A lock file has not been defined to validate the integrity of the software to be used. This can lead to a supply chain attack if the software is compromised, such as by injecting malware.
Override dependencies or component with malicious content.
Set the version numbers in your administrator file and make use of the lock file where the complete software tree used by the project is defined and where it has integrity data defined for each software used.
Anonymous attacker from Internet with write access to the provider releases.
⌚ 15 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
All package.json files are also committed with their respective package-lock.json, yarn.lock or equivalents for other package managers.
A project that uses a package.json file without also including the lock file in version control.