Skip to content
  • Home
  • Aktuell
  • Tags
  • 0 Ungelesen 0
  • Kategorien
  • Unreplied
  • Beliebt
  • GitHub
  • Docu
  • Hilfe
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Standard: (Kein Skin)
  • Kein Skin
Einklappen
ioBroker Logo

Community Forum

  1. ioBroker Community Home
  2. Deutsch
  3. ioBroker Allgemein
  4. Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]

NEWS

  • UPDATE 31.10.: Amazon Alexa - ioBroker Skill läuft aus ?
    apollon77A
    apollon77
    48
    3
    8.2k

  • Monatsrückblick – September 2025
    BluefoxB
    Bluefox
    13
    1
    1.9k

  • Neues Video "KI im Smart Home" - ioBroker plus n8n
    BluefoxB
    Bluefox
    15
    1
    2.3k

Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]

Geplant Angeheftet Gesperrt Verschoben ioBroker Allgemein
29 Beiträge 8 Kommentatoren 5.3k Aufrufe 9 Watching
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • apollon77A Offline
    apollon77A Offline
    apollon77
    schrieb am zuletzt editiert von apollon77
    #1

    Hi All,

    gestern gab es leider einen kurzen Zeitraum von ca. 30 Minuten, wo eine Fehlerhafte Version einer Library online war. Wer in dem zeitraum (und ggf etwas danach) Adapter aktualisiert hat, hat sich diese Verison gegebenenfalls eingefangen.

    Das Problem zeigt sich beim Adapterstart das dieser oder einige Adapter dann nicht geht mit einem Fehler wie

    Caught by controller[0]: TypeError [ERR_INVALID_ARG_VALUE]: The argument 'filename' must be a file URL object, file URL string, or absolute path string. Received 'file:// /opt/iobroker/node_modules/iobroker.telegram/node_modules/@iobroker/adapter-core/build/cjs/helpers.js'

    Grund ist die Version 3.1.2 des Paketes adapter-core.

    Ist mein Fehler darauf zurückzuführen?

    • Öffnet eine SSH-Shell auf den Rechner
    • cd /opt/iobroker
    • npm list @iobroker/adapter-core

    In der Liste nach adapter-core in Version 3.1.2 suchen

    Diese kann entweder nur unter einem Adapter auftauchen oder auf der obersten Ebene des ausgegebenen Baums.

    Lösung wenn es nur bei einem /einzelnen Adaptern im Baum ist

    (Im folgenden ist "ADAPTERNAME" durch den Adapter zu ersetzen bei dem das Paket falsch war!)

    • cd /opt/iobroker/node_modules/iobroker.ADAPTERNAME/
    • npm i @iobroker/adapter-core@3.1.4

    Kontrolle ggf mit dem npm list wie oben und dann sollte es wieder gehen

    Lösung wenn es einmal auf der obersten Ebene ist

    In dem Fall sollte es die 3.1.2 nur einmal geben und alle anderen Einträge mit der Version sollten ein "(deduped)" in Klammern dahinter haben. Einen solchen Adapter merken oder einfach einen wo es beim Start fehlgeschlagen ist und seine Adaterverison die Ihr installiert habt und unten dann ADAPTERNME und VERSION ersetzen!

    • ioBroker stoppen
    • rm -rf /opt/iobroker/node_modules/@iobroker/adapter-core
    • cd /opt/iobroker
    • npm iobroker.ADAPTERNAME@VERSION

    Dann sollte es wieder gehen. Falls nicht bitte hier melden und wir versuchen es gemeinsam zu fixen

    Ingo

    Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

    • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
    • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
    1 Antwort Letzte Antwort
    7
    • nukleuzN Offline
      nukleuzN Offline
      nukleuz
      schrieb am zuletzt editiert von nukleuz
      #2

      Hi Ingo,

      ich habe genau den Timeslot erwischt beim Update des iobroker.zigbee2mqtt Adapters.

      Die Vorgehensweise zur Lösung eines einzelnen Adapters hat bei mir geholfen.

      Erwähnenswert ist, dass der Befehl npm list @iobroker/adapter-core „empty“ anzeigte.

      Danke für den Fix!!!!

      Grüße, Jan

      Intel NUC -> ProxMox -> Debian -> ioBroker (Master)| RPI3B+ -> rtl_433 (Slave) | CCU2

      HomoranH 1 Antwort Letzte Antwort
      1
      • nukleuzN nukleuz

        Hi Ingo,

        ich habe genau den Timeslot erwischt beim Update des iobroker.zigbee2mqtt Adapters.

        Die Vorgehensweise zur Lösung eines einzelnen Adapters hat bei mir geholfen.

        Erwähnenswert ist, dass der Befehl npm list @iobroker/adapter-core „empty“ anzeigte.

        Danke für den Fix!!!!

        Grüße, Jan

        HomoranH Nicht stören
        HomoranH Nicht stören
        Homoran
        Global Moderator Administrators
        schrieb am zuletzt editiert von
        #3

        @nukleuz sagte in Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]:

        dass der Befehl npm list @iobroker/adapter-core „empty“ anzeigte.

        warst du im richtigen Verzeichnis?

        kein Support per PN! - Fragen im Forum stellen - es gibt fast nichts, was nicht auch für andere interessant ist.

        Benutzt das Voting rechts unten im Beitrag wenn er euch geholfen hat.

        der Installationsfixer: curl -fsL https://iobroker.net/fix.sh | bash -

        nukleuzN 1 Antwort Letzte Antwort
        0
        • HomoranH Homoran

          @nukleuz sagte in Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]:

          dass der Befehl npm list @iobroker/adapter-core „empty“ anzeigte.

          warst du im richtigen Verzeichnis?

          nukleuzN Offline
          nukleuzN Offline
          nukleuz
          schrieb am zuletzt editiert von nukleuz
          #4

          @homoran

          Ja, ich habe die zwei Konsolenbefehle kopiert…

          Hier nochmal der Link zu meinem Beitrag

          Intel NUC -> ProxMox -> Debian -> ioBroker (Master)| RPI3B+ -> rtl_433 (Slave) | CCU2

          HomoranH 1 Antwort Letzte Antwort
          0
          • nukleuzN nukleuz

            @homoran

            Ja, ich habe die zwei Konsolenbefehle kopiert…

            Hier nochmal der Link zu meinem Beitrag

            HomoranH Nicht stören
            HomoranH Nicht stören
            Homoran
            Global Moderator Administrators
            schrieb am zuletzt editiert von
            #5

            @nukleuz Dann hab ich noch einen :grin:

            in einer früheren Version des Startposts stand ein unvollständiger Befehl, da kam tatsächlich nur eine leere Liste

            kein Support per PN! - Fragen im Forum stellen - es gibt fast nichts, was nicht auch für andere interessant ist.

            Benutzt das Voting rechts unten im Beitrag wenn er euch geholfen hat.

            der Installationsfixer: curl -fsL https://iobroker.net/fix.sh | bash -

            M 1 Antwort Letzte Antwort
            1
            • HomoranH Homoran

              @nukleuz Dann hab ich noch einen :grin:

              in einer früheren Version des Startposts stand ein unvollständiger Befehl, da kam tatsächlich nur eine leere Liste

              M Offline
              M Offline
              muckel
              schrieb am zuletzt editiert von
              #6

              @apollon77

              Ich habe in meinem Thread gelesen, dass es durch meinen Fehler doch zu Problemen kommen kann.
              Siehe:
              https://forum.iobroker.net/topic/74232/gelöst-nach-update-des-admin-adapters-kein-webzugriff-mehr/20
              Gibt es da einen Workaround?

              mcm1957M 1 Antwort Letzte Antwort
              0
              • M muckel

                @apollon77

                Ich habe in meinem Thread gelesen, dass es durch meinen Fehler doch zu Problemen kommen kann.
                Siehe:
                https://forum.iobroker.net/topic/74232/gelöst-nach-update-des-admin-adapters-kein-webzugriff-mehr/20
                Gibt es da einen Workaround?

                mcm1957M Online
                mcm1957M Online
                mcm1957
                schrieb am zuletzt editiert von
                #7

                @muckel said in Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]:

                @apollon77

                Ich habe in meinem Thread gelesen, dass es durch meinen Fehler doch zu Problemen kommen kann.
                Siehe:
                https://forum.iobroker.net/topic/74232/gelöst-nach-update-des-admin-adapters-kein-webzugriff-mehr/20
                Gibt es da einen Workaround?

                @apollon77
                Geht drum dass muckel ein npm i @iobroker/adapter-core auf der obersten Ebene gestartet hat. Damit läuft admin zwar, aber ein explizites Install ist ja nicht "gut". Kannst du sagen ob bzw. wie das zu fixen wäre?
                https://forum.iobroker.net/topic/74232/gelöst-nach-update-des-admin-adapters-kein-webzugriff-mehr/11

                Entwicklung u Betreuung: envertech-pv, hoymiles-ms, ns-client, pid, snmp Adapter;
                Support Repositoryverwaltung.

                Wer Danke sagen will, kann nen Kaffee spendieren: https://paypal.me/mcm1957atiobroker

                LESEN - gute Forenbeitrage

                M apollon77A 2 Antworten Letzte Antwort
                0
                • mcm1957M mcm1957

                  @muckel said in Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]:

                  @apollon77

                  Ich habe in meinem Thread gelesen, dass es durch meinen Fehler doch zu Problemen kommen kann.
                  Siehe:
                  https://forum.iobroker.net/topic/74232/gelöst-nach-update-des-admin-adapters-kein-webzugriff-mehr/20
                  Gibt es da einen Workaround?

                  @apollon77
                  Geht drum dass muckel ein npm i @iobroker/adapter-core auf der obersten Ebene gestartet hat. Damit läuft admin zwar, aber ein explizites Install ist ja nicht "gut". Kannst du sagen ob bzw. wie das zu fixen wäre?
                  https://forum.iobroker.net/topic/74232/gelöst-nach-update-des-admin-adapters-kein-webzugriff-mehr/11

                  M Offline
                  M Offline
                  muckel
                  schrieb am zuletzt editiert von
                  #8

                  @mcm57 @apollon77
                  Heute im log entdeckt:

                  Nach npm audit kam folgender Vorschlag:
                  To address issues that do not require attention, run:
                  npm audit fix

                  To address all issues possible (including breaking changes), run:
                  npm audit fix --force

                  Some issues need review, and may require choosing
                  a different dependency.
                  Was soll ich tun?

                  2024-04-21 04:15:05.778 - error: javascript.0 (1981571) npm
                  2024-04-21 04:15:05.779 - error: javascript.0 (1981571) WARN deprecated har-validator@5.1.5: this library is no longer supported
                  2024-04-21 04:15:05.813 - error: javascript.0 (1981571) npm
                  2024-04-21 04:15:05.813 - error: javascript.0 (1981571) WARN deprecated node-inspect@2.0.0: This module is part of Node.js core and does not need to be installed separately. It is now unmaintained.
                  2024-04-21 04:15:05.842 - error: javascript.0 (1981571) npm
                  2024-04-21 04:15:05.843 - error: javascript.0 (1981571) WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.
                  2024-04-21 04:15:05.861 - error: javascript.0 (1981571) npm
                  2024-04-21 04:15:05.861 - error: javascript.0 (1981571) WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142
                  2024-04-21 04:15:07.405 - info: javascript.0 (1981571)
                  added 98 packages, and audited 103 packages in 4s
                  2024-04-21 04:15:07.406 - info: javascript.0 (1981571)
                  4 packages are looking for funding
                  run `npm fund` for details
                  2024-04-21 04:15:07.409 - info: javascript.0 (1981571)
                  2 moderate severity vulnerabilities
                  Some issues need review, and may require choosing
                  a different dependency.
                  Run `npm audit` for details.
                  
                  erich@smarthome:~$ cd /opt/iobroker
                  erich@smarthome:/opt/iobroker$ npm audit
                  [sudo] password for erich:
                  # npm audit report
                  
                  @octokit/webhooks  10.0.0 - 10.9.1
                  Severity: high
                  Unauthenticated Denial of Service in the octokit/webhooks library - https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
                  fix available via `npm audit fix`
                  node_modules/@octokit/webhooks
                  
                  ajv  <6.12.3
                  Severity: moderate
                  Prototype Pollution in Ajv - https://github.com/advisories/GHSA-v88g-cgmw-v5xw
                  fix available via `npm audit fix --force`
                  Will install iobroker.samsung@0.2.9, which is a breaking change
                  node_modules/node-blink-security/node_modules/ajv
                    har-validator  3.3.0 - 5.1.0
                    Depends on vulnerable versions of ajv
                    node_modules/node-blink-security/node_modules/har-validator
                      request  *
                      Depends on vulnerable versions of har-validator
                      Depends on vulnerable versions of hawk
                      Depends on vulnerable versions of tough-cookie
                      node_modules/machinepack-http/node_modules/request
                      node_modules/node-blink-security/node_modules/request
                      node_modules/request
                        dropbox-v2-api  *
                        Depends on vulnerable versions of request
                        node_modules/dropbox-v2-api
                          iobroker.backitup  >=0.3.0
                          Depends on vulnerable versions of dropbox-v2-api
                          node_modules/iobroker.backitup
                        harmonyhubws  *
                        Depends on vulnerable versions of request
                        Depends on vulnerable versions of request-promise-native
                        node_modules/harmonyhubws
                          iobroker.harmony  >=1.1.1
                          Depends on vulnerable versions of harmonyhubws
                          node_modules/iobroker.harmony
                        iobroker.deconz  >=0.2.0
                        Depends on vulnerable versions of request
                        node_modules/iobroker.deconz
                        iobroker.hue-extended  *
                        Depends on vulnerable versions of request
                        Depends on vulnerable versions of request-promise
                        node_modules/iobroker.hue-extended
                        iobroker.javascript  *
                        Depends on vulnerable versions of request
                        node_modules/iobroker.javascript
                        iobroker.mihome-vacuum  >=2.0.7
                        Depends on vulnerable versions of request
                        node_modules/iobroker.mihome-vacuum
                        iobroker.netatmo  0.5.0 - 0.5.1 || >=1.1.7
                        Depends on vulnerable versions of request
                        node_modules/iobroker.netatmo
                        iobroker.netatmo-crawler  *
                        Depends on vulnerable versions of request
                        node_modules/iobroker.netatmo-crawler
                        iobroker.nuki-extended  *
                        Depends on vulnerable versions of nuki-web-api
                        Depends on vulnerable versions of request
                        Depends on vulnerable versions of request-promise
                        node_modules/iobroker.nuki-extended
                        iobroker.rflink  >=1.0.3
                        Depends on vulnerable versions of avrgirl-arduino
                        Depends on vulnerable versions of request
                        node_modules/iobroker.rflink
                        iobroker.smartgarden  >=0.5.1
                        Depends on vulnerable versions of request
                        node_modules/iobroker.smartgarden
                        iobroker.whatsapp-cmb  *
                        Depends on vulnerable versions of request
                        node_modules/iobroker.whatsapp-cmb
                        le-acme-core  *
                        Depends on vulnerable versions of request
                        Depends on vulnerable versions of rsa-compat
                        node_modules/le-acme-core
                          iobroker.js-controller  >=1.5.4
                          Depends on vulnerable versions of @iobroker/db-objects-file
                          Depends on vulnerable versions of @iobroker/db-objects-jsonl
                          Depends on vulnerable versions of @iobroker/db-objects-redis
                          Depends on vulnerable versions of @iobroker/db-states-file
                          Depends on vulnerable versions of @iobroker/db-states-jsonl
                          Depends on vulnerable versions of @iobroker/db-states-redis
                          Depends on vulnerable versions of @iobroker/js-controller-adapter
                          Depends on vulnerable versions of @iobroker/js-controller-cli
                          Depends on vulnerable versions of @iobroker/js-controller-common
                          Depends on vulnerable versions of @iobroker/js-controller-common-db
                          Depends on vulnerable versions of le-acme-core
                          node_modules/iobroker.js-controller
                        machinepack-http  0.2.3 - 8.0.0
                        Depends on vulnerable versions of request
                        node_modules/machinepack-http
                          bagpipes  *
                          Depends on vulnerable versions of machinepack-http
                          node_modules/bagpipes
                        node-blink-security  *
                        Depends on vulnerable versions of request
                        node_modules/node-blink-security
                          iobroker.blink4home  *
                          Depends on vulnerable versions of node-blink-security
                          node_modules/iobroker.blink4home
                        node-gyp  <=7.1.2
                        Depends on vulnerable versions of request
                        node_modules/usocket/node_modules/node-gyp
                          usocket  0.2.2 - 0.3.0
                          Depends on vulnerable versions of node-gyp
                          node_modules/usocket
                            dbus-next  *
                            Depends on vulnerable versions of usocket
                            Depends on vulnerable versions of xml2js
                            node_modules/dbus-next
                              node-ble  >=0.0.2
                              Depends on vulnerable versions of dbus-next
                              node_modules/node-ble
                                iobroker.radar2  >=2.0.0
                                Depends on vulnerable versions of node-ble
                                node_modules/iobroker.radar2
                        nuki-web-api  *
                        Depends on vulnerable versions of request
                        Depends on vulnerable versions of request-promise
                        node_modules/nuki-web-api
                        request-promise  >=0.0.2
                        Depends on vulnerable versions of request
                        Depends on vulnerable versions of request-promise-core
                        Depends on vulnerable versions of tough-cookie
                        node_modules/request-promise
                          samsungtv
                          Depends on vulnerable versions of request
                          Depends on vulnerable versions of request-promise
                          node_modules/samsungtv
                            iobroker.samsung  >=0.5.1
                            Depends on vulnerable versions of samsungtv
                            node_modules/iobroker.samsung
                        request-promise-core  *
                        Depends on vulnerable versions of request
                        node_modules/@cypress/request-promise/node_modules/request-promise-core
                        node_modules/request-promise-core
                          @cypress/request-promise  *
                          Depends on vulnerable versions of request-promise-core
                          node_modules/@cypress/request-promise
                            node-telegram-bot-api  >=0.64.0
                            Depends on vulnerable versions of @cypress/request-promise
                            node_modules/node-telegram-bot-api
                              iobroker.telegram  >=2.1.0
                              Depends on vulnerable versions of node-telegram-bot-api
                              node_modules/iobroker.telegram
                          request-promise-native  >=1.0.0
                          Depends on vulnerable versions of request
                          Depends on vulnerable versions of request-promise-core
                          Depends on vulnerable versions of tough-cookie
                          node_modules/request-promise-native
                        smartmeter-obis  *
                        Depends on vulnerable versions of request
                        node_modules/smartmeter-obis
                          iobroker.smartmeter  *
                          Depends on vulnerable versions of smartmeter-obis
                          node_modules/iobroker.smartmeter
                        syno  *
                        Depends on vulnerable versions of nconf
                        Depends on vulnerable versions of request
                        node_modules/syno
                          iobroker.synology  *
                          Depends on vulnerable versions of syno
                          node_modules/iobroker.synology
                  
