We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 HMarzban/ep_headerview 一共引入了114个开源组件,存在1个漏洞
漏洞标题:ansi-regex 安全漏洞 缺陷组件:ansi-regex@5.0.0 漏洞编号:CVE-2021-3807 漏洞描述:Ansi-Regex是用于匹配ANSI 转义码的正则表达式。 ansi-regex 存在安全漏洞,该漏洞源于易受低效正则表达式复杂性的影响。 影响范围:(2.1.1, 5.0.1) 最小修复版本:5.0.1 缺陷组件引入路径:ep_headerview@0.12.5->eslint@7.32.0->strip-ansi@6.0.0->ansi-regex@5.0.0 ep_headerview@0.12.5->eslint@7.32.0->table@6.7.1->string-width@4.2.2->strip-ansi@6.0.0->ansi-regex@5.0.0 ep_headerview@0.12.5->eslint@7.32.0->table@6.7.1->strip-ansi@6.0.0->ansi-regex@5.0.0
另外还有几个漏洞,详细报告:https://mofeisec.com/jr?p=ic542c
The text was updated successfully, but these errors were encountered:
No branches or pull requests
检测到 HMarzban/ep_headerview 一共引入了114个开源组件,存在1个漏洞
另外还有几个漏洞,详细报告:https://mofeisec.com/jr?p=ic542c
The text was updated successfully, but these errors were encountered: