# npm audit report
xlsx *
Severity: high
Denial of Service in SheetJS Pro - https://github.com/advisories/GHSA-g973-978j-2c3p
Denial of Service in SheetJS Pro - https://github.com/advisories/GHSA-3x9f-74h4-2fqr
Denial of Service in SheetsJS Pro - https://github.com/advisories/GHSA-8vcr-vxm8-293m
Prototype Pollution in sheetJS - https://github.com/advisories/GHSA-4r6h-8v6p-xvw6
SheetJS Regular Expression Denial of Service (ReDoS) - https://github.com/advisories/GHSA-5pgg-2g8v-p4x9
No fix available
node_modules/convert-excel-to-json/node_modules/xlsx
node_modules/xlsx
convert-excel-to-json *
Depends on vulnerable versions of magicli
Depends on vulnerable versions of xlsx
node_modules/convert-excel-to-json
yargs-parser 6.0.0 - 13.1.1
Severity: moderate
yargs-parser Vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-p9pc-299p-vxgp
No fix available
node_modules/convert-excel-to-json/node_modules/yargs-parser
node_modules/inspect-function/node_modules/yargs-parser
node_modules/inspect-parameters-declaration/node_modules/yargs-parser
node_modules/inspect-property/node_modules/yargs-parser
node_modules/magicli/node_modules/yargs-parser
node_modules/object-to-arguments/node_modules/yargs-parser
cliss *
Depends on vulnerable versions of inspect-parameters-declaration
Depends on vulnerable versions of object-to-arguments
Depends on vulnerable versions of yargs-parser
node_modules/cliss
node_modules/convert-excel-to-json/node_modules/cliss
node_modules/inspect-function/node_modules/cliss
node_modules/inspect-parameters-declaration/node_modules/cliss
node_modules/inspect-property/node_modules/cliss
node_modules/magicli/node_modules/cliss
node_modules/object-to-arguments/node_modules/cliss
magicli >=0.0.6
Depends on vulnerable versions of cliss
Depends on vulnerable versions of inspect-property
node_modules/convert-excel-to-json/node_modules/magicli
node_modules/inspect-function/node_modules/magicli
node_modules/inspect-parameters-declaration/node_modules/magicli
node_modules/inspect-property/node_modules/magicli
node_modules/magicli
node_modules/object-to-arguments/node_modules/stringify-parameters/node_modules/magicli
inspect-function >=0.3.3
Depends on vulnerable versions of magicli
Depends on vulnerable versions of stringify-parameters
node_modules/inspect-function
node_modules/inspect-property/node_modules/inspect-function
inspect-property >=0.0.7
Depends on vulnerable versions of inspect-function
node_modules/magicli/node_modules/inspect-property
inspect-parameters-declaration >=0.0.11
Depends on vulnerable versions of magicli
Depends on vulnerable versions of stringify-parameters
node_modules/inspect-parameters-declaration
stringify-parameters >=0.0.5
Depends on vulnerable versions of magicli
node_modules/inspect-function/node_modules/stringify-parameters
node_modules/inspect-parameters-declaration/node_modules/stringify-parameters
node_modules/object-to-arguments/node_modules/stringify-parameters
object-to-arguments >=0.1.0
Depends on vulnerable versions of inspect-parameters-declaration
Depends on vulnerable versions of stringify-parameters
node_modules/object-to-arguments
10 vulnerabilities (8 moderate, 2 high)
xlsx * Severity: high Denial of Service in SheetJS Pro - https://github.com/advisories/GHSA-g973-978j-2c3p Denial of Service in SheetJS Pro - https://github.com/advisories/GHSA-3x9f-74h4-2fqr Denial of Service in SheetsJS Pro - https://github.com/advisories/GHSA-8vcr-vxm8-293m Prototype Pollution in sheetJS - https://github.com/advisories/GHSA-4r6h-8v6p-xvw6 SheetJS Regular Expression Denial of Service (ReDoS) - https://github.com/advisories/GHSA-5pgg-2g8v-p4x9 No fix available node_modules/convert-excel-to-json/node_modules/xlsx node_modules/xlsx convert-excel-to-json * Depends on vulnerable versions of magicli Depends on vulnerable versions of xlsx node_modules/convert-excel-to-json
yargs-parser 6.0.0 - 13.1.1 Severity: moderate yargs-parser Vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-p9pc-299p-vxgp No fix available node_modules/convert-excel-to-json/node_modules/yargs-parser node_modules/inspect-function/node_modules/yargs-parser node_modules/inspect-parameters-declaration/node_modules/yargs-parser node_modules/inspect-property/node_modules/yargs-parser node_modules/magicli/node_modules/yargs-parser node_modules/object-to-arguments/node_modules/yargs-parser cliss * Depends on vulnerable versions of inspect-parameters-declaration Depends on vulnerable versions of object-to-arguments Depends on vulnerable versions of yargs-parser node_modules/cliss node_modules/convert-excel-to-json/node_modules/cliss node_modules/inspect-function/node_modules/cliss node_modules/inspect-parameters-declaration/node_modules/cliss node_modules/inspect-property/node_modules/cliss node_modules/magicli/node_modules/cliss node_modules/object-to-arguments/node_modules/cliss magicli >=0.0.6 Depends on vulnerable versions of cliss Depends on vulnerable versions of inspect-property node_modules/convert-excel-to-json/node_modules/magicli node_modules/inspect-function/node_modules/magicli node_modules/inspect-parameters-declaration/node_modules/magicli node_modules/inspect-property/node_modules/magicli node_modules/magicli node_modules/object-to-arguments/node_modules/stringify-parameters/node_modules/magicli inspect-function >=0.3.3 Depends on vulnerable versions of magicli Depends on vulnerable versions of stringify-parameters node_modules/inspect-function node_modules/inspect-property/node_modules/inspect-function inspect-property >=0.0.7 Depends on vulnerable versions of inspect-function node_modules/magicli/node_modules/inspect-property inspect-parameters-declaration >=0.0.11 Depends on vulnerable versions of magicli Depends on vulnerable versions of stringify-parameters node_modules/inspect-parameters-declaration stringify-parameters >=0.0.5 Depends on vulnerable versions of magicli node_modules/inspect-function/node_modules/stringify-parameters node_modules/inspect-parameters-declaration/node_modules/stringify-parameters node_modules/object-to-arguments/node_modules/stringify-parameters object-to-arguments >=0.1.0 Depends on vulnerable versions of inspect-parameters-declaration Depends on vulnerable versions of stringify-parameters node_modules/object-to-arguments
10 vulnerabilities (8 moderate, 2 high) [/code] Я хочу, чтобы кто -то помог решить эти проблемы
bash +x spark-submit C:\Users\vasee\OneDrive\Desktop\vaseem.py /mnt/c/Spark/spark-3.5.0-bin-hadoop3/bin/spark-submit: строка 21: ./find-spark-home: такого файла или каталога нет /mnt/c/Spark/spark-3.5.0-bin-hadoop3/bin/spark-submit: строка 27:...
bash +x spark-submit C:\Users\vasee\OneDrive\Desktop\vaseem.py /mnt/c/Spark/spark-3.5.0-bin-hadoop3/bin/spark-submit: строка 21: ./find-spark-home: такого файла или каталога нет /mnt/c/Spark/spark-3.5.0-bin-hadoop3/bin/spark-submit: строка 27:...
Я учусь на пятом семестре. Я изучал основы программирования, ООП, структуры данных и алгоритмы, операционную систему, базу данных (SQL). Я создал несколько проектов, но хочу получить отраслевой опыт, например работу над проектами, и по этой причине...
Я знаю == сравнивает ссылки на Java, но почему первое сравнение работает, а второе - нет, даже если строки идентичны?
public class Main {
public static void main(String[] args) {
System.out.println( Hello == Hello ); // true
System.out.println(new...