Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: Security upgrade ejs from 3.1.9 to 3.1.10 #29439

Merged
merged 1 commit into from
Apr 30, 2024

Conversation

cadrake
Copy link
Contributor

@cadrake cadrake commented Apr 30, 2024

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `yarn` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • packages/data-context/package.json

Note for zero-installs users

If you are using the Yarn feature zero-installs that was introduced in Yarn V2, note that this PR does not update the .yarn/cache/ directory meaning this code cannot be pulled and immediately developed on as one would expect for a zero-install project - you will need to run yarn to update the contents of the ./yarn/cache directory.
If you are not using zero-install you can ignore this as your flow should likely be unchanged.

⚠️ Warning
Failed to update the yarn.lock, please update manually before merging.

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
medium severity 551/1000
Why? Recently disclosed, Has a fix available, CVSS 5.3
Improper Control of Dynamically-Managed Code Resources
SNYK-JS-EJS-6689533
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Improper Control of Dynamically-Managed Code Resources

Copy link

cypress bot commented Apr 30, 2024

Passing run #55256 ↗︎

0 5486 133 0 Flakiness 0

Details:

chore: packages/data-context/package.json to reduce vulnerabilities
Project: cypress Commit: c1d4c2e872
Status: Passed Duration: 15:10 💡
Started: Apr 30, 2024 7:59 PM Ended: Apr 30, 2024 8:15 PM

Review all test suite changes for PR #29439 ↗︎

Copy link
Member

@jennifer-shehane jennifer-shehane left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changelog: mde/ejs@v3.1.8...v3.1.10

Looks fine.

@jennifer-shehane jennifer-shehane changed the title [Snyk] Security upgrade ejs from 3.1.9 to 3.1.10 chore: Security upgrade ejs from 3.1.9 to 3.1.10 Apr 30, 2024
@jennifer-shehane jennifer-shehane self-assigned this Apr 30, 2024
@AtofStryker AtofStryker force-pushed the snyk-fix-f30c48d801172c9b8dc7db5b445ccc9c branch from 5f4db14 to c1d4c2e Compare April 30, 2024 19:19
@jennifer-shehane jennifer-shehane merged commit 5ec744a into develop Apr 30, 2024
81 of 82 checks passed
@jennifer-shehane jennifer-shehane deleted the snyk-fix-f30c48d801172c9b8dc7db5b445ccc9c branch April 30, 2024 20:11
jj497 pushed a commit to jj497/cypress that referenced this pull request May 5, 2024
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-EJS-6689533

Co-authored-by: snyk-bot <snyk-bot@snyk.io>
@cypress-bot
Copy link
Contributor

cypress-bot bot commented May 8, 2024

Released in 13.9.0.

This comment thread has been locked. If you are still experiencing this issue after upgrading to
Cypress v13.9.0, please open a new issue.

@cypress-bot cypress-bot bot locked as resolved and limited conversation to collaborators May 8, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants