# npm audit report
xlsx *
Severity: high
Denial of Service in SheetJS Pro - https://github.com/advisories/GHSA-g973-978j-2c3p
Denial of Service in SheetJS Pro - https://github.com/advisories/GHSA-3x9f-74h4-2fqr
Denial of Service in SheetsJS Pro - https://github.com/advisories/GHSA-8vcr-vxm8-293m
Prototype Pollution in sheetJS - https://github.com/advisories/GHSA-4r6h-8v6p-xvw6
SheetJS Regular Expression Denial of Service (ReDoS) - https://github.com/advisories/GHSA-5pgg-2g8v-p4x9
No fix available
node_modules/convert-excel-to-json/node_modules/xlsx
node_modules/xlsx
convert-excel-to-json *
Depends on vulnerable versions of magicli
Depends on vulnerable versions of xlsx
node_modules/convert-excel-to-json
yargs-parser 6.0.0 - 13.1.1
Severity: moderate
yargs-parser Vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-p9pc-299p-vxgp
No fix available
node_modules/convert-excel-to-json/node_modules/yargs-parser
node_modules/inspect-function/node_modules/yargs-parser
node_modules/inspect-parameters-declaration/node_modules/yargs-parser
node_modules/inspect-property/node_modules/yargs-parser
node_modules/magicli/node_modules/yargs-parser
node_modules/object-to-arguments/node_modules/yargs-parser
cliss *
Depends on vulnerable versions of inspect-parameters-declaration
Depends on vulnerable versions of object-to-arguments
Depends on vulnerable versions of yargs-parser
node_modules/cliss
node_modules/convert-excel-to-json/node_modules/cliss
node_modules/inspect-function/node_modules/cliss
node_modules/inspect-parameters-declaration/node_modules/cliss
node_modules/inspect-property/node_modules/cliss
node_modules/magicli/node_modules/cliss
node_modules/object-to-arguments/node_modules/cliss
magicli >=0.0.6
Depends on vulnerable versions of cliss
Depends on vulnerable versions of inspect-property
node_modules/convert-excel-to-json/node_modules/magicli
node_modules/inspect-function/node_modules/magicli
node_modules/inspect-parameters-declaration/node_modules/magicli
node_modules/inspect-property/node_modules/magicli
node_modules/magicli
node_modules/object-to-arguments/node_modules/stringify-parameters/node_modules/magicli
inspect-function >=0.3.3
Depends on vulnerable versions of magicli
Depends on vulnerable versions of stringify-parameters
node_modules/inspect-function
node_modules/inspect-property/node_modules/inspect-function
inspect-property >=0.0.7
Depends on vulnerable versions of inspect-function
node_modules/magicli/node_modules/inspect-property
inspect-parameters-declaration >=0.0.11
Depends on vulnerable versions of magicli
Depends on vulnerable versions of stringify-parameters
node_modules/inspect-parameters-declaration
stringify-parameters >=0.0.5
Depends on vulnerable versions of magicli
node_modules/inspect-function/node_modules/stringify-parameters
node_modules/inspect-parameters-declaration/node_modules/stringify-parameters
node_modules/object-to-arguments/node_modules/stringify-parameters
object-to-arguments >=0.1.0
Depends on vulnerable versions of inspect-parameters-declaration
Depends on vulnerable versions of stringify-parameters
node_modules/object-to-arguments
10 vulnerabilities (8 moderate, 2 high)
xlsx * Severity: high Denial of Service in SheetJS Pro - https://github.com/advisories/GHSA-g973-978j-2c3p Denial of Service in SheetJS Pro - https://github.com/advisories/GHSA-3x9f-74h4-2fqr Denial of Service in SheetsJS Pro - https://github.com/advisories/GHSA-8vcr-vxm8-293m Prototype Pollution in sheetJS - https://github.com/advisories/GHSA-4r6h-8v6p-xvw6 SheetJS Regular Expression Denial of Service (ReDoS) - https://github.com/advisories/GHSA-5pgg-2g8v-p4x9 No fix available node_modules/convert-excel-to-json/node_modules/xlsx node_modules/xlsx convert-excel-to-json * Depends on vulnerable versions of magicli Depends on vulnerable versions of xlsx node_modules/convert-excel-to-json
yargs-parser 6.0.0 - 13.1.1 Severity: moderate yargs-parser Vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-p9pc-299p-vxgp No fix available node_modules/convert-excel-to-json/node_modules/yargs-parser node_modules/inspect-function/node_modules/yargs-parser node_modules/inspect-parameters-declaration/node_modules/yargs-parser node_modules/inspect-property/node_modules/yargs-parser node_modules/magicli/node_modules/yargs-parser node_modules/object-to-arguments/node_modules/yargs-parser cliss * Depends on vulnerable versions of inspect-parameters-declaration Depends on vulnerable versions of object-to-arguments Depends on vulnerable versions of yargs-parser node_modules/cliss node_modules/convert-excel-to-json/node_modules/cliss node_modules/inspect-function/node_modules/cliss node_modules/inspect-parameters-declaration/node_modules/cliss node_modules/inspect-property/node_modules/cliss node_modules/magicli/node_modules/cliss node_modules/object-to-arguments/node_modules/cliss magicli >=0.0.6 Depends on vulnerable versions of cliss Depends on vulnerable versions of inspect-property node_modules/convert-excel-to-json/node_modules/magicli node_modules/inspect-function/node_modules/magicli node_modules/inspect-parameters-declaration/node_modules/magicli node_modules/inspect-property/node_modules/magicli node_modules/magicli node_modules/object-to-arguments/node_modules/stringify-parameters/node_modules/magicli inspect-function >=0.3.3 Depends on vulnerable versions of magicli Depends on vulnerable versions of stringify-parameters node_modules/inspect-function node_modules/inspect-property/node_modules/inspect-function inspect-property >=0.0.7 Depends on vulnerable versions of inspect-function node_modules/magicli/node_modules/inspect-property inspect-parameters-declaration >=0.0.11 Depends on vulnerable versions of magicli Depends on vulnerable versions of stringify-parameters node_modules/inspect-parameters-declaration stringify-parameters >=0.0.5 Depends on vulnerable versions of magicli node_modules/inspect-function/node_modules/stringify-parameters node_modules/inspect-parameters-declaration/node_modules/stringify-parameters node_modules/object-to-arguments/node_modules/stringify-parameters object-to-arguments >=0.1.0 Depends on vulnerable versions of inspect-parameters-declaration Depends on vulnerable versions of stringify-parameters node_modules/object-to-arguments
10 vulnerabilities (8 moderate, 2 high) [/code] Я хочу, чтобы кто -то помог решить эти проблемы