Skip to content

Conversation

@midnightcrisis
Copy link
Owner

Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json
    • package-lock.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
medium severity 601/1000
Why? Recently disclosed, Has a fix available, CVSS 6.3
Cross-site Scripting (XSS)
SNYK-JS-COOKIE-8163060
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: express The new version differs by 250 commits.
  • 8e229f9 4.21.1
  • a024c8a fix(deps): cookie@0.7.1
  • 7e562c6 4.21.0
  • 1bcde96 fix(deps): qs@6.13.0 (#5946)
  • 7d36477 fix(deps): serve-static@1.16.2 (#5951)
  • 40d2d8f fix(deps): finalhandler@1.3.1
  • 77ada90 Deprecate `"back"` magic string in redirects (#5935)
  • 21df421 4.20.0
  • 4c9ddc1 feat: upgrade to serve-static@0.16.0
  • 9ebe5d5 feat: upgrade to send@0.19.0 (#5928)
  • ec4a01b feat: upgrade to body-parser@1.20.3 (#5926)
  • 54271f6 fix: don't render redirect values in anchor href
  • 125bb74 path-to-regexp@0.1.10 (#5902)
  • 2a980ad merge-descriptors@1.0.3 (#5781)
  • a3e7e05 docs: specify new instructions for `question` and `discuss`
  • c5addb9 deps: path-to-regexp@0.1.8 (#5603)
  • e35380a docs: add @ IamLizu to the triage team (#5836)
  • f5b6e67 docs: update scorecard link (#5814)
  • 2177f67 docs: add OSSF Scorecard badge (#5436)
  • f4bd86e Replace Appveyor windows testing with GHA (#5599)
  • 2ec589c Fix Contributor Covenant link definition reference in attribution section (#5762)
  • 4cf7eed remove minor version pinning from ci (#5722)
  • 6d08471 📝 update people, add ctcpip to TC (#5683)
  • 61421a8 skip QUERY tests for Node 21 only, still not supported (#5695)

See the full diff

Package name: webpack-bundle-analyzer The new version differs by 250 commits.
  • fb77b1b v4.3.0
  • d8cfba7 Merge pull request #404 from webpack-contrib/dependabot/npm_and_yarn/ini-1.3.7
  • fbd8a17 Bump ini from 1.3.5 to 1.3.7
  • 2d12514 Merge pull request #402 from webpack-contrib/github-actions
  • d701153 Use Node.js as name
  • fdb5a0e Add custom name for build-and-test
  • 6e6c3e8 Remove Travis CI
  • 1adc58f Only trigger GitHub actions on direct pushes to master
  • 6c46bad Run tests with gabrielbb/xvfb-action
  • bb74281 Setup GitHub actions to run tests and lint
  • 9b84418 Mention #401 in changelog
  • fcc577c Merge pull request #401 from realityking/filesize
  • 8de9dae Move filesize to dev depnendencies
  • d54a8d0 Mention #398 in changelog
  • 9096227 Merge pull request #398 from TrySound/drop-express
  • 0f70814 Drop static-serve, add comment
  • ab9f23d Switch to sirv
  • b30784d Remove viewsRoot
  • 776ecb7 Add missing require
  • 4a674c4 Replace express with builtin node server
  • 313fac1 v4.2.0
  • 302df4f Merge pull request #397 from realityking/templates
  • 084cc02 Add changelog entry
  • 11e4db1 fix syntax error

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Cross-site Scripting (XSS)

@secure-code-warrior-for-github

Micro-Learning Topic: Cross-site scripting (Detected by phrase)

Matched on "Cross-site Scripting"

What is this? (2min video)

Cross-site scripting vulnerabilities occur when unescaped input is rendered into a page displayed to the user. When HTML or script is included in the input, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context.

Try a challenge in Secure Code Warrior

Helpful references

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants