends on vulnerable versions of optimize-css-assets-webpack-plugin Depends on vulnerable versions of react-dev-utils Depends on vulnerable versions of strip-ansi Depends on vulnerable versions of webpack Depends on vulnerable versions of webpack-dev-server node_modules/gatsby ws 7.0.0 - 7.4.5 Severity: moderate ReDoS in Sec-Websocket-Protocol header - https://github.com/advisories/GHSA-6fc8-4gx4-v693 fix available via `npm audit fix` node_modules/@graphql-tools/url-loader/node_modules/ws @graphql-tools/url-loader 6.4.1-alpha-0ea0f8b7.0 - 6.10.1 Depends on vulnerable versions of ws node_modules/@graphql-tools/url-loader 36 vulnerabilities (23 moderate, 13 high) To address issues that do not require attention, run: npm audit fix To address all issues (including breaking changes), run: npm audit fix --force