Closed KostLinux closed 3 months ago
Interesting, can you ensure that the vulnerabilities found (especially those with a high and critical level of severity) can be exploited, or are you just throwing this source code into the scanner and not understanding the results displayed?
Have checked each, and none of those are exploitable. Am using Snyk (similar to Dependabot)
The application has 15 critical and 4 high vulnerabilities:
Consider using dependabot.