This repository has been archived by the owner on Apr 8, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
yarn-audit-known-issues
12 lines (12 loc) · 21.8 KB
/
yarn-audit-known-issues
1
2
3
4
5
6
7
8
9
10
11
12
{"type":"auditAdvisory","data":{"resolution":{"id":1002477,"path":"codeceptjs>axios","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"0.21.1","paths":["codeceptjs>axios"]}],"metadata":null,"vulnerable_versions":"<=0.21.1","module_name":"axios","severity":"high","github_advisory_id":"GHSA-cph5-m8f7-6c5x","cves":["CVE-2021-3749"],"access":"public","patched_versions":">=0.21.2","updated":"2021-09-08T16:46:47.000Z","recommendation":"Upgrade to version 0.21.2 or later","cwe":"CWE-697","found_by":null,"deleted":null,"id":1002477,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3749\n- https://github.com/advisories/GHSA-cph5-m8f7-6c5x","created":"2021-10-07T07:31:50.512Z","reported_by":null,"title":"Incorrect Comparison in axios","npm_advisory_id":null,"overview":"axios is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-cph5-m8f7-6c5x"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>inquirer>string-width>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>inquirer>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}
{"type":"auditAdvisory","data":{"resolution":{"id":1002401,"path":"codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex","dev":false,"optional":false,"bundled":false},"advisory":{"findings":[{"version":"5.0.0","paths":["codeceptjs>@codeceptjs/configure>webdriverio>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>@wdio/config>@wdio/logger>strip-ansi>ansi-regex","codeceptjs>@codeceptjs/configure>webdriverio>webdriver>@wdio/config>@wdio/logger>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>inquirer>string-width>strip-ansi>ansi-regex"]},{"version":"4.1.0","paths":["codeceptjs>inquirer>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>string-width>strip-ansi>ansi-regex","codeceptjs>mocha>yargs-unparser>yargs>cliui>wrap-ansi>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha>wide-align>string-width>strip-ansi>ansi-regex"]},{"version":"3.0.0","paths":["codeceptjs>mocha-junit-reporter>strip-ansi>ansi-regex"]}],"metadata":null,"vulnerable_versions":">2.1.1 <5.0.1","module_name":"ansi-regex","severity":"moderate","github_advisory_id":"GHSA-93q8-gq69-wqmw","cves":["CVE-2021-3807"],"access":"public","patched_versions":">=5.0.1","updated":"2021-09-23T15:45:50.000Z","recommendation":"Upgrade to version 5.0.1 or later","cwe":"CWE-918","found_by":null,"deleted":null,"id":1002401,"references":"- https://nvd.nist.gov/vuln/detail/CVE-2021-3807\n- https://github.com/advisories/GHSA-93q8-gq69-wqmw","created":"2021-10-07T07:31:50.502Z","reported_by":null,"title":" Inefficient Regular Expression Complexity in chalk/ansi-regex","npm_advisory_id":null,"overview":"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","url":"https://github.com/advisories/GHSA-93q8-gq69-wqmw"}}}