added full-width bottom of main elements to event page #7912
Annotations
10 errors and 2 warnings
Security advisory:
Title: qs vulnerable to Prototype Pollution
Module name: qs
Dependency: node-libcurl
Path: node-libcurl>node-gyp>request>qs
Severity: high
Details: https://github.com/advisories/GHSA-hrpp-h998-j3pp
|
Security advisory:
Title: tough-cookie Prototype Pollution vulnerability
Module name: tough-cookie
Dependency: node-libcurl
Path: node-libcurl>node-gyp>request>tough-cookie
Severity: moderate
Details: https://github.com/advisories/GHSA-72xf-g2v4-qvf3
|
Security advisory:
Title: qs vulnerable to Prototype Pollution
Module name: qs
Dependency: express
Path: express>qs
Severity: high
Details: https://github.com/advisories/GHSA-hrpp-h998-j3pp
|
Security advisory:
Title: Command Injection in moment-timezone
Module name: moment-timezone
Dependency: moment-timezone
Path: moment-timezone
Severity: low
Details: https://github.com/advisories/GHSA-56x4-j7p9-fcf9
|
Security advisory:
Title: Cleartext Transmission of Sensitive Information in moment-timezone
Module name: moment-timezone
Dependency: moment-timezone
Path: moment-timezone
Severity: moderate
Details: https://github.com/advisories/GHSA-v78c-4p63-2j6c
|
Security advisory:
Title: json-schema is vulnerable to Prototype Pollution
Module name: json-schema
Dependency: node-libcurl
Path: node-libcurl>node-gyp>request>http-signature>jsprim>json-schema
Severity: critical
Details: https://github.com/advisories/GHSA-896r-f27r-55mw
|
Security advisory:
Title: Moment.js vulnerable to Inefficient Regular Expression Complexity
Module name: moment
Dependency: moment
Path: moment
Severity: high
Details: https://github.com/advisories/GHSA-wc69-rhjr-hc9g
|
Security advisory:
Title: Express.js Open Redirect in malformed URLs
Module name: express
Dependency: express
Path: express
Severity: moderate
Details: https://github.com/advisories/GHSA-rv95-896h-c2vc
|
Security advisory:
Title: Vercel ms Inefficient Regular Expression Complexity vulnerability
Module name: ms
Dependency: metalsmith-markdownit
Path: metalsmith-markdownit>debug>ms
Severity: moderate
Details: https://github.com/advisories/GHSA-w9mr-4mfr-499f
|
Security advisory:
Title: debug Inefficient Regular Expression Complexity vulnerability
Module name: debug
Dependency: metalsmith-markdownit
Path: metalsmith-markdownit>debug
Severity: high
Details: https://github.com/advisories/GHSA-9vvw-cc9w-f27h
|
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/setup-node@64ed1c7eab4cce3362f8c340dee64e5eaeef8f7c, actions/cache@88522ab9f39a2ea568f7027eddc7d8d8bc9d59c8, nick-invision/retry@943e742917ac94714d2f408a0e8320f2d1fcafcd. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/
|
The following artifacts were uploaded using a version of actions/upload-artifact that is scheduled for deprecation: "cypress-mochawesome-test-results".
Please update your workflow to use v4 of the artifact actions.
Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
This job succeeded
Loading