                  axios  <=0.27.2 || 1.0.0 - 1.5.1
                  Severity: high
                  Axios vulnerable to Server-Side Request Forgery - https://github.com/advisories/GHSA-4w2v-q235-vp99
                  axios Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-cph5-m8f7-6c5x
                  Axios Cross-Site Request Forgery Vulnerability - https://github.com/advisories/GHSA-wf5p-g6vw-rhxx
                  Axios Cross-Site Request Forgery Vulnerability - https://github.com/advisories/GHSA-wf5p-g6vw-rhxx
                  Depends on vulnerable versions of follow-redirects
                  fix available via `npm audit fix --force`
                  Will install iobroker.hue@0.6.0, which is a breaking change
                  node_modules/@alcalzone/pak/node_modules/axios
                  node_modules/iobroker.awattar/node_modules/axios
                  node_modules/iobroker.broadlink2/node_modules/axios
                  node_modules/iobroker.withings/node_modules/axios
                  node_modules/node-hue-api/node_modules/axios
                  node_modules/node-ical/node_modules/axios
                    @alcalzone/pak  0.3.0 - 0.10.0
                    Depends on vulnerable versions of axios
                    node_modules/@alcalzone/pak
                      @iobroker/js-controller-adapter  *
                      Depends on vulnerable versions of @alcalzone/pak
                      Depends on vulnerable versions of @iobroker/db-objects-file
                      Depends on vulnerable versions of @iobroker/db-objects-jsonl
                      Depends on vulnerable versions of @iobroker/db-objects-redis
                      Depends on vulnerable versions of @iobroker/db-states-file
                      Depends on vulnerable versions of @iobroker/db-states-jsonl
                      Depends on vulnerable versions of @iobroker/db-states-redis
                      Depends on vulnerable versions of @iobroker/js-controller-common
                      Depends on vulnerable versions of @iobroker/js-controller-common-db
                      node_modules/@iobroker/js-controller-adapter
                      @iobroker/js-controller-common  *
                      Depends on vulnerable versions of @alcalzone/pak
                      node_modules/@iobroker/js-controller-common
                        @iobroker/db-base  >=4.0.0-alpha.1-20210830-d9828cd3
                        Depends on vulnerable versions of @iobroker/js-controller-common
                        node_modules/@iobroker/db-base
                          @iobroker/db-objects-file  >=4.0.0-alpha.1-20210830-d9828cd3
                          Depends on vulnerable versions of @iobroker/db-base
                          Depends on vulnerable versions of @iobroker/db-objects-redis
                          node_modules/@iobroker/db-objects-file
                          @iobroker/db-objects-jsonl  >=4.0.0-alpha.1-20210830-d9828cd3
                          Depends on vulnerable versions of @iobroker/db-base
                          Depends on vulnerable versions of @iobroker/db-objects-file
                          Depends on vulnerable versions of @iobroker/db-objects-redis
                          node_modules/@iobroker/db-objects-jsonl
                          @iobroker/db-objects-redis  >=4.0.0-alpha.1-20210830-d9828cd3
                          Depends on vulnerable versions of @iobroker/db-base
                          node_modules/@iobroker/db-objects-redis
                          @iobroker/db-states-file  >=4.0.0-alpha.1-20210830-d9828cd3
                          Depends on vulnerable versions of @iobroker/db-base
                          Depends on vulnerable versions of @iobroker/db-states-redis
                          node_modules/@iobroker/db-states-file
                          @iobroker/db-states-jsonl  >=4.0.0-alpha.1-20210830-d9828cd3
                          Depends on vulnerable versions of @iobroker/db-base
                          Depends on vulnerable versions of @iobroker/db-states-file
                          Depends on vulnerable versions of @iobroker/db-states-redis
                          node_modules/@iobroker/db-states-jsonl
                          @iobroker/db-states-redis  >=4.0.0-alpha.1-20210830-d9828cd3
                          Depends on vulnerable versions of @iobroker/db-base
                          node_modules/@iobroker/db-states-redis
                        @iobroker/js-controller-cli  *
                        Depends on vulnerable versions of @iobroker/js-controller-common
                        Depends on vulnerable versions of @iobroker/js-controller-common-db
                        node_modules/@iobroker/js-controller-cli
                        @iobroker/js-controller-common-db  *
                        Depends on vulnerable versions of @iobroker/db-objects-file
                        Depends on vulnerable versions of @iobroker/db-objects-jsonl
                        Depends on vulnerable versions of @iobroker/db-objects-redis
                        Depends on vulnerable versions of @iobroker/db-states-file
                        Depends on vulnerable versions of @iobroker/db-states-jsonl
                        Depends on vulnerable versions of @iobroker/db-states-redis
                        Depends on vulnerable versions of @iobroker/js-controller-common
                        node_modules/@iobroker/js-controller-common-db
                    iobroker.awattar  >=1.0.6
                    Depends on vulnerable versions of axios
                    node_modules/iobroker.awattar
                    iobroker.broadlink2  >=2.1.0
                    Depends on vulnerable versions of axios
                    node_modules/iobroker.broadlink2
                    iobroker.withings  *
                    Depends on vulnerable versions of axios
                    node_modules/iobroker.withings
                    node-hue-api  2.0.0-RC1 - 5.0.0-alpha.2
                    Depends on vulnerable versions of axios
                    node_modules/node-hue-api
                      iobroker.hue  >=0.6.2
                      Depends on vulnerable versions of node-hue-api
                      node_modules/iobroker.hue
                    node-ical  0.15.3 - 0.16.1
                    Depends on vulnerable versions of axios
                    node_modules/node-ical
                      iobroker.jarvis  >=3.1.3
                      Depends on vulnerable versions of node-ical
                      Depends on vulnerable versions of semver
                      node_modules/iobroker.jarvis
                  
                  cookiejar  <2.1.4
                  Severity: moderate
                  cookiejar Regular Expression Denial of Service via Cookie.parse function - https://github.com/advisories/GHSA-h452-7996-h45h
                  fix available via `npm audit fix`
                  node_modules/cookiejar
                  
                  cryptiles  *
                  Severity: critical
                  Insufficient Entropy in cryptiles - https://github.com/advisories/GHSA-rq8g-5pc5-wrhr
                  Depends on vulnerable versions of boom
                  fix available via `npm audit fix`
                  node_modules/cryptiles
                  
                  debug  <=2.6.8 || 4.0.0 - 4.3.0
                  Severity: high
                  debug Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-9vvw-cc9w-f27h
                  Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                  Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                  Depends on vulnerable versions of ms
                  fix available via `npm audit fix --force`
                  Will install iobroker.cloud@4.0.10, which is a breaking change
                  node_modules/engine.io-client/node_modules/debug
                  node_modules/iobroker.socketio/node_modules/debug
                  node_modules/mdns-discovery/node_modules/debug
                  node_modules/socket.io-client/node_modules/debug
                  node_modules/socket.io-client/node_modules/socket.io-parser/node_modules/debug
                    engine.io  3.4.0 - 4.0.5
                    Depends on vulnerable versions of debug
                    node_modules/iobroker.socketio/node_modules/engine.io
                      socket.io  2.2.0 - 3.0.4
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of engine.io
                      Depends on vulnerable versions of socket.io-parser
                      node_modules/iobroker.socketio/node_modules/socket.io
                        iobroker.socketio  3.0.0 - 3.0.13 || 3.1.3 - 3.1.5 || 4.1.0 - 5.0.2 || 6.1.0 - 6.5.7 || >=6.6.0
                        Depends on vulnerable versions of socket.io
                        node_modules/iobroker.socketio
                          iobroker.web  4.2.1 - 4.3.0 || >=5.2.3
                          Depends on vulnerable versions of iobroker.socketio
                          node_modules/iobroker.web
                    engine.io-client  <=3.1.1
                    Depends on vulnerable versions of debug
                    Depends on vulnerable versions of parsejson
                    node_modules/engine.io-client
                      socket.io-client  1.0.0-pre - 2.1.1
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of engine.io-client
                      Depends on vulnerable versions of socket.io-parser
                      node_modules/socket.io-client
                        iobroker.cloud  <=2.4.6 || 2.8.0 - 3.0.2 || >=4.0.11
                        Depends on vulnerable versions of socket.io-client
                        node_modules/iobroker.cloud
                    mdns-discovery  >=0.1.1
                    Depends on vulnerable versions of debug
                    node_modules/mdns-discovery
                      iobroker.discovery  >=0.4.4
                      Depends on vulnerable versions of mdns-discovery
                      node_modules/iobroker.discovery
                      iobroker.firetv  >=0.0.3
                      Depends on vulnerable versions of adbkit
                      Depends on vulnerable versions of mdns-discovery
                      node_modules/iobroker.firetv
                      iobroker.mydlink  >=1.0.0
                      Depends on vulnerable versions of mdns-discovery
                      node_modules/iobroker.mydlink
                    socket.io-parser  <=3.3.2 || 3.4.0 - 4.0.2
                    Depends on vulnerable versions of debug
                    Depends on vulnerable versions of debug
                    node_modules/iobroker.socketio/node_modules/socket.io-parser
                    node_modules/socket.io-client/node_modules/socket.io-parser
                  
                  deep-extend  <0.5.1
                  Severity: critical
                  Prototype Pollution in deep-extend - https://github.com/advisories/GHSA-hr2v-3952-633q
                  fix available via `npm audit fix`
                  node_modules/deref/node_modules/deep-extend
                    deref  0.6.0 - 0.7.2
                    Depends on vulnerable versions of deep-extend
                    node_modules/deref
                      json-schema-faker  0.2.2 - 0.4.4
                      Depends on vulnerable versions of deref
                      node_modules/json-schema-faker
                        sway  *
                        Depends on vulnerable versions of json-schema-faker
                        Depends on vulnerable versions of z-schema
                        node_modules/sway
                  
                  dicer  *
                  Severity: high
                  Crash in HeaderParser in dicer - https://github.com/advisories/GHSA-wm7h-9275-46v2
                  No fix available
                  node_modules/dicer
                    busboy  <=0.3.1
                    Depends on vulnerable versions of dicer
                    node_modules/multer/node_modules/busboy
                      multer  <=2.0.0-rc.3
                      Depends on vulnerable versions of busboy
                      node_modules/multer
                        swagger-node-runner-fork  *
                        Depends on vulnerable versions of bagpipes
                        Depends on vulnerable versions of multer
                        Depends on vulnerable versions of sway
                        node_modules/swagger-node-runner-fork
                          iobroker.rest-api  *
                          Depends on vulnerable versions of swagger-node-runner-fork
                          node_modules/iobroker.rest-api
                  
                  follow-redirects  <=1.15.5
                  Severity: high
                  Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects - https://github.com/advisories/GHSA-pw2r-vq6v-hr8c
                  Exposure of sensitive information in follow-redirects - https://github.com/advisories/GHSA-74fj-2j2h-c42q
                  Follow Redirects improperly handles URLs in the url.parse() function - https://github.com/advisories/GHSA-jchw-25xp-jwwc
                  follow-redirects' Proxy-Authorization header kept across hosts - https://github.com/advisories/GHSA-cxjh-pqwp-8mfp
                  fix available via `npm audit fix --force`
                  Will install iobroker.hue@0.6.0, which is a breaking change
                  node_modules/iobroker.broadlink2/node_modules/follow-redirects
                  
                  get-func-name  <2.0.1
                  Severity: high
                  Chaijs/get-func-name vulnerable to ReDoS - https://github.com/advisories/GHSA-4q6p-r6v2-jvc5
                  fix available via `npm audit fix`
                  node_modules/get-func-name
                  
                  hawk  <=9.0.0
                  Severity: high
                  Uncontrolled Resource Consumption in Hawk - https://github.com/advisories/GHSA-44pw-h2cw-w3vq
                  Depends on vulnerable versions of boom
                  Depends on vulnerable versions of hoek
                  Depends on vulnerable versions of sntp
                  fix available via `npm audit fix --force`
                  Will install iobroker.samsung@0.2.9, which is a breaking change
                  node_modules/hawk
                  
                  hoek  *
                  Severity: high
                  hoek subject to prototype pollution via the clone function. - https://github.com/advisories/GHSA-c429-5p7v-vgjp
                  fix available via `npm audit fix --force`
                  Will install iobroker.samsung@0.2.9, which is a breaking change
                  node_modules/boom/node_modules/hoek
                  node_modules/cryptiles/node_modules/hoek
                  node_modules/hawk/node_modules/hoek
                  node_modules/hoek
                  node_modules/sntp/node_modules/hoek
                    boom  *
                    Depends on vulnerable versions of hoek
                    node_modules/boom
                    node_modules/cryptiles/node_modules/boom
                    joi  0.0.2 - 14.3.1
                    Depends on vulnerable versions of hoek
                    Depends on vulnerable versions of topo
                    node_modules/joi
                      iobroker.yeelight-2  >=1.0.0
                      Depends on vulnerable versions of joi
                      node_modules/iobroker.yeelight-2
                    sntp  0.0.0 || >=0.1.1
                    Depends on vulnerable versions of hoek
                    node_modules/sntp
                    topo  *
                    Depends on vulnerable versions of hoek
                    node_modules/topo
                  
                  ip  <1.1.9 || =2.0.0
                  Severity: moderate
                  NPM IP package incorrectly identifies some private IP addresses as public - https://github.com/advisories/GHSA-78xj-cgh5-2h22
                  NPM IP package incorrectly identifies some private IP addresses as public - https://github.com/advisories/GHSA-78xj-cgh5-2h22
                  fix available via `npm audit fix`
                  node_modules/iobroker.nuki-extended/node_modules/ip
                  node_modules/ip
                  
                  js-yaml  <=3.13.0
                  Severity: high
                  Denial of Service in js-yaml - https://github.com/advisories/GHSA-2pr6-76vf-7546
                  Code Injection in js-yaml - https://github.com/advisories/GHSA-8j8c-7jfh-h6hx
                  fix available via `npm audit fix --force`
                  Will install iobroker.rflink@1.0.2, which is a breaking change
                  node_modules/jscs/node_modules/js-yaml
                    jscs  >=1.11.2
                    Depends on vulnerable versions of js-yaml
                    Depends on vulnerable versions of jscs-jsdoc
                    Depends on vulnerable versions of lodash
                    Depends on vulnerable versions of pathval
                    Depends on vulnerable versions of xmlbuilder
                    node_modules/jscs
                      jscs-loader  *
                      Depends on vulnerable versions of jscs
                      Depends on vulnerable versions of loader-utils
                      node_modules/jscs-loader
                        avrgirl-arduino  4.0.1 - 5.0.0
                        Depends on vulnerable versions of jscs-loader
                        node_modules/avrgirl-arduino
                  
                  json5  <1.0.2
                  Severity: high
                  Prototype Pollution in JSON5 via Parse Method - https://github.com/advisories/GHSA-9c47-m6qq-7p4h
                  fix available via `npm audit fix --force`
                  Will install iobroker.rflink@1.0.2, which is a breaking change
                  node_modules/json5
                  node_modules/loader-utils/node_modules/json5
                    loader-utils  <=1.4.0
                    Depends on vulnerable versions of json5
                    node_modules/loader-utils
                  
                  
                  lodash  <=4.17.20
                  Severity: critical
                  Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-x5rq-j2xg-h7qm
                  Prototype Pollution in lodash - https://github.com/advisories/GHSA-fvqr-27wr-82fm
                  Prototype Pollution in lodash - https://github.com/advisories/GHSA-jf85-cpcp-j695
                  Prototype Pollution in lodash - https://github.com/advisories/GHSA-4xc9-xhrj-v574
                  Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-29mw-wpgm-hmr9
                  Prototype Pollution in lodash - https://github.com/advisories/GHSA-p6mc-m468-83gw
                  Command Injection in lodash - https://github.com/advisories/GHSA-35jh-r3h4-6jhm
                  fix available via `npm audit fix --force`
                  Will install iobroker.rflink@1.0.2, which is a breaking change
                  node_modules/jscs/node_modules/lodash
                  node_modules/jsdoctypeparser/node_modules/lodash
                    jsdoctypeparser  1.2.0 - 2.0.0-alpha-5
                    Depends on vulnerable versions of lodash
                    node_modules/jsdoctypeparser
                      jscs-jsdoc  >=1.1.0
                      Depends on vulnerable versions of jsdoctypeparser
                      node_modules/jscs-jsdoc
                    xmlbuilder  2.5.0 - 4.2.0
                    Depends on vulnerable versions of lodash
                    node_modules/jscs/node_modules/xmlbuilder
                  
                  minimatch  <3.0.5
                  Severity: high
                  minimatch ReDoS vulnerability - https://github.com/advisories/GHSA-f8q6-p94x-37v3
                  fix available via `npm audit fix`
                  node_modules/minimatch
                  
                  minimist  <=0.2.3
                  Severity: critical
                  Prototype Pollution in minimist - https://github.com/advisories/GHSA-vh95-rmgr-6w4m
                  Prototype Pollution in minimist - https://github.com/advisories/GHSA-xvch-5gv4-984h
                  fix available via `npm audit fix --force`
                  Will install iobroker@2.0.3, which is a breaking change
                  node_modules/optimist/node_modules/minimist
                  node_modules/syno/node_modules/minimist
                    optimist  >=0.6.0
                    Depends on vulnerable versions of minimist
                    node_modules/optimist
                      node-windows  0.1.5 - 1.0.0-beta.6
                      Depends on vulnerable versions of optimist
                      node_modules/node-windows
                        iobroker  >=4.0.2
                        Depends on vulnerable versions of node-windows
                        node_modules/iobroker
                  
                  ms  <2.0.0
                  Severity: moderate
                  Vercel ms Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-w9mr-4mfr-499f
                  fix available via `npm audit fix --force`
                  Will install iobroker.cloud@4.0.10, which is a breaking change
                  node_modules/engine.io-client/node_modules/ms
                  node_modules/mdns-discovery/node_modules/ms
                  node_modules/socket.io-client/node_modules/ms
                  node_modules/socket.io-client/node_modules/socket.io-parser/node_modules/ms
                  
                  nconf  <0.11.4
                  Severity: high
                  Prototype Pollution in nconf - https://github.com/advisories/GHSA-6xwr-q98w-rvg7
                  No fix available
                  node_modules/nconf
                  
                  nedb  *
                  Severity: critical
                  Prototype Pollution in nedb - https://github.com/advisories/GHSA-339j-hqgx-qrrx
                  Depends on vulnerable versions of binary-search-tree
                  Depends on vulnerable versions of underscore
                  fix available via `npm audit fix --force`
                  Will install iobroker.zigbee2mqtt@0.2.0, which is a breaking change
                  node_modules/nedb
                    aedes-persistence-nedb  *
                    Depends on vulnerable versions of nedb
                    node_modules/aedes-persistence-nedb
                      iobroker.zigbee2mqtt  >=1.0.0
                      Depends on vulnerable versions of aedes-persistence-nedb
                      node_modules/iobroker.zigbee2mqtt
                  
                  node-forge  <=1.2.1
                  Severity: high
                  Prototype Pollution in node-forge debug API. - https://github.com/advisories/GHSA-5rrq-pxf6-6jx5
                  Prototype Pollution in node-forge util.setPath API - https://github.com/advisories/GHSA-wxgw-qj99-44c2
                  URL parsing in node-forge could lead to undesired behavior. - https://github.com/advisories/GHSA-gf8q-jrpm-jvxq
                  Improper Verification of Cryptographic Signature in `node-forge` - https://github.com/advisories/GHSA-2r2c-g63r-vccr
                  Open Redirect in node-forge - https://github.com/advisories/GHSA-8fr3-hfg3-gpgp
                  Prototype Pollution in node-forge - https://github.com/advisories/GHSA-92xj-mqp7-vmcj
                  Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-cfm4-qjh2-4765
                  Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-x4jg-mjrx-434g
                  fix available via `npm audit fix --force`
                  Will install iobroker.tuya@2.0.4, which is a breaking change
                  node_modules/adbkit/node_modules/node-forge
                  node_modules/http-mitm-proxy/node_modules/node-forge
                  node_modules/rsa-compat/node_modules/node-forge
                    adbkit  >=2.1.0
                    Depends on vulnerable versions of node-forge
                    node_modules/adbkit
                    http-mitm-proxy  <=0.9.0
                    Depends on vulnerable versions of node-forge
                    node_modules/http-mitm-proxy
                      iobroker.tuya  >=3.0.0
                      Depends on vulnerable versions of http-mitm-proxy
                      node_modules/iobroker.tuya
                    rsa-compat  <=1.9.4
                    Depends on vulnerable versions of node-forge
                    node_modules/rsa-compat
                  
                  nodemailer  <=6.9.8
                  Severity: moderate
                  nodemailer ReDoS when trying to send a specially crafted email - https://github.com/advisories/GHSA-9h6g-pr28-7cqp
                  fix available via `npm audit fix`
                  node_modules/nodemailer
                  
                  octokit  <3.1.2
                  Severity: high
                  Unauthenticated Denial of Service in the octokit/webhooks library - https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
                  fix available via `npm audit fix --force`
                  Will install iobroker.esphome@0.2.4, which is a breaking change
                  node_modules/octokit
                    autopy  >=1.0.0
                    Depends on vulnerable versions of octokit
                    node_modules/autopy
                      iobroker.esphome  >=0.3.0
                      Depends on vulnerable versions of autopy
                      node_modules/iobroker.esphome
                  
                  parsejson  *
                  Severity: high
                  Regular Expression Denial of Service in parsejson - https://github.com/advisories/GHSA-q75g-2496-mxpp
                  fix available via `npm audit fix --force`
                  Will install iobroker.cloud@4.0.10, which is a breaking change
                  node_modules/parsejson
                  
                  pathval  <1.1.1
                  Severity: high
                  Prototype pollution in pathval - https://github.com/advisories/GHSA-g6ww-v8xp-vmwg
                  fix available via `npm audit fix --force`
                  Will install iobroker.rflink@1.0.2, which is a breaking change
                  node_modules/jscs/node_modules/pathval
                  
                  put  *
                  Sensitive Data Exposure in put - https://github.com/advisories/GHSA-v6gv-fg46-h89j
                  No fix available
                  node_modules/put
                    binrpc  *
                    Depends on vulnerable versions of put
                    node_modules/binrpc
                      iobroker.hm-rpc  *
                      Depends on vulnerable versions of binrpc
                      node_modules/iobroker.hm-rpc
                  
                  qs  6.5.0 - 6.5.2
                  Severity: high
                  qs vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-hrpp-h998-j3pp
                  fix available via `npm audit fix`
                  node_modules/request/node_modules/qs
                  
                  
                  semver  <=5.7.1 || 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
                  Severity: moderate
                  semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
                  semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
                  semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
                  fix available via `npm audit fix --force`
                  Will install iobroker.jarvis@3.1.3, which is a breaking change
                  node_modules/harmonyhubws/node_modules/semver
                  node_modules/make-dir/node_modules/semver
                  node_modules/node-abi/node_modules/semver
                  node_modules/semver
                  
                  
                  ssh2  <1.4.0
                  Severity: high
                  OS Command Injection in ssh2 - https://github.com/advisories/GHSA-652h-xwhf-q4h6
                  No fix available
                  node_modules/iobroker.asuswrt/node_modules/ssh2
                    iobroker.asuswrt  *
                    Depends on vulnerable versions of ssh2
                    node_modules/iobroker.asuswrt
                  
                  tar  <6.2.1
                  Severity: moderate
                  Denial of service while parsing a tar file due to lack of folders count validation - https://github.com/advisories/GHSA-f5x3-32g6-xq36
                  fix available via `npm audit fix`
                  node_modules/tar
                  
                  tough-cookie  <4.1.3
                  Severity: moderate
                  tough-cookie Prototype Pollution vulnerability - https://github.com/advisories/GHSA-72xf-g2v4-qvf3
                  fix available via `npm audit fix --force`
                  Will install iobroker.samsung@0.2.9, which is a breaking change
                  node_modules/machinepack-http/node_modules/tough-cookie
                  node_modules/node-blink-security/node_modules/tough-cookie
                  node_modules/request-promise-native/node_modules/tough-cookie
                  node_modules/request-promise/node_modules/tough-cookie
                  node_modules/request/node_modules/tough-cookie
                  
                  underscore  1.3.2 - 1.12.0
                  Severity: critical
                  Arbitrary Code Execution in underscore - https://github.com/advisories/GHSA-cf4h-3jhx-xvhq
                  fix available via `npm audit fix --force`
                  Will install iobroker.zigbee2mqtt@0.2.0, which is a breaking change
                  node_modules/binary-search-tree/node_modules/underscore
                  node_modules/nedb/node_modules/underscore
                  node_modules/nomnom/node_modules/underscore
                    binary-search-tree  *
                    Depends on vulnerable versions of underscore
                    node_modules/binary-search-tree
                    nomnom  >=1.6.0
                    Depends on vulnerable versions of underscore
                    node_modules/nomnom
                  
                  validator  <13.7.0
                  Severity: moderate
                  Inefficient Regular Expression Complexity in validator.js - https://github.com/advisories/GHSA-qgmg-gppg-76g5
                  fix available via `npm audit fix`
                  node_modules/z-schema/node_modules/validator
                    z-schema  3.6.1 - 4.2.3 || 5.0.0
                    Depends on vulnerable versions of validator
                    node_modules/z-schema
                  
                  xml2js  <0.5.0
                  Severity: moderate
                  xml2js is vulnerable to prototype pollution - https://github.com/advisories/GHSA-776f-qx25-q3cc
                  fix available via `npm audit fix --force`
                  Will install iobroker.radar2@1.2.5, which is a breaking change
                  node_modules/xml2js
                  
                  142 vulnerabilities (11 low, 70 moderate, 41 high, 20 critical)
                  
                  To address issues that do not require attention, run:
                    npm audit fix
                  
                  To address all issues possible (including breaking changes), run:
                    npm audit fix --force
                  
                  Some issues need review, and may require choosing
                  a different dependency.
                  
                  Thomas BraunT apollon77A 2 Antworten Letzte Antwort
                  0
                  • M muckel

                    @mcm57 @apollon77
                    Heute im log entdeckt:

                    Nach npm audit kam folgender Vorschlag:
                    To address issues that do not require attention, run:
                    npm audit fix

                    To address all issues possible (including breaking changes), run:
                    npm audit fix --force

                    Some issues need review, and may require choosing
                    a different dependency.
                    Was soll ich tun?

                    2024-04-21 04:15:05.778 - error: javascript.0 (1981571) npm
                    2024-04-21 04:15:05.779 - error: javascript.0 (1981571) WARN deprecated har-validator@5.1.5: this library is no longer supported
                    2024-04-21 04:15:05.813 - error: javascript.0 (1981571) npm
                    2024-04-21 04:15:05.813 - error: javascript.0 (1981571) WARN deprecated node-inspect@2.0.0: This module is part of Node.js core and does not need to be installed separately. It is now unmaintained.
                    2024-04-21 04:15:05.842 - error: javascript.0 (1981571) npm
                    2024-04-21 04:15:05.843 - error: javascript.0 (1981571) WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.
                    2024-04-21 04:15:05.861 - error: javascript.0 (1981571) npm
                    2024-04-21 04:15:05.861 - error: javascript.0 (1981571) WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142
                    2024-04-21 04:15:07.405 - info: javascript.0 (1981571)
                    added 98 packages, and audited 103 packages in 4s
                    2024-04-21 04:15:07.406 - info: javascript.0 (1981571)
                    4 packages are looking for funding
                    run `npm fund` for details
                    2024-04-21 04:15:07.409 - info: javascript.0 (1981571)
                    2 moderate severity vulnerabilities
                    Some issues need review, and may require choosing
                    a different dependency.
                    Run `npm audit` for details.
                    
                    erich@smarthome:~$ cd /opt/iobroker
                    erich@smarthome:/opt/iobroker$ npm audit
                    [sudo] password for erich:
                    # npm audit report
                    
                    @octokit/webhooks  10.0.0 - 10.9.1
                    Severity: high
                    Unauthenticated Denial of Service in the octokit/webhooks library - https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
                    fix available via `npm audit fix`
                    node_modules/@octokit/webhooks
                    
                    ajv  <6.12.3
                    Severity: moderate
                    Prototype Pollution in Ajv - https://github.com/advisories/GHSA-v88g-cgmw-v5xw
                    fix available via `npm audit fix --force`
                    Will install iobroker.samsung@0.2.9, which is a breaking change
                    node_modules/node-blink-security/node_modules/ajv
                      har-validator  3.3.0 - 5.1.0
                      Depends on vulnerable versions of ajv
                      node_modules/node-blink-security/node_modules/har-validator
                        request  *
                        Depends on vulnerable versions of har-validator
                        Depends on vulnerable versions of hawk
                        Depends on vulnerable versions of tough-cookie
                        node_modules/machinepack-http/node_modules/request
                        node_modules/node-blink-security/node_modules/request
                        node_modules/request
                          dropbox-v2-api  *
                          Depends on vulnerable versions of request
                          node_modules/dropbox-v2-api
                            iobroker.backitup  >=0.3.0
                            Depends on vulnerable versions of dropbox-v2-api
                            node_modules/iobroker.backitup
                          harmonyhubws  *
                          Depends on vulnerable versions of request
                          Depends on vulnerable versions of request-promise-native
                          node_modules/harmonyhubws
                            iobroker.harmony  >=1.1.1
                            Depends on vulnerable versions of harmonyhubws
                            node_modules/iobroker.harmony
                          iobroker.deconz  >=0.2.0
                          Depends on vulnerable versions of request
                          node_modules/iobroker.deconz
                          iobroker.hue-extended  *
                          Depends on vulnerable versions of request
                          Depends on vulnerable versions of request-promise
                          node_modules/iobroker.hue-extended
                          iobroker.javascript  *
                          Depends on vulnerable versions of request
                          node_modules/iobroker.javascript
                          iobroker.mihome-vacuum  >=2.0.7
                          Depends on vulnerable versions of request
                          node_modules/iobroker.mihome-vacuum
                          iobroker.netatmo  0.5.0 - 0.5.1 || >=1.1.7
                          Depends on vulnerable versions of request
                          node_modules/iobroker.netatmo
                          iobroker.netatmo-crawler  *
                          Depends on vulnerable versions of request
                          node_modules/iobroker.netatmo-crawler
                          iobroker.nuki-extended  *
                          Depends on vulnerable versions of nuki-web-api
                          Depends on vulnerable versions of request
                          Depends on vulnerable versions of request-promise
                          node_modules/iobroker.nuki-extended
                          iobroker.rflink  >=1.0.3
                          Depends on vulnerable versions of avrgirl-arduino
                          Depends on vulnerable versions of request
                          node_modules/iobroker.rflink
                          iobroker.smartgarden  >=0.5.1
                          Depends on vulnerable versions of request
                          node_modules/iobroker.smartgarden
                          iobroker.whatsapp-cmb  *
                          Depends on vulnerable versions of request
                          node_modules/iobroker.whatsapp-cmb
                          le-acme-core  *
                          Depends on vulnerable versions of request
                          Depends on vulnerable versions of rsa-compat
                          node_modules/le-acme-core
                            iobroker.js-controller  >=1.5.4
                            Depends on vulnerable versions of @iobroker/db-objects-file
                            Depends on vulnerable versions of @iobroker/db-objects-jsonl
                            Depends on vulnerable versions of @iobroker/db-objects-redis
                            Depends on vulnerable versions of @iobroker/db-states-file
                            Depends on vulnerable versions of @iobroker/db-states-jsonl
                            Depends on vulnerable versions of @iobroker/db-states-redis
                            Depends on vulnerable versions of @iobroker/js-controller-adapter
                            Depends on vulnerable versions of @iobroker/js-controller-cli
                            Depends on vulnerable versions of @iobroker/js-controller-common
                            Depends on vulnerable versions of @iobroker/js-controller-common-db
                            Depends on vulnerable versions of le-acme-core
                            node_modules/iobroker.js-controller
                          machinepack-http  0.2.3 - 8.0.0
                          Depends on vulnerable versions of request
                          node_modules/machinepack-http
                            bagpipes  *
                            Depends on vulnerable versions of machinepack-http
                            node_modules/bagpipes
                          node-blink-security  *
                          Depends on vulnerable versions of request
                          node_modules/node-blink-security
                            iobroker.blink4home  *
                            Depends on vulnerable versions of node-blink-security
                            node_modules/iobroker.blink4home
                          node-gyp  <=7.1.2
                          Depends on vulnerable versions of request
                          node_modules/usocket/node_modules/node-gyp
                            usocket  0.2.2 - 0.3.0
                            Depends on vulnerable versions of node-gyp
                            node_modules/usocket
                              dbus-next  *
                              Depends on vulnerable versions of usocket
                              Depends on vulnerable versions of xml2js
                              node_modules/dbus-next
                                node-ble  >=0.0.2
                                Depends on vulnerable versions of dbus-next
                                node_modules/node-ble
                                  iobroker.radar2  >=2.0.0
                                  Depends on vulnerable versions of node-ble
                                  node_modules/iobroker.radar2
                          nuki-web-api  *
                          Depends on vulnerable versions of request
                          Depends on vulnerable versions of request-promise
                          node_modules/nuki-web-api
                          request-promise  >=0.0.2
                          Depends on vulnerable versions of request
                          Depends on vulnerable versions of request-promise-core
                          Depends on vulnerable versions of tough-cookie
                          node_modules/request-promise
                            samsungtv
                            Depends on vulnerable versions of request
                            Depends on vulnerable versions of request-promise
                            node_modules/samsungtv
                              iobroker.samsung  >=0.5.1
                              Depends on vulnerable versions of samsungtv
                              node_modules/iobroker.samsung
                          request-promise-core  *
                          Depends on vulnerable versions of request
                          node_modules/@cypress/request-promise/node_modules/request-promise-core
                          node_modules/request-promise-core
                            @cypress/request-promise  *
                            Depends on vulnerable versions of request-promise-core
                            node_modules/@cypress/request-promise
                              node-telegram-bot-api  >=0.64.0
                              Depends on vulnerable versions of @cypress/request-promise
                              node_modules/node-telegram-bot-api
                                iobroker.telegram  >=2.1.0
                                Depends on vulnerable versions of node-telegram-bot-api
                                node_modules/iobroker.telegram
                            request-promise-native  >=1.0.0
                            Depends on vulnerable versions of request
                            Depends on vulnerable versions of request-promise-core
                            Depends on vulnerable versions of tough-cookie
                            node_modules/request-promise-native
                          smartmeter-obis  *
                          Depends on vulnerable versions of request
                          node_modules/smartmeter-obis
                            iobroker.smartmeter  *
                            Depends on vulnerable versions of smartmeter-obis
                            node_modules/iobroker.smartmeter
                          syno  *
                          Depends on vulnerable versions of nconf
                          Depends on vulnerable versions of request
                          node_modules/syno
                            iobroker.synology  *
                            Depends on vulnerable versions of syno
                            node_modules/iobroker.synology
                    
                    axios  <=0.27.2 || 1.0.0 - 1.5.1
                    Severity: high
                    Axios vulnerable to Server-Side Request Forgery - https://github.com/advisories/GHSA-4w2v-q235-vp99
                    axios Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-cph5-m8f7-6c5x
                    Axios Cross-Site Request Forgery Vulnerability - https://github.com/advisories/GHSA-wf5p-g6vw-rhxx
                    Axios Cross-Site Request Forgery Vulnerability - https://github.com/advisories/GHSA-wf5p-g6vw-rhxx
                    Depends on vulnerable versions of follow-redirects
                    fix available via `npm audit fix --force`
                    Will install iobroker.hue@0.6.0, which is a breaking change
                    node_modules/@alcalzone/pak/node_modules/axios
                    node_modules/iobroker.awattar/node_modules/axios
                    node_modules/iobroker.broadlink2/node_modules/axios
                    node_modules/iobroker.withings/node_modules/axios
                    node_modules/node-hue-api/node_modules/axios
                    node_modules/node-ical/node_modules/axios
                      @alcalzone/pak  0.3.0 - 0.10.0
                      Depends on vulnerable versions of axios
                      node_modules/@alcalzone/pak
                        @iobroker/js-controller-adapter  *
                        Depends on vulnerable versions of @alcalzone/pak
                        Depends on vulnerable versions of @iobroker/db-objects-file
                        Depends on vulnerable versions of @iobroker/db-objects-jsonl
                        Depends on vulnerable versions of @iobroker/db-objects-redis
                        Depends on vulnerable versions of @iobroker/db-states-file
                        Depends on vulnerable versions of @iobroker/db-states-jsonl
                        Depends on vulnerable versions of @iobroker/db-states-redis
                        Depends on vulnerable versions of @iobroker/js-controller-common
                        Depends on vulnerable versions of @iobroker/js-controller-common-db
                        node_modules/@iobroker/js-controller-adapter
                        @iobroker/js-controller-common  *
                        Depends on vulnerable versions of @alcalzone/pak
                        node_modules/@iobroker/js-controller-common
                          @iobroker/db-base  >=4.0.0-alpha.1-20210830-d9828cd3
                          Depends on vulnerable versions of @iobroker/js-controller-common
                          node_modules/@iobroker/db-base
                            @iobroker/db-objects-file  >=4.0.0-alpha.1-20210830-d9828cd3
                            Depends on vulnerable versions of @iobroker/db-base
                            Depends on vulnerable versions of @iobroker/db-objects-redis
                            node_modules/@iobroker/db-objects-file
                            @iobroker/db-objects-jsonl  >=4.0.0-alpha.1-20210830-d9828cd3
                            Depends on vulnerable versions of @iobroker/db-base
                            Depends on vulnerable versions of @iobroker/db-objects-file
                            Depends on vulnerable versions of @iobroker/db-objects-redis
                            node_modules/@iobroker/db-objects-jsonl
                            @iobroker/db-objects-redis  >=4.0.0-alpha.1-20210830-d9828cd3
                            Depends on vulnerable versions of @iobroker/db-base
                            node_modules/@iobroker/db-objects-redis
                            @iobroker/db-states-file  >=4.0.0-alpha.1-20210830-d9828cd3
                            Depends on vulnerable versions of @iobroker/db-base
                            Depends on vulnerable versions of @iobroker/db-states-redis
                            node_modules/@iobroker/db-states-file
                            @iobroker/db-states-jsonl  >=4.0.0-alpha.1-20210830-d9828cd3
                            Depends on vulnerable versions of @iobroker/db-base
                            Depends on vulnerable versions of @iobroker/db-states-file
                            Depends on vulnerable versions of @iobroker/db-states-redis
                            node_modules/@iobroker/db-states-jsonl
                            @iobroker/db-states-redis  >=4.0.0-alpha.1-20210830-d9828cd3
                            Depends on vulnerable versions of @iobroker/db-base
                            node_modules/@iobroker/db-states-redis
                          @iobroker/js-controller-cli  *
                          Depends on vulnerable versions of @iobroker/js-controller-common
                          Depends on vulnerable versions of @iobroker/js-controller-common-db
                          node_modules/@iobroker/js-controller-cli
                          @iobroker/js-controller-common-db  *
                          Depends on vulnerable versions of @iobroker/db-objects-file
                          Depends on vulnerable versions of @iobroker/db-objects-jsonl
                          Depends on vulnerable versions of @iobroker/db-objects-redis
                          Depends on vulnerable versions of @iobroker/db-states-file
                          Depends on vulnerable versions of @iobroker/db-states-jsonl
                          Depends on vulnerable versions of @iobroker/db-states-redis
                          Depends on vulnerable versions of @iobroker/js-controller-common
                          node_modules/@iobroker/js-controller-common-db
                      iobroker.awattar  >=1.0.6
                      Depends on vulnerable versions of axios
                      node_modules/iobroker.awattar
                      iobroker.broadlink2  >=2.1.0
                      Depends on vulnerable versions of axios
                      node_modules/iobroker.broadlink2
                      iobroker.withings  *
                      Depends on vulnerable versions of axios
                      node_modules/iobroker.withings
                      node-hue-api  2.0.0-RC1 - 5.0.0-alpha.2
                      Depends on vulnerable versions of axios
                      node_modules/node-hue-api
                        iobroker.hue  >=0.6.2
                        Depends on vulnerable versions of node-hue-api
                        node_modules/iobroker.hue
                      node-ical  0.15.3 - 0.16.1
                      Depends on vulnerable versions of axios
                      node_modules/node-ical
                        iobroker.jarvis  >=3.1.3
                        Depends on vulnerable versions of node-ical
                        Depends on vulnerable versions of semver
                        node_modules/iobroker.jarvis
                    
                    cookiejar  <2.1.4
                    Severity: moderate
                    cookiejar Regular Expression Denial of Service via Cookie.parse function - https://github.com/advisories/GHSA-h452-7996-h45h
                    fix available via `npm audit fix`
                    node_modules/cookiejar
                    
                    cryptiles  *
                    Severity: critical
                    Insufficient Entropy in cryptiles - https://github.com/advisories/GHSA-rq8g-5pc5-wrhr
                    Depends on vulnerable versions of boom
                    fix available via `npm audit fix`
                    node_modules/cryptiles
                    
                    debug  <=2.6.8 || 4.0.0 - 4.3.0
                    Severity: high
                    debug Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-9vvw-cc9w-f27h
                    Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                    Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                    Depends on vulnerable versions of ms
                    fix available via `npm audit fix --force`
                    Will install iobroker.cloud@4.0.10, which is a breaking change
                    node_modules/engine.io-client/node_modules/debug
                    node_modules/iobroker.socketio/node_modules/debug
                    node_modules/mdns-discovery/node_modules/debug
                    node_modules/socket.io-client/node_modules/debug
                    node_modules/socket.io-client/node_modules/socket.io-parser/node_modules/debug
                      engine.io  3.4.0 - 4.0.5
                      Depends on vulnerable versions of debug
                      node_modules/iobroker.socketio/node_modules/engine.io
                        socket.io  2.2.0 - 3.0.4
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/iobroker.socketio/node_modules/socket.io
                          iobroker.socketio  3.0.0 - 3.0.13 || 3.1.3 - 3.1.5 || 4.1.0 - 5.0.2 || 6.1.0 - 6.5.7 || >=6.6.0
                          Depends on vulnerable versions of socket.io
                          node_modules/iobroker.socketio
                            iobroker.web  4.2.1 - 4.3.0 || >=5.2.3
                            Depends on vulnerable versions of iobroker.socketio
                            node_modules/iobroker.web
                      engine.io-client  <=3.1.1
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of parsejson
                      node_modules/engine.io-client
                        socket.io-client  1.0.0-pre - 2.1.1
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io-client
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io-client
                          iobroker.cloud  <=2.4.6 || 2.8.0 - 3.0.2 || >=4.0.11
                          Depends on vulnerable versions of socket.io-client
                          node_modules/iobroker.cloud
                      mdns-discovery  >=0.1.1
                      Depends on vulnerable versions of debug
                      node_modules/mdns-discovery
                        iobroker.discovery  >=0.4.4
                        Depends on vulnerable versions of mdns-discovery
                        node_modules/iobroker.discovery
                        iobroker.firetv  >=0.0.3
                        Depends on vulnerable versions of adbkit
                        Depends on vulnerable versions of mdns-discovery
                        node_modules/iobroker.firetv
                        iobroker.mydlink  >=1.0.0
                        Depends on vulnerable versions of mdns-discovery
                        node_modules/iobroker.mydlink
                      socket.io-parser  <=3.3.2 || 3.4.0 - 4.0.2
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of debug
                      node_modules/iobroker.socketio/node_modules/socket.io-parser
                      node_modules/socket.io-client/node_modules/socket.io-parser
                    
                    deep-extend  <0.5.1
                    Severity: critical
                    Prototype Pollution in deep-extend - https://github.com/advisories/GHSA-hr2v-3952-633q
                    fix available via `npm audit fix`
                    node_modules/deref/node_modules/deep-extend
                      deref  0.6.0 - 0.7.2
                      Depends on vulnerable versions of deep-extend
                      node_modules/deref
                        json-schema-faker  0.2.2 - 0.4.4
                        Depends on vulnerable versions of deref
                        node_modules/json-schema-faker
                          sway  *
                          Depends on vulnerable versions of json-schema-faker
                          Depends on vulnerable versions of z-schema
                          node_modules/sway
                    
                    dicer  *
                    Severity: high
                    Crash in HeaderParser in dicer - https://github.com/advisories/GHSA-wm7h-9275-46v2
                    No fix available
                    node_modules/dicer
                      busboy  <=0.3.1
                      Depends on vulnerable versions of dicer
                      node_modules/multer/node_modules/busboy
                        multer  <=2.0.0-rc.3
                        Depends on vulnerable versions of busboy
                        node_modules/multer
                          swagger-node-runner-fork  *
                          Depends on vulnerable versions of bagpipes
                          Depends on vulnerable versions of multer
                          Depends on vulnerable versions of sway
                          node_modules/swagger-node-runner-fork
                            iobroker.rest-api  *
                            Depends on vulnerable versions of swagger-node-runner-fork
                            node_modules/iobroker.rest-api
                    
                    follow-redirects  <=1.15.5
                    Severity: high
                    Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects - https://github.com/advisories/GHSA-pw2r-vq6v-hr8c
                    Exposure of sensitive information in follow-redirects - https://github.com/advisories/GHSA-74fj-2j2h-c42q
                    Follow Redirects improperly handles URLs in the url.parse() function - https://github.com/advisories/GHSA-jchw-25xp-jwwc
                    follow-redirects' Proxy-Authorization header kept across hosts - https://github.com/advisories/GHSA-cxjh-pqwp-8mfp
                    fix available via `npm audit fix --force`
                    Will install iobroker.hue@0.6.0, which is a breaking change
                    node_modules/iobroker.broadlink2/node_modules/follow-redirects
                    
                    get-func-name  <2.0.1
                    Severity: high
                    Chaijs/get-func-name vulnerable to ReDoS - https://github.com/advisories/GHSA-4q6p-r6v2-jvc5
                    fix available via `npm audit fix`
                    node_modules/get-func-name
                    
                    hawk  <=9.0.0
                    Severity: high
                    Uncontrolled Resource Consumption in Hawk - https://github.com/advisories/GHSA-44pw-h2cw-w3vq
                    Depends on vulnerable versions of boom
                    Depends on vulnerable versions of hoek
                    Depends on vulnerable versions of sntp
                    fix available via `npm audit fix --force`
                    Will install iobroker.samsung@0.2.9, which is a breaking change
                    node_modules/hawk
                    
                    hoek  *
                    Severity: high
                    hoek subject to prototype pollution via the clone function. - https://github.com/advisories/GHSA-c429-5p7v-vgjp
                    fix available via `npm audit fix --force`
                    Will install iobroker.samsung@0.2.9, which is a breaking change
                    node_modules/boom/node_modules/hoek
                    node_modules/cryptiles/node_modules/hoek
                    node_modules/hawk/node_modules/hoek
                    node_modules/hoek
                    node_modules/sntp/node_modules/hoek
                      boom  *
                      Depends on vulnerable versions of hoek
                      node_modules/boom
                      node_modules/cryptiles/node_modules/boom
                      joi  0.0.2 - 14.3.1
                      Depends on vulnerable versions of hoek
                      Depends on vulnerable versions of topo
                      node_modules/joi
                        iobroker.yeelight-2  >=1.0.0
                        Depends on vulnerable versions of joi
                        node_modules/iobroker.yeelight-2
                      sntp  0.0.0 || >=0.1.1
                      Depends on vulnerable versions of hoek
                      node_modules/sntp
                      topo  *
                      Depends on vulnerable versions of hoek
                      node_modules/topo
                    
                    ip  <1.1.9 || =2.0.0
                    Severity: moderate
                    NPM IP package incorrectly identifies some private IP addresses as public - https://github.com/advisories/GHSA-78xj-cgh5-2h22
                    NPM IP package incorrectly identifies some private IP addresses as public - https://github.com/advisories/GHSA-78xj-cgh5-2h22
                    fix available via `npm audit fix`
                    node_modules/iobroker.nuki-extended/node_modules/ip
                    node_modules/ip
                    
                    js-yaml  <=3.13.0
                    Severity: high
                    Denial of Service in js-yaml - https://github.com/advisories/GHSA-2pr6-76vf-7546
                    Code Injection in js-yaml - https://github.com/advisories/GHSA-8j8c-7jfh-h6hx
                    fix available via `npm audit fix --force`
                    Will install iobroker.rflink@1.0.2, which is a breaking change
                    node_modules/jscs/node_modules/js-yaml
                      jscs  >=1.11.2
                      Depends on vulnerable versions of js-yaml
                      Depends on vulnerable versions of jscs-jsdoc
                      Depends on vulnerable versions of lodash
                      Depends on vulnerable versions of pathval
                      Depends on vulnerable versions of xmlbuilder
                      node_modules/jscs
                        jscs-loader  *
                        Depends on vulnerable versions of jscs
                        Depends on vulnerable versions of loader-utils
                        node_modules/jscs-loader
                          avrgirl-arduino  4.0.1 - 5.0.0
                          Depends on vulnerable versions of jscs-loader
                          node_modules/avrgirl-arduino
                    
                    json5  <1.0.2
                    Severity: high
                    Prototype Pollution in JSON5 via Parse Method - https://github.com/advisories/GHSA-9c47-m6qq-7p4h
                    fix available via `npm audit fix --force`
                    Will install iobroker.rflink@1.0.2, which is a breaking change
                    node_modules/json5
                    node_modules/loader-utils/node_modules/json5
                      loader-utils  <=1.4.0
                      Depends on vulnerable versions of json5
                      node_modules/loader-utils
                    
                    
                    lodash  <=4.17.20
                    Severity: critical
                    Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-x5rq-j2xg-h7qm
                    Prototype Pollution in lodash - https://github.com/advisories/GHSA-fvqr-27wr-82fm
                    Prototype Pollution in lodash - https://github.com/advisories/GHSA-jf85-cpcp-j695
                    Prototype Pollution in lodash - https://github.com/advisories/GHSA-4xc9-xhrj-v574
                    Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-29mw-wpgm-hmr9
                    Prototype Pollution in lodash - https://github.com/advisories/GHSA-p6mc-m468-83gw
                    Command Injection in lodash - https://github.com/advisories/GHSA-35jh-r3h4-6jhm
                    fix available via `npm audit fix --force`
                    Will install iobroker.rflink@1.0.2, which is a breaking change
                    node_modules/jscs/node_modules/lodash
                    node_modules/jsdoctypeparser/node_modules/lodash
                      jsdoctypeparser  1.2.0 - 2.0.0-alpha-5
                      Depends on vulnerable versions of lodash
                      node_modules/jsdoctypeparser
                        jscs-jsdoc  >=1.1.0
                        Depends on vulnerable versions of jsdoctypeparser
                        node_modules/jscs-jsdoc
                      xmlbuilder  2.5.0 - 4.2.0
                      Depends on vulnerable versions of lodash
                      node_modules/jscs/node_modules/xmlbuilder
                    
                    minimatch  <3.0.5
                    Severity: high
                    minimatch ReDoS vulnerability - https://github.com/advisories/GHSA-f8q6-p94x-37v3
                    fix available via `npm audit fix`
                    node_modules/minimatch
                    
                    minimist  <=0.2.3
                    Severity: critical
                    Prototype Pollution in minimist - https://github.com/advisories/GHSA-vh95-rmgr-6w4m
                    Prototype Pollution in minimist - https://github.com/advisories/GHSA-xvch-5gv4-984h
                    fix available via `npm audit fix --force`
                    Will install iobroker@2.0.3, which is a breaking change
                    node_modules/optimist/node_modules/minimist
                    node_modules/syno/node_modules/minimist
                      optimist  >=0.6.0
                      Depends on vulnerable versions of minimist
                      node_modules/optimist
                        node-windows  0.1.5 - 1.0.0-beta.6
                        Depends on vulnerable versions of optimist
                        node_modules/node-windows
                          iobroker  >=4.0.2
                          Depends on vulnerable versions of node-windows
                          node_modules/iobroker
                    
                    ms  <2.0.0
                    Severity: moderate
                    Vercel ms Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-w9mr-4mfr-499f
                    fix available via `npm audit fix --force`
                    Will install iobroker.cloud@4.0.10, which is a breaking change
                    node_modules/engine.io-client/node_modules/ms
                    node_modules/mdns-discovery/node_modules/ms
                    node_modules/socket.io-client/node_modules/ms
                    node_modules/socket.io-client/node_modules/socket.io-parser/node_modules/ms
                    
                    nconf  <0.11.4
                    Severity: high
                    Prototype Pollution in nconf - https://github.com/advisories/GHSA-6xwr-q98w-rvg7
                    No fix available
                    node_modules/nconf
                    
                    nedb  *
                    Severity: critical
                    Prototype Pollution in nedb - https://github.com/advisories/GHSA-339j-hqgx-qrrx
                    Depends on vulnerable versions of binary-search-tree
                    Depends on vulnerable versions of underscore
                    fix available via `npm audit fix --force`
                    Will install iobroker.zigbee2mqtt@0.2.0, which is a breaking change
                    node_modules/nedb
                      aedes-persistence-nedb  *
                      Depends on vulnerable versions of nedb
                      node_modules/aedes-persistence-nedb
                        iobroker.zigbee2mqtt  >=1.0.0
                        Depends on vulnerable versions of aedes-persistence-nedb
                        node_modules/iobroker.zigbee2mqtt
                    
                    node-forge  <=1.2.1
                    Severity: high
                    Prototype Pollution in node-forge debug API. - https://github.com/advisories/GHSA-5rrq-pxf6-6jx5
                    Prototype Pollution in node-forge util.setPath API - https://github.com/advisories/GHSA-wxgw-qj99-44c2
                    URL parsing in node-forge could lead to undesired behavior. - https://github.com/advisories/GHSA-gf8q-jrpm-jvxq
                    Improper Verification of Cryptographic Signature in `node-forge` - https://github.com/advisories/GHSA-2r2c-g63r-vccr
                    Open Redirect in node-forge - https://github.com/advisories/GHSA-8fr3-hfg3-gpgp
                    Prototype Pollution in node-forge - https://github.com/advisories/GHSA-92xj-mqp7-vmcj
                    Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-cfm4-qjh2-4765
                    Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-x4jg-mjrx-434g
                    fix available via `npm audit fix --force`
                    Will install iobroker.tuya@2.0.4, which is a breaking change
                    node_modules/adbkit/node_modules/node-forge
                    node_modules/http-mitm-proxy/node_modules/node-forge
                    node_modules/rsa-compat/node_modules/node-forge
                      adbkit  >=2.1.0
                      Depends on vulnerable versions of node-forge
                      node_modules/adbkit
                      http-mitm-proxy  <=0.9.0
                      Depends on vulnerable versions of node-forge
                      node_modules/http-mitm-proxy
                        iobroker.tuya  >=3.0.0
                        Depends on vulnerable versions of http-mitm-proxy
                        node_modules/iobroker.tuya
                      rsa-compat  <=1.9.4
                      Depends on vulnerable versions of node-forge
                      node_modules/rsa-compat
                    
                    nodemailer  <=6.9.8
                    Severity: moderate
                    nodemailer ReDoS when trying to send a specially crafted email - https://github.com/advisories/GHSA-9h6g-pr28-7cqp
                    fix available via `npm audit fix`
                    node_modules/nodemailer
                    
                    octokit  <3.1.2
                    Severity: high
                    Unauthenticated Denial of Service in the octokit/webhooks library - https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
                    fix available via `npm audit fix --force`
                    Will install iobroker.esphome@0.2.4, which is a breaking change
                    node_modules/octokit
                      autopy  >=1.0.0
                      Depends on vulnerable versions of octokit
                      node_modules/autopy
                        iobroker.esphome  >=0.3.0
                        Depends on vulnerable versions of autopy
                        node_modules/iobroker.esphome
                    
                    parsejson  *
                    Severity: high
                    Regular Expression Denial of Service in parsejson - https://github.com/advisories/GHSA-q75g-2496-mxpp
                    fix available via `npm audit fix --force`
                    Will install iobroker.cloud@4.0.10, which is a breaking change
                    node_modules/parsejson
                    
                    pathval  <1.1.1
                    Severity: high
                    Prototype pollution in pathval - https://github.com/advisories/GHSA-g6ww-v8xp-vmwg
                    fix available via `npm audit fix --force`
                    Will install iobroker.rflink@1.0.2, which is a breaking change
                    node_modules/jscs/node_modules/pathval
                    
                    put  *
                    Sensitive Data Exposure in put - https://github.com/advisories/GHSA-v6gv-fg46-h89j
                    No fix available
                    node_modules/put
                      binrpc  *
                      Depends on vulnerable versions of put
                      node_modules/binrpc
                        iobroker.hm-rpc  *
                        Depends on vulnerable versions of binrpc
                        node_modules/iobroker.hm-rpc
                    
                    qs  6.5.0 - 6.5.2
                    Severity: high
                    qs vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-hrpp-h998-j3pp
                    fix available via `npm audit fix`
                    node_modules/request/node_modules/qs
                    
                    
                    semver  <=5.7.1 || 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
                    Severity: moderate
                    semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
                    semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
                    semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
                    fix available via `npm audit fix --force`
                    Will install iobroker.jarvis@3.1.3, which is a breaking change
                    node_modules/harmonyhubws/node_modules/semver
                    node_modules/make-dir/node_modules/semver
                    node_modules/node-abi/node_modules/semver
                    node_modules/semver
                    
                    
                    ssh2  <1.4.0
                    Severity: high
                    OS Command Injection in ssh2 - https://github.com/advisories/GHSA-652h-xwhf-q4h6
                    No fix available
                    node_modules/iobroker.asuswrt/node_modules/ssh2
                      iobroker.asuswrt  *
                      Depends on vulnerable versions of ssh2
                      node_modules/iobroker.asuswrt
                    
                    tar  <6.2.1
                    Severity: moderate
                    Denial of service while parsing a tar file due to lack of folders count validation - https://github.com/advisories/GHSA-f5x3-32g6-xq36
                    fix available via `npm audit fix`
                    node_modules/tar
                    
                    tough-cookie  <4.1.3
                    Severity: moderate
                    tough-cookie Prototype Pollution vulnerability - https://github.com/advisories/GHSA-72xf-g2v4-qvf3
                    fix available via `npm audit fix --force`
                    Will install iobroker.samsung@0.2.9, which is a breaking change
                    node_modules/machinepack-http/node_modules/tough-cookie
                    node_modules/node-blink-security/node_modules/tough-cookie
                    node_modules/request-promise-native/node_modules/tough-cookie
                    node_modules/request-promise/node_modules/tough-cookie
                    node_modules/request/node_modules/tough-cookie
                    
                    underscore  1.3.2 - 1.12.0
                    Severity: critical
                    Arbitrary Code Execution in underscore - https://github.com/advisories/GHSA-cf4h-3jhx-xvhq
                    fix available via `npm audit fix --force`
                    Will install iobroker.zigbee2mqtt@0.2.0, which is a breaking change
                    node_modules/binary-search-tree/node_modules/underscore
                    node_modules/nedb/node_modules/underscore
                    node_modules/nomnom/node_modules/underscore
                      binary-search-tree  *
                      Depends on vulnerable versions of underscore
                      node_modules/binary-search-tree
                      nomnom  >=1.6.0
                      Depends on vulnerable versions of underscore
                      node_modules/nomnom
                    
                    validator  <13.7.0
                    Severity: moderate
                    Inefficient Regular Expression Complexity in validator.js - https://github.com/advisories/GHSA-qgmg-gppg-76g5
                    fix available via `npm audit fix`
                    node_modules/z-schema/node_modules/validator
                      z-schema  3.6.1 - 4.2.3 || 5.0.0
                      Depends on vulnerable versions of validator
                      node_modules/z-schema
                    
                    xml2js  <0.5.0
                    Severity: moderate
                    xml2js is vulnerable to prototype pollution - https://github.com/advisories/GHSA-776f-qx25-q3cc
                    fix available via `npm audit fix --force`
                    Will install iobroker.radar2@1.2.5, which is a breaking change
                    node_modules/xml2js
                    
                    142 vulnerabilities (11 low, 70 moderate, 41 high, 20 critical)
                    
                    To address issues that do not require attention, run:
                      npm audit fix
                    
                    To address all issues possible (including breaking changes), run:
                      npm audit fix --force
                    
                    Some issues need review, and may require choosing
                    a different dependency.
                    
                    Thomas BraunT Online
                    Thomas BraunT Online
                    Thomas Braun
                    Most Active
                    schrieb am zuletzt editiert von
                    #9

                    @muckel sagte in Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]:

                    Was soll ich tun?

                    Die Finger von npm audit fix lassen. Inbesondere von --force.

                    Linux-Werkzeugkasten:
                    https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                    NodeJS Fixer Skript:
                    https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                    iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                    M 1 Antwort Letzte Antwort
                    1
                    • Thomas BraunT Thomas Braun

                      @muckel sagte in Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]:

                      Was soll ich tun?

                      Die Finger von npm audit fix lassen. Inbesondere von --force.

                      M Offline
                      M Offline
                      muckel
                      schrieb am zuletzt editiert von
                      #10

                      @thomas-braun

                      Danke, hätte ich eh nicht gemacht. ;-)
                      Ich warte auf einen Fix, oder Workaround von den Profis.
                      lg. erich

                      1 Antwort Letzte Antwort
                      1
                      • M muckel

                        @mcm57 @apollon77
                        Heute im log entdeckt:

                        Nach npm audit kam folgender Vorschlag:
                        To address issues that do not require attention, run:
                        npm audit fix

                        To address all issues possible (including breaking changes), run:
                        npm audit fix --force

                        Some issues need review, and may require choosing
                        a different dependency.
                        Was soll ich tun?

                        2024-04-21 04:15:05.778 - error: javascript.0 (1981571) npm
                        2024-04-21 04:15:05.779 - error: javascript.0 (1981571) WARN deprecated har-validator@5.1.5: this library is no longer supported
                        2024-04-21 04:15:05.813 - error: javascript.0 (1981571) npm
                        2024-04-21 04:15:05.813 - error: javascript.0 (1981571) WARN deprecated node-inspect@2.0.0: This module is part of Node.js core and does not need to be installed separately. It is now unmaintained.
                        2024-04-21 04:15:05.842 - error: javascript.0 (1981571) npm
                        2024-04-21 04:15:05.843 - error: javascript.0 (1981571) WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.
                        2024-04-21 04:15:05.861 - error: javascript.0 (1981571) npm
                        2024-04-21 04:15:05.861 - error: javascript.0 (1981571) WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142
                        2024-04-21 04:15:07.405 - info: javascript.0 (1981571)
                        added 98 packages, and audited 103 packages in 4s
                        2024-04-21 04:15:07.406 - info: javascript.0 (1981571)
                        4 packages are looking for funding
                        run `npm fund` for details
                        2024-04-21 04:15:07.409 - info: javascript.0 (1981571)
                        2 moderate severity vulnerabilities
                        Some issues need review, and may require choosing
                        a different dependency.
                        Run `npm audit` for details.
                        
                        erich@smarthome:~$ cd /opt/iobroker
                        erich@smarthome:/opt/iobroker$ npm audit
                        [sudo] password for erich:
                        # npm audit report
                        
                        @octokit/webhooks  10.0.0 - 10.9.1
                        Severity: high
                        Unauthenticated Denial of Service in the octokit/webhooks library - https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
                        fix available via `npm audit fix`
                        node_modules/@octokit/webhooks
                        
                        ajv  <6.12.3
                        Severity: moderate
                        Prototype Pollution in Ajv - https://github.com/advisories/GHSA-v88g-cgmw-v5xw
                        fix available via `npm audit fix --force`
                        Will install iobroker.samsung@0.2.9, which is a breaking change
                        node_modules/node-blink-security/node_modules/ajv
                          har-validator  3.3.0 - 5.1.0
                          Depends on vulnerable versions of ajv
                          node_modules/node-blink-security/node_modules/har-validator
                            request  *
                            Depends on vulnerable versions of har-validator
                            Depends on vulnerable versions of hawk
                            Depends on vulnerable versions of tough-cookie
                            node_modules/machinepack-http/node_modules/request
                            node_modules/node-blink-security/node_modules/request
                            node_modules/request
                              dropbox-v2-api  *
                              Depends on vulnerable versions of request
                              node_modules/dropbox-v2-api
                                iobroker.backitup  >=0.3.0
                                Depends on vulnerable versions of dropbox-v2-api
                                node_modules/iobroker.backitup
                              harmonyhubws  *
                              Depends on vulnerable versions of request
                              Depends on vulnerable versions of request-promise-native
                              node_modules/harmonyhubws
                                iobroker.harmony  >=1.1.1
                                Depends on vulnerable versions of harmonyhubws
                                node_modules/iobroker.harmony
                              iobroker.deconz  >=0.2.0
                              Depends on vulnerable versions of request
                              node_modules/iobroker.deconz
                              iobroker.hue-extended  *
                              Depends on vulnerable versions of request
                              Depends on vulnerable versions of request-promise
                              node_modules/iobroker.hue-extended
                              iobroker.javascript  *
                              Depends on vulnerable versions of request
                              node_modules/iobroker.javascript
                              iobroker.mihome-vacuum  >=2.0.7
                              Depends on vulnerable versions of request
                              node_modules/iobroker.mihome-vacuum
                              iobroker.netatmo  0.5.0 - 0.5.1 || >=1.1.7
                              Depends on vulnerable versions of request
                              node_modules/iobroker.netatmo
                              iobroker.netatmo-crawler  *
                              Depends on vulnerable versions of request
                              node_modules/iobroker.netatmo-crawler
                              iobroker.nuki-extended  *
                              Depends on vulnerable versions of nuki-web-api
                              Depends on vulnerable versions of request
                              Depends on vulnerable versions of request-promise
                              node_modules/iobroker.nuki-extended
                              iobroker.rflink  >=1.0.3
                              Depends on vulnerable versions of avrgirl-arduino
                              Depends on vulnerable versions of request
                              node_modules/iobroker.rflink
                              iobroker.smartgarden  >=0.5.1
                              Depends on vulnerable versions of request
                              node_modules/iobroker.smartgarden
                              iobroker.whatsapp-cmb  *
                              Depends on vulnerable versions of request
                              node_modules/iobroker.whatsapp-cmb
                              le-acme-core  *
                              Depends on vulnerable versions of request
                              Depends on vulnerable versions of rsa-compat
                              node_modules/le-acme-core
                                iobroker.js-controller  >=1.5.4
                                Depends on vulnerable versions of @iobroker/db-objects-file
                                Depends on vulnerable versions of @iobroker/db-objects-jsonl
                                Depends on vulnerable versions of @iobroker/db-objects-redis
                                Depends on vulnerable versions of @iobroker/db-states-file
                                Depends on vulnerable versions of @iobroker/db-states-jsonl
                                Depends on vulnerable versions of @iobroker/db-states-redis
                                Depends on vulnerable versions of @iobroker/js-controller-adapter
                                Depends on vulnerable versions of @iobroker/js-controller-cli
                                Depends on vulnerable versions of @iobroker/js-controller-common
                                Depends on vulnerable versions of @iobroker/js-controller-common-db
                                Depends on vulnerable versions of le-acme-core
                                node_modules/iobroker.js-controller
                              machinepack-http  0.2.3 - 8.0.0
                              Depends on vulnerable versions of request
                              node_modules/machinepack-http
                                bagpipes  *
                                Depends on vulnerable versions of machinepack-http
                                node_modules/bagpipes
                              node-blink-security  *
                              Depends on vulnerable versions of request
                              node_modules/node-blink-security
                                iobroker.blink4home  *
                                Depends on vulnerable versions of node-blink-security
                                node_modules/iobroker.blink4home
                              node-gyp  <=7.1.2
                              Depends on vulnerable versions of request
                              node_modules/usocket/node_modules/node-gyp
                                usocket  0.2.2 - 0.3.0
                                Depends on vulnerable versions of node-gyp
                                node_modules/usocket
                                  dbus-next  *
                                  Depends on vulnerable versions of usocket
                                  Depends on vulnerable versions of xml2js
                                  node_modules/dbus-next
                                    node-ble  >=0.0.2
                                    Depends on vulnerable versions of dbus-next
                                    node_modules/node-ble
                                      iobroker.radar2  >=2.0.0
                                      Depends on vulnerable versions of node-ble
                                      node_modules/iobroker.radar2
                              nuki-web-api  *
                              Depends on vulnerable versions of request
                              Depends on vulnerable versions of request-promise
                              node_modules/nuki-web-api
                              request-promise  >=0.0.2
                              Depends on vulnerable versions of request
                              Depends on vulnerable versions of request-promise-core
                              Depends on vulnerable versions of tough-cookie
                              node_modules/request-promise
                                samsungtv
                                Depends on vulnerable versions of request
                                Depends on vulnerable versions of request-promise
                                node_modules/samsungtv
                                  iobroker.samsung  >=0.5.1
                                  Depends on vulnerable versions of samsungtv
                                  node_modules/iobroker.samsung
                              request-promise-core  *
                              Depends on vulnerable versions of request
                              node_modules/@cypress/request-promise/node_modules/request-promise-core
                              node_modules/request-promise-core
                                @cypress/request-promise  *
                                Depends on vulnerable versions of request-promise-core
                                node_modules/@cypress/request-promise
                                  node-telegram-bot-api  >=0.64.0
                                  Depends on vulnerable versions of @cypress/request-promise
                                  node_modules/node-telegram-bot-api
                                    iobroker.telegram  >=2.1.0
                                    Depends on vulnerable versions of node-telegram-bot-api
                                    node_modules/iobroker.telegram
                                request-promise-native  >=1.0.0
                                Depends on vulnerable versions of request
                                Depends on vulnerable versions of request-promise-core
                                Depends on vulnerable versions of tough-cookie
                                node_modules/request-promise-native
                              smartmeter-obis  *
                              Depends on vulnerable versions of request
                              node_modules/smartmeter-obis
                                iobroker.smartmeter  *
                                Depends on vulnerable versions of smartmeter-obis
                                node_modules/iobroker.smartmeter
                              syno  *
                              Depends on vulnerable versions of nconf
                              Depends on vulnerable versions of request
                              node_modules/syno
                                iobroker.synology  *
                                Depends on vulnerable versions of syno
                                node_modules/iobroker.synology
                        
                        axios  <=0.27.2 || 1.0.0 - 1.5.1
                        Severity: high
                        Axios vulnerable to Server-Side Request Forgery - https://github.com/advisories/GHSA-4w2v-q235-vp99
                        axios Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-cph5-m8f7-6c5x
                        Axios Cross-Site Request Forgery Vulnerability - https://github.com/advisories/GHSA-wf5p-g6vw-rhxx
                        Axios Cross-Site Request Forgery Vulnerability - https://github.com/advisories/GHSA-wf5p-g6vw-rhxx
                        Depends on vulnerable versions of follow-redirects
                        fix available via `npm audit fix --force`
                        Will install iobroker.hue@0.6.0, which is a breaking change
                        node_modules/@alcalzone/pak/node_modules/axios
                        node_modules/iobroker.awattar/node_modules/axios
                        node_modules/iobroker.broadlink2/node_modules/axios
                        node_modules/iobroker.withings/node_modules/axios
                        node_modules/node-hue-api/node_modules/axios
                        node_modules/node-ical/node_modules/axios
                          @alcalzone/pak  0.3.0 - 0.10.0
                          Depends on vulnerable versions of axios
                          node_modules/@alcalzone/pak
                            @iobroker/js-controller-adapter  *
                            Depends on vulnerable versions of @alcalzone/pak
                            Depends on vulnerable versions of @iobroker/db-objects-file
                            Depends on vulnerable versions of @iobroker/db-objects-jsonl
                            Depends on vulnerable versions of @iobroker/db-objects-redis
                            Depends on vulnerable versions of @iobroker/db-states-file
                            Depends on vulnerable versions of @iobroker/db-states-jsonl
                            Depends on vulnerable versions of @iobroker/db-states-redis
                            Depends on vulnerable versions of @iobroker/js-controller-common
                            Depends on vulnerable versions of @iobroker/js-controller-common-db
                            node_modules/@iobroker/js-controller-adapter
                            @iobroker/js-controller-common  *
                            Depends on vulnerable versions of @alcalzone/pak
                            node_modules/@iobroker/js-controller-common
                              @iobroker/db-base  >=4.0.0-alpha.1-20210830-d9828cd3
                              Depends on vulnerable versions of @iobroker/js-controller-common
                              node_modules/@iobroker/db-base
                                @iobroker/db-objects-file  >=4.0.0-alpha.1-20210830-d9828cd3
                                Depends on vulnerable versions of @iobroker/db-base
                                Depends on vulnerable versions of @iobroker/db-objects-redis
                                node_modules/@iobroker/db-objects-file
                                @iobroker/db-objects-jsonl  >=4.0.0-alpha.1-20210830-d9828cd3
                                Depends on vulnerable versions of @iobroker/db-base
                                Depends on vulnerable versions of @iobroker/db-objects-file
                                Depends on vulnerable versions of @iobroker/db-objects-redis
                                node_modules/@iobroker/db-objects-jsonl
                                @iobroker/db-objects-redis  >=4.0.0-alpha.1-20210830-d9828cd3
                                Depends on vulnerable versions of @iobroker/db-base
                                node_modules/@iobroker/db-objects-redis
                                @iobroker/db-states-file  >=4.0.0-alpha.1-20210830-d9828cd3
                                Depends on vulnerable versions of @iobroker/db-base
                                Depends on vulnerable versions of @iobroker/db-states-redis
                                node_modules/@iobroker/db-states-file
                                @iobroker/db-states-jsonl  >=4.0.0-alpha.1-20210830-d9828cd3
                                Depends on vulnerable versions of @iobroker/db-base
                                Depends on vulnerable versions of @iobroker/db-states-file
                                Depends on vulnerable versions of @iobroker/db-states-redis
                                node_modules/@iobroker/db-states-jsonl
                                @iobroker/db-states-redis  >=4.0.0-alpha.1-20210830-d9828cd3
                                Depends on vulnerable versions of @iobroker/db-base
                                node_modules/@iobroker/db-states-redis
                              @iobroker/js-controller-cli  *
                              Depends on vulnerable versions of @iobroker/js-controller-common
                              Depends on vulnerable versions of @iobroker/js-controller-common-db
                              node_modules/@iobroker/js-controller-cli
                              @iobroker/js-controller-common-db  *
                              Depends on vulnerable versions of @iobroker/db-objects-file
                              Depends on vulnerable versions of @iobroker/db-objects-jsonl
                              Depends on vulnerable versions of @iobroker/db-objects-redis
                              Depends on vulnerable versions of @iobroker/db-states-file
                              Depends on vulnerable versions of @iobroker/db-states-jsonl
                              Depends on vulnerable versions of @iobroker/db-states-redis
                              Depends on vulnerable versions of @iobroker/js-controller-common
                              node_modules/@iobroker/js-controller-common-db
                          iobroker.awattar  >=1.0.6
                          Depends on vulnerable versions of axios
                          node_modules/iobroker.awattar
                          iobroker.broadlink2  >=2.1.0
                          Depends on vulnerable versions of axios
                          node_modules/iobroker.broadlink2
                          iobroker.withings  *
                          Depends on vulnerable versions of axios
                          node_modules/iobroker.withings
                          node-hue-api  2.0.0-RC1 - 5.0.0-alpha.2
                          Depends on vulnerable versions of axios
                          node_modules/node-hue-api
                            iobroker.hue  >=0.6.2
                            Depends on vulnerable versions of node-hue-api
                            node_modules/iobroker.hue
                          node-ical  0.15.3 - 0.16.1
                          Depends on vulnerable versions of axios
                          node_modules/node-ical
                            iobroker.jarvis  >=3.1.3
                            Depends on vulnerable versions of node-ical
                            Depends on vulnerable versions of semver
                            node_modules/iobroker.jarvis
                        
                        cookiejar  <2.1.4
                        Severity: moderate
                        cookiejar Regular Expression Denial of Service via Cookie.parse function - https://github.com/advisories/GHSA-h452-7996-h45h
                        fix available via `npm audit fix`
                        node_modules/cookiejar
                        
                        cryptiles  *
                        Severity: critical
                        Insufficient Entropy in cryptiles - https://github.com/advisories/GHSA-rq8g-5pc5-wrhr
                        Depends on vulnerable versions of boom
                        fix available via `npm audit fix`
                        node_modules/cryptiles
                        
                        debug  <=2.6.8 || 4.0.0 - 4.3.0
                        Severity: high
                        debug Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-9vvw-cc9w-f27h
                        Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                        Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                        Depends on vulnerable versions of ms
                        fix available via `npm audit fix --force`
                        Will install iobroker.cloud@4.0.10, which is a breaking change
                        node_modules/engine.io-client/node_modules/debug
                        node_modules/iobroker.socketio/node_modules/debug
                        node_modules/mdns-discovery/node_modules/debug
                        node_modules/socket.io-client/node_modules/debug
                        node_modules/socket.io-client/node_modules/socket.io-parser/node_modules/debug
                          engine.io  3.4.0 - 4.0.5
                          Depends on vulnerable versions of debug
                          node_modules/iobroker.socketio/node_modules/engine.io
                            socket.io  2.2.0 - 3.0.4
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of engine.io
                            Depends on vulnerable versions of socket.io-parser
                            node_modules/iobroker.socketio/node_modules/socket.io
                              iobroker.socketio  3.0.0 - 3.0.13 || 3.1.3 - 3.1.5 || 4.1.0 - 5.0.2 || 6.1.0 - 6.5.7 || >=6.6.0
                              Depends on vulnerable versions of socket.io
                              node_modules/iobroker.socketio
                                iobroker.web  4.2.1 - 4.3.0 || >=5.2.3
                                Depends on vulnerable versions of iobroker.socketio
                                node_modules/iobroker.web
                          engine.io-client  <=3.1.1
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of parsejson
                          node_modules/engine.io-client
                            socket.io-client  1.0.0-pre - 2.1.1
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of engine.io-client
                            Depends on vulnerable versions of socket.io-parser
                            node_modules/socket.io-client
                              iobroker.cloud  <=2.4.6 || 2.8.0 - 3.0.2 || >=4.0.11
                              Depends on vulnerable versions of socket.io-client
                              node_modules/iobroker.cloud
                          mdns-discovery  >=0.1.1
                          Depends on vulnerable versions of debug
                          node_modules/mdns-discovery
                            iobroker.discovery  >=0.4.4
                            Depends on vulnerable versions of mdns-discovery
                            node_modules/iobroker.discovery
                            iobroker.firetv  >=0.0.3
                            Depends on vulnerable versions of adbkit
                            Depends on vulnerable versions of mdns-discovery
                            node_modules/iobroker.firetv
                            iobroker.mydlink  >=1.0.0
                            Depends on vulnerable versions of mdns-discovery
                            node_modules/iobroker.mydlink
                          socket.io-parser  <=3.3.2 || 3.4.0 - 4.0.2
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of debug
                          node_modules/iobroker.socketio/node_modules/socket.io-parser
                          node_modules/socket.io-client/node_modules/socket.io-parser
                        
                        deep-extend  <0.5.1
                        Severity: critical
                        Prototype Pollution in deep-extend - https://github.com/advisories/GHSA-hr2v-3952-633q
                        fix available via `npm audit fix`
                        node_modules/deref/node_modules/deep-extend
                          deref  0.6.0 - 0.7.2
                          Depends on vulnerable versions of deep-extend
                          node_modules/deref
                            json-schema-faker  0.2.2 - 0.4.4
                            Depends on vulnerable versions of deref
                            node_modules/json-schema-faker
                              sway  *
                              Depends on vulnerable versions of json-schema-faker
                              Depends on vulnerable versions of z-schema
                              node_modules/sway
                        
                        dicer  *
                        Severity: high
                        Crash in HeaderParser in dicer - https://github.com/advisories/GHSA-wm7h-9275-46v2
                        No fix available
                        node_modules/dicer
                          busboy  <=0.3.1
                          Depends on vulnerable versions of dicer
                          node_modules/multer/node_modules/busboy
                            multer  <=2.0.0-rc.3
                            Depends on vulnerable versions of busboy
                            node_modules/multer
                              swagger-node-runner-fork  *
                              Depends on vulnerable versions of bagpipes
                              Depends on vulnerable versions of multer
                              Depends on vulnerable versions of sway
                              node_modules/swagger-node-runner-fork
                                iobroker.rest-api  *
                                Depends on vulnerable versions of swagger-node-runner-fork
                                node_modules/iobroker.rest-api
                        
                        follow-redirects  <=1.15.5
                        Severity: high
                        Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects - https://github.com/advisories/GHSA-pw2r-vq6v-hr8c
                        Exposure of sensitive information in follow-redirects - https://github.com/advisories/GHSA-74fj-2j2h-c42q
                        Follow Redirects improperly handles URLs in the url.parse() function - https://github.com/advisories/GHSA-jchw-25xp-jwwc
                        follow-redirects' Proxy-Authorization header kept across hosts - https://github.com/advisories/GHSA-cxjh-pqwp-8mfp
                        fix available via `npm audit fix --force`
                        Will install iobroker.hue@0.6.0, which is a breaking change
                        node_modules/iobroker.broadlink2/node_modules/follow-redirects
                        
                        get-func-name  <2.0.1
                        Severity: high
                        Chaijs/get-func-name vulnerable to ReDoS - https://github.com/advisories/GHSA-4q6p-r6v2-jvc5
                        fix available via `npm audit fix`
                        node_modules/get-func-name
                        
                        hawk  <=9.0.0
                        Severity: high
                        Uncontrolled Resource Consumption in Hawk - https://github.com/advisories/GHSA-44pw-h2cw-w3vq
                        Depends on vulnerable versions of boom
                        Depends on vulnerable versions of hoek
                        Depends on vulnerable versions of sntp
                        fix available via `npm audit fix --force`
                        Will install iobroker.samsung@0.2.9, which is a breaking change
                        node_modules/hawk
                        
                        hoek  *
                        Severity: high
                        hoek subject to prototype pollution via the clone function. - https://github.com/advisories/GHSA-c429-5p7v-vgjp
                        fix available via `npm audit fix --force`
                        Will install iobroker.samsung@0.2.9, which is a breaking change
                        node_modules/boom/node_modules/hoek
                        node_modules/cryptiles/node_modules/hoek
                        node_modules/hawk/node_modules/hoek
                        node_modules/hoek
                        node_modules/sntp/node_modules/hoek
                          boom  *
                          Depends on vulnerable versions of hoek
                          node_modules/boom
                          node_modules/cryptiles/node_modules/boom
                          joi  0.0.2 - 14.3.1
                          Depends on vulnerable versions of hoek
                          Depends on vulnerable versions of topo
                          node_modules/joi
                            iobroker.yeelight-2  >=1.0.0
                            Depends on vulnerable versions of joi
                            node_modules/iobroker.yeelight-2
                          sntp  0.0.0 || >=0.1.1
                          Depends on vulnerable versions of hoek
                          node_modules/sntp
                          topo  *
                          Depends on vulnerable versions of hoek
                          node_modules/topo
                        
                        ip  <1.1.9 || =2.0.0
                        Severity: moderate
                        NPM IP package incorrectly identifies some private IP addresses as public - https://github.com/advisories/GHSA-78xj-cgh5-2h22
                        NPM IP package incorrectly identifies some private IP addresses as public - https://github.com/advisories/GHSA-78xj-cgh5-2h22
                        fix available via `npm audit fix`
                        node_modules/iobroker.nuki-extended/node_modules/ip
                        node_modules/ip
                        
                        js-yaml  <=3.13.0
                        Severity: high
                        Denial of Service in js-yaml - https://github.com/advisories/GHSA-2pr6-76vf-7546
                        Code Injection in js-yaml - https://github.com/advisories/GHSA-8j8c-7jfh-h6hx
                        fix available via `npm audit fix --force`
                        Will install iobroker.rflink@1.0.2, which is a breaking change
                        node_modules/jscs/node_modules/js-yaml
                          jscs  >=1.11.2
                          Depends on vulnerable versions of js-yaml
                          Depends on vulnerable versions of jscs-jsdoc
                          Depends on vulnerable versions of lodash
                          Depends on vulnerable versions of pathval
                          Depends on vulnerable versions of xmlbuilder
                          node_modules/jscs
                            jscs-loader  *
                            Depends on vulnerable versions of jscs
                            Depends on vulnerable versions of loader-utils
                            node_modules/jscs-loader
                              avrgirl-arduino  4.0.1 - 5.0.0
                              Depends on vulnerable versions of jscs-loader
                              node_modules/avrgirl-arduino
                        
                        json5  <1.0.2
                        Severity: high
                        Prototype Pollution in JSON5 via Parse Method - https://github.com/advisories/GHSA-9c47-m6qq-7p4h
                        fix available via `npm audit fix --force`
                        Will install iobroker.rflink@1.0.2, which is a breaking change
                        node_modules/json5
                        node_modules/loader-utils/node_modules/json5
                          loader-utils  <=1.4.0
                          Depends on vulnerable versions of json5
                          node_modules/loader-utils
                        
                        
                        lodash  <=4.17.20
                        Severity: critical
                        Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-x5rq-j2xg-h7qm
                        Prototype Pollution in lodash - https://github.com/advisories/GHSA-fvqr-27wr-82fm
                        Prototype Pollution in lodash - https://github.com/advisories/GHSA-jf85-cpcp-j695
                        Prototype Pollution in lodash - https://github.com/advisories/GHSA-4xc9-xhrj-v574
                        Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-29mw-wpgm-hmr9
                        Prototype Pollution in lodash - https://github.com/advisories/GHSA-p6mc-m468-83gw
                        Command Injection in lodash - https://github.com/advisories/GHSA-35jh-r3h4-6jhm
                        fix available via `npm audit fix --force`
                        Will install iobroker.rflink@1.0.2, which is a breaking change
                        node_modules/jscs/node_modules/lodash
                        node_modules/jsdoctypeparser/node_modules/lodash
                          jsdoctypeparser  1.2.0 - 2.0.0-alpha-5
                          Depends on vulnerable versions of lodash
                          node_modules/jsdoctypeparser
                            jscs-jsdoc  >=1.1.0
                            Depends on vulnerable versions of jsdoctypeparser
                            node_modules/jscs-jsdoc
                          xmlbuilder  2.5.0 - 4.2.0
                          Depends on vulnerable versions of lodash
                          node_modules/jscs/node_modules/xmlbuilder
                        
                        minimatch  <3.0.5
                        Severity: high
                        minimatch ReDoS vulnerability - https://github.com/advisories/GHSA-f8q6-p94x-37v3
                        fix available via `npm audit fix`
                        node_modules/minimatch
                        
                        minimist  <=0.2.3
                        Severity: critical
                        Prototype Pollution in minimist - https://github.com/advisories/GHSA-vh95-rmgr-6w4m
                        Prototype Pollution in minimist - https://github.com/advisories/GHSA-xvch-5gv4-984h
                        fix available via `npm audit fix --force`
                        Will install iobroker@2.0.3, which is a breaking change
                        node_modules/optimist/node_modules/minimist
                        node_modules/syno/node_modules/minimist
                          optimist  >=0.6.0
                          Depends on vulnerable versions of minimist
                          node_modules/optimist
                            node-windows  0.1.5 - 1.0.0-beta.6
                            Depends on vulnerable versions of optimist
                            node_modules/node-windows
                              iobroker  >=4.0.2
                              Depends on vulnerable versions of node-windows
                              node_modules/iobroker
                        
                        ms  <2.0.0
                        Severity: moderate
                        Vercel ms Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-w9mr-4mfr-499f
                        fix available via `npm audit fix --force`
                        Will install iobroker.cloud@4.0.10, which is a breaking change
                        node_modules/engine.io-client/node_modules/ms
                        node_modules/mdns-discovery/node_modules/ms
                        node_modules/socket.io-client/node_modules/ms
                        node_modules/socket.io-client/node_modules/socket.io-parser/node_modules/ms
                        
                        nconf  <0.11.4
                        Severity: high
                        Prototype Pollution in nconf - https://github.com/advisories/GHSA-6xwr-q98w-rvg7
                        No fix available
                        node_modules/nconf
                        
                        nedb  *
                        Severity: critical
                        Prototype Pollution in nedb - https://github.com/advisories/GHSA-339j-hqgx-qrrx
                        Depends on vulnerable versions of binary-search-tree
                        Depends on vulnerable versions of underscore
                        fix available via `npm audit fix --force`
                        Will install iobroker.zigbee2mqtt@0.2.0, which is a breaking change
                        node_modules/nedb
                          aedes-persistence-nedb  *
                          Depends on vulnerable versions of nedb
                          node_modules/aedes-persistence-nedb
                            iobroker.zigbee2mqtt  >=1.0.0
                            Depends on vulnerable versions of aedes-persistence-nedb
                            node_modules/iobroker.zigbee2mqtt
                        
                        node-forge  <=1.2.1
                        Severity: high
                        Prototype Pollution in node-forge debug API. - https://github.com/advisories/GHSA-5rrq-pxf6-6jx5
                        Prototype Pollution in node-forge util.setPath API - https://github.com/advisories/GHSA-wxgw-qj99-44c2
                        URL parsing in node-forge could lead to undesired behavior. - https://github.com/advisories/GHSA-gf8q-jrpm-jvxq
                        Improper Verification of Cryptographic Signature in `node-forge` - https://github.com/advisories/GHSA-2r2c-g63r-vccr
                        Open Redirect in node-forge - https://github.com/advisories/GHSA-8fr3-hfg3-gpgp
                        Prototype Pollution in node-forge - https://github.com/advisories/GHSA-92xj-mqp7-vmcj
                        Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-cfm4-qjh2-4765
                        Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-x4jg-mjrx-434g
                        fix available via `npm audit fix --force`
                        Will install iobroker.tuya@2.0.4, which is a breaking change
                        node_modules/adbkit/node_modules/node-forge
                        node_modules/http-mitm-proxy/node_modules/node-forge
                        node_modules/rsa-compat/node_modules/node-forge
                          adbkit  >=2.1.0
                          Depends on vulnerable versions of node-forge
                          node_modules/adbkit
                          http-mitm-proxy  <=0.9.0
                          Depends on vulnerable versions of node-forge
                          node_modules/http-mitm-proxy
                            iobroker.tuya  >=3.0.0
                            Depends on vulnerable versions of http-mitm-proxy
                            node_modules/iobroker.tuya
                          rsa-compat  <=1.9.4
                          Depends on vulnerable versions of node-forge
                          node_modules/rsa-compat
                        
                        nodemailer  <=6.9.8
                        Severity: moderate
                        nodemailer ReDoS when trying to send a specially crafted email - https://github.com/advisories/GHSA-9h6g-pr28-7cqp
                        fix available via `npm audit fix`
                        node_modules/nodemailer
                        
                        octokit  <3.1.2
                        Severity: high
                        Unauthenticated Denial of Service in the octokit/webhooks library - https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
                        fix available via `npm audit fix --force`
                        Will install iobroker.esphome@0.2.4, which is a breaking change
                        node_modules/octokit
                          autopy  >=1.0.0
                          Depends on vulnerable versions of octokit
                          node_modules/autopy
                            iobroker.esphome  >=0.3.0
                            Depends on vulnerable versions of autopy
                            node_modules/iobroker.esphome
                        
                        parsejson  *
                        Severity: high
                        Regular Expression Denial of Service in parsejson - https://github.com/advisories/GHSA-q75g-2496-mxpp
                        fix available via `npm audit fix --force`
                        Will install iobroker.cloud@4.0.10, which is a breaking change
                        node_modules/parsejson
                        
                        pathval  <1.1.1
                        Severity: high
                        Prototype pollution in pathval - https://github.com/advisories/GHSA-g6ww-v8xp-vmwg
                        fix available via `npm audit fix --force`
                        Will install iobroker.rflink@1.0.2, which is a breaking change
                        node_modules/jscs/node_modules/pathval
                        
                        put  *
                        Sensitive Data Exposure in put - https://github.com/advisories/GHSA-v6gv-fg46-h89j
                        No fix available
                        node_modules/put
                          binrpc  *
                          Depends on vulnerable versions of put
                          node_modules/binrpc
                            iobroker.hm-rpc  *
                            Depends on vulnerable versions of binrpc
                            node_modules/iobroker.hm-rpc
                        
                        qs  6.5.0 - 6.5.2
                        Severity: high
                        qs vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-hrpp-h998-j3pp
                        fix available via `npm audit fix`
                        node_modules/request/node_modules/qs
                        
                        
                        semver  <=5.7.1 || 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
                        Severity: moderate
                        semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
                        semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
                        semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
                        fix available via `npm audit fix --force`
                        Will install iobroker.jarvis@3.1.3, which is a breaking change
                        node_modules/harmonyhubws/node_modules/semver
                        node_modules/make-dir/node_modules/semver
                        node_modules/node-abi/node_modules/semver
                        node_modules/semver
                        
                        
                        ssh2  <1.4.0
                        Severity: high
                        OS Command Injection in ssh2 - https://github.com/advisories/GHSA-652h-xwhf-q4h6
                        No fix available
                        node_modules/iobroker.asuswrt/node_modules/ssh2
                          iobroker.asuswrt  *
                          Depends on vulnerable versions of ssh2
                          node_modules/iobroker.asuswrt
                        
                        tar  <6.2.1
                        Severity: moderate
                        Denial of service while parsing a tar file due to lack of folders count validation - https://github.com/advisories/GHSA-f5x3-32g6-xq36
                        fix available via `npm audit fix`
                        node_modules/tar
                        
                        tough-cookie  <4.1.3
                        Severity: moderate
                        tough-cookie Prototype Pollution vulnerability - https://github.com/advisories/GHSA-72xf-g2v4-qvf3
                        fix available via `npm audit fix --force`
                        Will install iobroker.samsung@0.2.9, which is a breaking change
                        node_modules/machinepack-http/node_modules/tough-cookie
                        node_modules/node-blink-security/node_modules/tough-cookie
                        node_modules/request-promise-native/node_modules/tough-cookie
                        node_modules/request-promise/node_modules/tough-cookie
                        node_modules/request/node_modules/tough-cookie
                        
                        underscore  1.3.2 - 1.12.0
                        Severity: critical
                        Arbitrary Code Execution in underscore - https://github.com/advisories/GHSA-cf4h-3jhx-xvhq
                        fix available via `npm audit fix --force`
                        Will install iobroker.zigbee2mqtt@0.2.0, which is a breaking change
                        node_modules/binary-search-tree/node_modules/underscore
                        node_modules/nedb/node_modules/underscore
                        node_modules/nomnom/node_modules/underscore
                          binary-search-tree  *
                          Depends on vulnerable versions of underscore
                          node_modules/binary-search-tree
                          nomnom  >=1.6.0
                          Depends on vulnerable versions of underscore
                          node_modules/nomnom
                        
                        validator  <13.7.0
                        Severity: moderate
                        Inefficient Regular Expression Complexity in validator.js - https://github.com/advisories/GHSA-qgmg-gppg-76g5
                        fix available via `npm audit fix`
                        node_modules/z-schema/node_modules/validator
                          z-schema  3.6.1 - 4.2.3 || 5.0.0
                          Depends on vulnerable versions of validator
                          node_modules/z-schema
                        
                        xml2js  <0.5.0
                        Severity: moderate
                        xml2js is vulnerable to prototype pollution - https://github.com/advisories/GHSA-776f-qx25-q3cc
                        fix available via `npm audit fix --force`
                        Will install iobroker.radar2@1.2.5, which is a breaking change
                        node_modules/xml2js
                        
                        142 vulnerabilities (11 low, 70 moderate, 41 high, 20 critical)
                        
                        To address issues that do not require attention, run:
                          npm audit fix
                        
                        To address all issues possible (including breaking changes), run:
                          npm audit fix --force
                        
                        Some issues need review, and may require choosing
                        a different dependency.
                        
