Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 25 vulnerabilities #133

Open
wants to merge 1 commit into
base: develop
Choose a base branch
from

Conversation

Sarrac3873
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Prototype Pollution
SNYK-JS-AJV-584908
No No Known Exploit
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ANSIREGEX-1583908
Yes Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-CONVENTIONALCOMMITSPARSER-1766960
Yes No Known Exploit
medium severity 636/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
Prototype Pollution
SNYK-JS-DOTPROP-543489
Yes Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-GLOBPARENT-1016905
Yes Proof of Concept
medium severity 484/1000
Why? Has a fix available, CVSS 5.4
Open Redirect
SNYK-JS-GOT-2932019
Yes No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-1018905
Yes Proof of Concept
high severity 681/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.2
Command Injection
SNYK-JS-LODASH-1040724
Yes Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-450202
Yes Proof of Concept
high severity 731/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.2
Prototype Pollution
SNYK-JS-LODASH-567746
Yes Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-608086
Yes Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MARKDOWNIT-2331914
Yes No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MARKDOWNIT-459438
No Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Prototype Pollution
SNYK-JS-MERGE-1040469
Yes No Known Exploit
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-MERGE-1042987
Yes Proof of Concept
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Prototype Pollution
SNYK-JS-MINIMIST-2429795
Yes Proof of Concept
medium severity 601/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.6
Prototype Pollution
SNYK-JS-MINIMIST-559764
Yes Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Insertion of Sensitive Information into Log File
SNYK-JS-NPMREGISTRYFETCH-575432
No No Known Exploit
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Authorization Bypass Through User-Controlled Key
SNYK-JS-PARSEPATH-2936439
Yes Proof of Concept
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Server-side Request Forgery (SSRF)
SNYK-JS-PARSEURL-3023021
Yes Proof of Concept
medium severity 571/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5
Improper Input Validation
SNYK-JS-PARSEURL-3024398
Yes Proof of Concept
high severity 676/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.1
Improper Privilege Management
SNYK-JS-SHELLJS-2332187
Yes Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JS-TRIMNEWLINES-1298042
Yes No Known Exploit
medium severity 596/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.5
Arbitrary Code Injection
SNYK-JS-UNDERSCORE-1080984
No Proof of Concept
medium severity 601/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.6
Prototype Pollution
SNYK-JS-YARGSPARSER-560381
Yes Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: @commitlint/cli The new version differs by 250 commits.

See the full diff

Package name: ajv The new version differs by 250 commits.

See the full diff

Package name: commitizen The new version differs by 96 commits.

See the full diff

Package name: eslint The new version differs by 28 commits.
  • 02d7542 6.1.0
  • 5997f7a Build: changelog update for 6.1.0
  • 8f86cca Upgrade: eslint-scope@^5.0.0 (#12011)
  • d08683e Fix: glob processing (fixes #11940) (#11986)
  • bfcf8b2 Fix: dot-location errors with parenthesized objects (fixes #11868) (#11933)
  • 79e8d09 Fix: add parens for sequence expr in arrow-body-style (fixes #11917) (#11918)
  • 105c098 Docs: update docs for object-curly-spacing (fixes #11634) (#12009)
  • c90a12c Chore: update release script for new website repo (#12006)
  • e2c08a9 Sponsors: Sync README with website
  • b974fcb Update: Check computed property keys in no-extra-parens (#11952)
  • 222d27c Update: Add for-in and for-of checks for props in no-param-reassign (#11941)
  • e4c450f Fix: no-extra-parens autofix with `in` in a for-loop init (fixes #11706) (#11848)
  • 2dafe2d Fix: prefer-const produces invalid autofix (fixes #11699) (#11827)
  • cb475fd Fix: Cache file error handling on read-only file system. (fixes #11945) (#11946)
  • 89412c3 Docs: Fixed a typo (fixes #11999) (#12000)
  • 6669f78 Fix: --init with Vue.js failed (fixes #11970) (#11985)
  • 93633c2 Upgrade: Upgrade lodash dependency (fixes #11992) (#11994)
  • 776dae7 Docs: fix wrong Node.js version in getting started (#11993)
  • 4448261 Docs: some typos and optimization points (#11960)
  • 2a10856 Chore: Add temporary test files to .gitignore (#11978)
  • d83b233 Chore: update path for release bundles (#11977)
  • 1fb3620 Fix: creating of enabledGlobals object without prototype (fixes #11929) (#11935)
  • c2f2db9 Docs: Replace global true and false with writable and readonly in rules (#11956)
  • 19335b8 Fix: actual messageId and expected messageId are switched in rule tester (#11928)

See the full diff

Package name: lerna The new version differs by 250 commits.

See the full diff

Package name: remap-istanbul The new version differs by 6 commits.

See the full diff

Package name: shelljs The new version differs by 4 commits.

See the full diff

Package name: shx The new version differs by 8 commits.

See the full diff

Package name: vsce The new version differs by 250 commits.

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Prototype Pollution
🦉 Regular Expression Denial of Service (ReDoS)
🦉 Regular Expression Denial of Service (ReDoS)
🦉 More lessons are available in Snyk Learn

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants