Audit reports contain tables of information about security vulnerabilities in your project's dependencies to help you fix the vulnerability or troubleshoot further.
Vulnerability table fields SeverityThe severity of the vulnerability, determined by the impact and exploitability of the vulnerability in its most common use case.
Severity Recommended action Critical Address immediately High Address as quickly as possible Moderate Address as time allows Low Address at your discretion DescriptionThe description of the vulnerability. For example, "Denial of service".
PackageThe name of the package that contains the vulnerability.
Patched inThe semantic version range that describes which versions contain a fix for the vulnerability.
Dependency ofThe module that the package with the vulnerability depends on.
PathThe path to the code that contains the vulnerability.
More infoA link to the security report.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4