                        apollon77A Offline
                        apollon77A Offline
                        apollon77
                        schrieb am zuletzt editiert von
                        #11

                        @muckel Da ist nichts drin was eine Aktion erfordert ... deprecation warnings .. ignorieren aktuell

                        Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

                        • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
                        • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
                        1 Antwort Letzte Antwort
                        0
                        • mcm1957M mcm1957

                          @muckel said in Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]:

                          @apollon77

                          Ich habe in meinem Thread gelesen, dass es durch meinen Fehler doch zu Problemen kommen kann.
                          Siehe:
                          https://forum.iobroker.net/topic/74232/gelöst-nach-update-des-admin-adapters-kein-webzugriff-mehr/20
                          Gibt es da einen Workaround?

                          @apollon77
                          Geht drum dass muckel ein npm i @iobroker/adapter-core auf der obersten Ebene gestartet hat. Damit läuft admin zwar, aber ein explizites Install ist ja nicht "gut". Kannst du sagen ob bzw. wie das zu fixen wäre?
                          https://forum.iobroker.net/topic/74232/gelöst-nach-update-des-admin-adapters-kein-webzugriff-mehr/11

                          apollon77A Offline
                          apollon77A Offline
                          apollon77
                          schrieb am zuletzt editiert von
                          #12

                          @mcm57 Lass es erstmal so ... wenn es irgendwann mal Probleme macht kann man es dann fixen ... aber vllt ists auch ok

                          Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

                          • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
                          • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
                          M 1 Antwort Letzte Antwort
                          0
                          • apollon77A apollon77

                            @mcm57 Lass es erstmal so ... wenn es irgendwann mal Probleme macht kann man es dann fixen ... aber vllt ists auch ok

                            M Offline
                            M Offline
                            muckel
                            schrieb am zuletzt editiert von
                            #13

                            @apollon77
                            Danke für die Info.
                            Dann lass ich es erst mal so.

                            manuxiM 1 Antwort Letzte Antwort
                            0
                            • M muckel

                              @apollon77
                              Danke für die Info.
                              Dann lass ich es erst mal so.

                              manuxiM Offline
                              manuxiM Offline
                              manuxi
                              schrieb am zuletzt editiert von
                              #14

                              Hallo zusammen, wollte letzte Woche bereits etwas dazu schreiben, aber da es nach dem Fix (erneut) klappte, hab ich die Idee verworfen.
                              Jetzt habe ich das Problem allerdings wieder. Aber von vorne:
                              Ich nutze ioBroker auf meiner Synology in der v9-latest.
                              Anscheinend habe ich im besagten Zeitraum den spotify-premium & telegram-Adapter geupdated, die versagten dann mit 'ERR_INVALID_ARG_VALUE' den Dienst. Dieses Topic war schnell ausfindig gemacht und über die obige Anleitung habe ich die Fixes eingespielt, kontrolliert und alles schien ok zu sein.
                              Letzte Woche ganbs ein Update der Syno, nach Reboot (der Syno und damit des Containers) standen beide Adapter wieder auf 3.12. Also das Ganze nochmal.
                              Ich habe jeweils den ioBroker mit "iob maintenance on" beendet, hab unter /opt/iobroker "npm list @iobroker/adapter-core" aufgerufen, bin in die Adapter-Verzeichnisse gewechselt und habe dort "npm i @iobroker/adapter-core@3.1.4". Aufgerufen.
                              Test mit "npm list @iobroker/adapter-core" sah gut aus (jeweils die 3.14 drauf). Danach den IOB mit "iob maintenance on" wieder gestartet. Ein weiteres "npm list @iobroker/adapter-core" zeigt mir aber jetzt

                              ├─┬ iobroker.spotify-premium@1.4.0
                              │ └── @iobroker/adapter-core@3.1.2 invalid: "^3.1.4" from node_modules/iobroker.spotify-premium
                              

                              bzw.

                              iobroker.telegram@3.2.1
                              │ └── @iobroker/adapter-core@3.1.2 invalid: "^3.1.4" from node_modules/iobroker.telegram
                              

                              2a2a7327-ea1e-450b-b2e2-8e954623d2c6-image.png

                              Die Ausgabe nach "npm i @iobroker/adapter-core@3.14" (bei telegram):

                              npm i @iobroker/adapter-core@3.1.4
                              sudo: unable to resolve host iobroker-v9-prod: Name or service not known
                              npm WARN deprecated urix@0.1.0: Please see https://github.com/lydell/urix#deprecated
                              npm WARN deprecated har-validator@5.1.5: this library is no longer supported
                              npm WARN deprecated source-map-url@0.4.1: See https://github.com/lydell/source-map-url#deprecated
                              npm WARN deprecated resolve-url@0.2.1: https://github.com/lydell/resolve-url#deprecated
                              npm WARN deprecated source-map-resolve@0.5.3: See https://github.com/lydell/source-map-resolve#deprecated
                              npm WARN deprecated uuid@3.4.0: Please upgrade  to version 7 or higher.  Older versions may use Math.random() in certain circumstances, which is known to be problematic.  See https://v8.dev/blog/math-random for details.
                              npm WARN deprecated chokidar@2.1.8: Chokidar 2 does not receive security updates since 2019. Upgrade to chokidar 3 with 15x fewer dependencies
                              npm WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142
                              npm WARN deprecated sinon@15.2.0: 16.1.1
                              
                              added 813 packages, changed 1 package, and audited 816 packages in 30s
                              
                              116 packages are looking for funding
                                run `npm fund` for details
                              

                              Woran könnte das liegen? Berechtigungen? Bin im Docker allerdings als root angemeldet...
                              Was könnte ich noch versuchen?

                              mcm1957M 1 Antwort Letzte Antwort
                              0
                              • manuxiM manuxi

                                Hallo zusammen, wollte letzte Woche bereits etwas dazu schreiben, aber da es nach dem Fix (erneut) klappte, hab ich die Idee verworfen.
                                Jetzt habe ich das Problem allerdings wieder. Aber von vorne:
                                Ich nutze ioBroker auf meiner Synology in der v9-latest.
                                Anscheinend habe ich im besagten Zeitraum den spotify-premium & telegram-Adapter geupdated, die versagten dann mit 'ERR_INVALID_ARG_VALUE' den Dienst. Dieses Topic war schnell ausfindig gemacht und über die obige Anleitung habe ich die Fixes eingespielt, kontrolliert und alles schien ok zu sein.
                                Letzte Woche ganbs ein Update der Syno, nach Reboot (der Syno und damit des Containers) standen beide Adapter wieder auf 3.12. Also das Ganze nochmal.
                                Ich habe jeweils den ioBroker mit "iob maintenance on" beendet, hab unter /opt/iobroker "npm list @iobroker/adapter-core" aufgerufen, bin in die Adapter-Verzeichnisse gewechselt und habe dort "npm i @iobroker/adapter-core@3.1.4". Aufgerufen.
                                Test mit "npm list @iobroker/adapter-core" sah gut aus (jeweils die 3.14 drauf). Danach den IOB mit "iob maintenance on" wieder gestartet. Ein weiteres "npm list @iobroker/adapter-core" zeigt mir aber jetzt

                                ├─┬ iobroker.spotify-premium@1.4.0
                                │ └── @iobroker/adapter-core@3.1.2 invalid: "^3.1.4" from node_modules/iobroker.spotify-premium
                                

                                bzw.

                                iobroker.telegram@3.2.1
                                │ └── @iobroker/adapter-core@3.1.2 invalid: "^3.1.4" from node_modules/iobroker.telegram
                                

                                2a2a7327-ea1e-450b-b2e2-8e954623d2c6-image.png

                                Die Ausgabe nach "npm i @iobroker/adapter-core@3.14" (bei telegram):

                                npm i @iobroker/adapter-core@3.1.4
                                sudo: unable to resolve host iobroker-v9-prod: Name or service not known
                                npm WARN deprecated urix@0.1.0: Please see https://github.com/lydell/urix#deprecated
                                npm WARN deprecated har-validator@5.1.5: this library is no longer supported
                                npm WARN deprecated source-map-url@0.4.1: See https://github.com/lydell/source-map-url#deprecated
                                npm WARN deprecated resolve-url@0.2.1: https://github.com/lydell/resolve-url#deprecated
                                npm WARN deprecated source-map-resolve@0.5.3: See https://github.com/lydell/source-map-resolve#deprecated
                                npm WARN deprecated uuid@3.4.0: Please upgrade  to version 7 or higher.  Older versions may use Math.random() in certain circumstances, which is known to be problematic.  See https://v8.dev/blog/math-random for details.
                                npm WARN deprecated chokidar@2.1.8: Chokidar 2 does not receive security updates since 2019. Upgrade to chokidar 3 with 15x fewer dependencies
                                npm WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142
                                npm WARN deprecated sinon@15.2.0: 16.1.1
                                
                                added 813 packages, changed 1 package, and audited 816 packages in 30s
                                
                                116 packages are looking for funding
                                  run `npm fund` for details
                                

                                Woran könnte das liegen? Berechtigungen? Bin im Docker allerdings als root angemeldet...
                                Was könnte ich noch versuchen?

                                mcm1957M Online
                                mcm1957M Online
                                mcm1957
                                schrieb am zuletzt editiert von
                                #15

                                @manuxi
                                Versuch mal iob fix

                                Da du mit sudo / root unterwegs bist bzw warst (und es dankenswerter Weise gleich sagts - was ev. unnötiges Suchen minimiert - kann es sein, dass die Fileprotections nicht passen. @Thomas-Braun kann da ev. besser helfen - allerdings betet er gefühlter Maßen 24h Tag 'Oh Herr, halt die User von root fern'.

                                Entwicklung u Betreuung: envertech-pv, hoymiles-ms, ns-client, pid, snmp Adapter;
                                Support Repositoryverwaltung.

                                Wer Danke sagen will, kann nen Kaffee spendieren: https://paypal.me/mcm1957atiobroker

                                LESEN - gute Forenbeitrage

                                Thomas BraunT 1 Antwort Letzte Antwort
                                1
                                • mcm1957M mcm1957

                                  @manuxi
                                  Versuch mal iob fix

                                  Da du mit sudo / root unterwegs bist bzw warst (und es dankenswerter Weise gleich sagts - was ev. unnötiges Suchen minimiert - kann es sein, dass die Fileprotections nicht passen. @Thomas-Braun kann da ev. besser helfen - allerdings betet er gefühlter Maßen 24h Tag 'Oh Herr, halt die User von root fern'.

                                  Thomas BraunT Online
                                  Thomas BraunT Online
                                  Thomas Braun
                                  Most Active
                                  schrieb am zuletzt editiert von
                                  #16

                                  @mcm57 sagte in Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]:

                                  allerdings betet er gefühlter Maßen 24h Tag 'Oh Herr, halt die User von root fern'.

                                  Mit Recht.

                                  In welchen Verzeichnissen wurden die Befehle ausgeführt?
                                  Das ist beim herumrühren per npm extrem wichtig. Deswegen immer den vollständigen LoginPrompt angeben.

                                  Linux-Werkzeugkasten:
                                  https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                                  NodeJS Fixer Skript:
                                  https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                                  iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                                  manuxiM 1 Antwort Letzte Antwort
                                  2
                                  • Thomas BraunT Thomas Braun

                                    @mcm57 sagte in Lösung für Fehler: TypeError [ERR_INVALID_ARG_VALUE]:

                                    allerdings betet er gefühlter Maßen 24h Tag 'Oh Herr, halt die User von root fern'.

                                    Mit Recht.

                                    In welchen Verzeichnissen wurden die Befehle ausgeführt?
                                    Das ist beim herumrühren per npm extrem wichtig. Deswegen immer den vollständigen LoginPrompt angeben.

                                    manuxiM Offline
                                    manuxiM Offline
                                    manuxi
                                    schrieb am zuletzt editiert von
                                    #17

                                    @thomas-braun hab unter /opt/iobroker "npm list @iobroker/adapter-core" - dort die beiden Schlingel entdeckt: telegram & spotify-premium. Wie in der Anleitung oben daher in die Verzeichnisse gewechselt:
                                    cd /opt/iobroker/node_modules/iobroker.telegram/
                                    bzw.
                                    cd /opt/iobroker/node_modules/iobroker.spotify-premium/
                                    dort jeweils ein
                                    npm i @iobroker/adapter-core@3.1.4
                                    ausgeführt.
                                    Danach gecheckt:
                                    cd /opt/iobroker/
                                    "npm list @iobroker/adapter-core"

                                    • alles gut.

                                    Nach reboot des Containers wieder alles krumm. Vermutlich Permissions :(

                                    HomoranH Thomas BraunT 2 Antworten Letzte Antwort
                                    0
                                    • manuxiM manuxi

                                      @thomas-braun hab unter /opt/iobroker "npm list @iobroker/adapter-core" - dort die beiden Schlingel entdeckt: telegram & spotify-premium. Wie in der Anleitung oben daher in die Verzeichnisse gewechselt:
                                      cd /opt/iobroker/node_modules/iobroker.telegram/
                                      bzw.
                                      cd /opt/iobroker/node_modules/iobroker.spotify-premium/
                                      dort jeweils ein
                                      npm i @iobroker/adapter-core@3.1.4
                                      ausgeführt.
                                      Danach gecheckt:
                                      cd /opt/iobroker/
                                      "npm list @iobroker/adapter-core"

                                      • alles gut.

                                      Nach reboot des Containers wieder alles krumm. Vermutlich Permissions :(

                                      HomoranH Nicht stören
                                      HomoranH Nicht stören
                                      Homoran
                                      Global Moderator Administrators
                                      schrieb am zuletzt editiert von
                                      #18

                                      @manuxi hast du mal ein iob fix gefahren?

                                      kein Support per PN! - Fragen im Forum stellen - es gibt fast nichts, was nicht auch für andere interessant ist.

                                      Benutzt das Voting rechts unten im Beitrag wenn er euch geholfen hat.

                                      der Installationsfixer: curl -fsL https://iobroker.net/fix.sh | bash -

                                      manuxiM 1 Antwort Letzte Antwort
                                      0
                                      • manuxiM manuxi

                                        @thomas-braun hab unter /opt/iobroker "npm list @iobroker/adapter-core" - dort die beiden Schlingel entdeckt: telegram & spotify-premium. Wie in der Anleitung oben daher in die Verzeichnisse gewechselt:
                                        cd /opt/iobroker/node_modules/iobroker.telegram/
                                        bzw.
                                        cd /opt/iobroker/node_modules/iobroker.spotify-premium/
                                        dort jeweils ein
                                        npm i @iobroker/adapter-core@3.1.4
                                        ausgeführt.
                                        Danach gecheckt:
                                        cd /opt/iobroker/
                                        "npm list @iobroker/adapter-core"

                                        • alles gut.

                                        Nach reboot des Containers wieder alles krumm. Vermutlich Permissions :(

                                        Thomas BraunT Online
                                        Thomas BraunT Online
                                        Thomas Braun
                                        Most Active
                                        schrieb am zuletzt editiert von
                                        #19

                                        @manuxi

                                        Zeig mal konkret die vollständigen Ein- und Ausgaben aus der Konsole (in CodeTags eingebettet), keine freien Nacherzählungen.

                                        Linux-Werkzeugkasten:
                                        https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                                        NodeJS Fixer Skript:
                                        https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                                        iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                                        manuxiM 1 Antwort Letzte Antwort
                                        0
                                        • HomoranH Homoran

                                          @manuxi hast du mal ein iob fix gefahren?

                                          manuxiM Offline
                                          manuxiM Offline
                                          manuxi
                                          schrieb am zuletzt editiert von
                                          #20

                                          @homoran nein. ist das sinnvoll?

                                          HomoranH 1 Antwort Letzte Antwort
                                          0
                                          Antworten
                                          • In einem neuen Thema antworten
                                          Anmelden zum Antworten
                                          • Älteste zuerst
                                          • Neuste zuerst
                                          • Meiste Stimmen


                                          Support us

                                          ioBroker
                                          Community Adapters
                                          Donate
                                          FAQ Cloud / IOT
                                          HowTo: Node.js-Update
                                          HowTo: Backup/Restore
                                          Downloads
                                          BLOG

                                          653

                                          Online

                                          32.4k

                                          Benutzer

                                          81.4k

                                          Themen

                                          1.3m

                                          Beiträge
                                          Community
                                          Impressum | Datenschutz-Bestimmungen | Nutzungsbedingungen | Einwilligungseinstellungen
                                          ioBroker Community 2014-2025
                                          logo
                                          • Anmelden

                                          • Du hast noch kein Konto? Registrieren

                                          • Anmelden oder registrieren, um zu suchen
                                          • Erster Beitrag
                                            Letzter Beitrag
                                          0
                                          • Home
                                          • Aktuell
                                          • Tags
                                          • Ungelesen 0
                                          • Kategorien
                                          • Unreplied
                                          • Beliebt
                                          • GitHub
                                          • Docu
                                          • Hilfe