Skip to content

build(deps-dev): bump h3 from 1.6.4 to 1.15.5

369ebeb
Select commit
Loading
Failed to load commit list.
Open

build(deps-dev): bump h3 from 1.6.4 to 1.15.5 #108

build(deps-dev): bump h3 from 1.6.4 to 1.15.5
369ebeb
Select commit
Loading
Failed to load commit list.
codefactor.io / CodeFactor failed Jan 15, 2026 in 2s

7 issues found.

Annotations

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable cross-spawn (CVE-2024-21538) [update to 7.0.5, 6.0.6] (trivy-CVE-2024-21538-cross-spawn)

Check failure on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable form-data (CVE-2025-7783) [update to 2.5.4, 3.0.4, 4.0.4] (trivy-CVE-2025-7783-form-data)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable axios (CVE-2024-39338) [update to 1.7.4] (trivy-CVE-2024-39338-axios)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable vue-i18n (CVE-2025-27597) [update to 9.14.3, 10.0.6, 11.1.2] (trivy-CVE-2025-27597-vue-i18n)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable axios (CVE-2025-58754) [update to 1.12.0, 0.30.2] (trivy-CVE-2025-58754-axios)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable axios (CVE-2025-27152) [update to 1.8.2, 0.30.0] (trivy-CVE-2025-27152-axios)

Check warning on line 0 in package-lock.json

See this annotation in the file changed.

@codefactor-io codefactor-io / CodeFactor

package-lock.json#L0

Use of vulnerable path-to-regexp (CVE-2024-45296) [update to 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0] (trivy-CVE-2024-45296-path-to-regexp)