Skip to content

Bump nuxt from 3.13.2 to 3.17.1 in /docs/website #879

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Bump nuxt from 3.13.2 to 3.17.1 in /docs/website

357f985
Select commit
Loading
Failed to load commit list.
Open

Bump nuxt from 3.13.2 to 3.17.1 in /docs/website #879

Bump nuxt from 3.13.2 to 3.17.1 in /docs/website
357f985
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / Trivy failed Apr 29, 2025 in 2s

4 new alerts including 1 critical severity security vulnerability

New alerts in code changed by this pull request

Security Alerts:

  • 1 critical
  • 1 high
  • 2 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check warning on line 621 in docs/website/package-lock.json

See this annotation in the file changed.

Code scanning / Trivy

Babel is a compiler for writing next generation JavaScript. When using ... Medium documentation

Package: @babel/runtime
Installed Version: 7.23.9
Vulnerability CVE-2025-27789
Severity: MEDIUM
Fixed Version: 7.26.10, 8.0.0-alpha.17
Link: CVE-2025-27789

Check failure on line 1864 in docs/website/package-lock.json

See this annotation in the file changed.

Code scanning / Trivy

Parsed HTML anchor links in Markdown provided to parseMarkdown can result in XSS in @nuxtjs/mdc Critical documentation

Package: @nuxtjs/mdc
Installed Version: 0.3.2
Vulnerability CVE-2025-24981
Severity: CRITICAL
Fixed Version: 0.13.3
Link: CVE-2025-24981

Check warning on line 2120 in docs/website/package-lock.json

See this annotation in the file changed.

Code scanning / Trivy

esbuild enables any website to send any requests to the development server and read the response Medium documentation

Package: esbuild
Installed Version: 0.19.11
Vulnerability GHSA-67mh-4wv8-2f99
Severity: MEDIUM
Fixed Version: 0.25.0
Link: GHSA-67mh-4wv8-2f99

Check failure on line 4533 in docs/website/package-lock.json

See this annotation in the file changed.

Code scanning / Trivy

cross-spawn: regular expression denial of service High documentation

Package: cross-spawn
Installed Version: 7.0.3
Vulnerability CVE-2024-21538
Severity: HIGH
Fixed Version: 7.0.5, 6.0.6
Link: CVE-2024-21538