Skip to content

Commit

Permalink
#3704 - Fix dependabot security issues (#3758)
Browse files Browse the repository at this point in the history
The following sub-dependencies have been updated in folder
_/sources/packages/web_
- Bumps `body-parser` from 1.20.2 to 1.20.3 
- Bumps `express` from 4.19.2 to 4.21.0
- Bumps `send` from 0.18.0 to 0.19.0
- Bumps `serve-static` from 1.15.0 to 1.16.2
- Bumps `micromatch` from 4.0.5 to 4.0.8
- Bumps `webpack` to from 5.54.0 to 5.95.0

The following major dependencies/sub-dependencies have been updated in
folder _/sources/packages/backend_
- Updates `@nestjs/core` from 10.3.4 to 10.4.2
- Updates `@nestjs/platform-express` from 10.3.4 to 10.4.2
- Updates `@nestjs/swagger` from 7.3.0 to 7.4.1
- Updates `@nestjs/cli` from 10.3.2 to 10.4.5
- Updates `axios` from 1.6.8 to 1.7.4

The following sub-dependencies have been updated in folder
_/sources/packages/backend_
- Bumps `path-to-regexp` from 0.1.7 to 3.3.0
- Bumps `express` from 4.18.3 to 4.21.0
- Bumps `fast-xml-parser` from 4.3.6 to 4.4.1.

The following major dependencies have been updated in folder
_/testing/src/_
- Bumps `webpack` from 5.76.0 to 5.94.0

As of this PR, all of the backend vulnerabilities have been resolved,
and only one moderate severity package remains unresolved -- `postcss`,
which requires updates from package `@vue/[email protected]` or its
dependency `@vue/[email protected]`

![image](https://github.com/user-attachments/assets/d454be12-6c89-4d29-bda2-bf63e3e78622)


Screenshot of dependency configurations in web via `npm audit`

![image](https://github.com/user-attachments/assets/96a75a3e-e998-44d3-95a0-b0e16a28eb9b)

Screenshot of dependency configurations in backend via `npm audit`

![image](https://github.com/user-attachments/assets/68f41547-3942-489c-8ee8-835495638fcd)
  • Loading branch information
lewischen-aot authored Oct 3, 2024
1 parent 96166f7 commit d1d0ec4
Show file tree
Hide file tree
Showing 6 changed files with 8,820 additions and 8,700 deletions.
Loading

0 comments on commit d1d0ec4

Please sign in to comment.