Skip to content

Conversation

@AH7
Copy link
Owner

@AH7AH7 commented Nov 28, 2023

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json

Vulnerabilities that will be fixed

With an upgrade:
SeverityPriority Score (*)IssueBreaking ChangeExploit Maturity
high severity696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ANSIREGEX-1583908
NoProof of Concept
critical severity679/1000
Why? Has a fix available, CVSS 9.3
Incomplete List of Disallowed Inputs
SNYK-JS-BABELTRAVERSE-5962463
NoNo Known Exploit
high severity761/1000
Why? Mature exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JS-DICER-2311764
YesMature
medium severity586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-GLOBPARENT-1016905
NoProof of Concept
medium severity641/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.4
Prototype Pollution
SNYK-JS-JSON5-3182856
NoProof of Concept
medium severity646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Server-side Request Forgery (SSRF)
SNYK-JS-REQUEST-3361831
YesProof of Concept
medium severity646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Prototype Pollution
SNYK-JS-TOUGHCOOKIE-5672873
YesProof of Concept
medium severity596/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.5
Arbitrary Code Injection
SNYK-JS-UNDERSCORE-1080984
YesProof of Concept
high severity589/1000
Why? Has a fix available, CVSS 7.5
Prototype Pollution
SNYK-JS-UNSETVALUE-2400660
NoNo Known Exploit
medium severity484/1000
Why? Has a fix available, CVSS 5.4
XML External Entity (XXE) Injection
SNYK-JS-XMLDOM-1084960
YesNo Known Exploit
medium severity539/1000
Why? Has a fix available, CVSS 6.5
Improper Input Validation
SNYK-JS-XMLDOM-1534562
YesNo Known Exploit
high severity639/1000
Why? Has a fix available, CVSS 8.5
Prototype Pollution
SNYK-JS-XMLDOM-3042242
YesNo Known Exploit
critical severity811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Improper Input Validation
SNYK-JS-XMLDOM-3092935
YesProof of Concept
low severity506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:braces:20180219
NoProof of Concept

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: jsonld The new version differs by 250 commits.
  • aff94e1 Release 5.0.0.
  • 85687f7 Update changelog.
  • 727739f Avoid header param mutation.
  • 29df460 Add note about user-agent note.
  • 1046c29 Avoid extra JSON.stringify().
  • 799d22c Update dependencies.
  • ce32d7d Cleanup.
  • 28ab800 Remove unused dependency.
  • 04d9aae Node.js document loader updates.
  • d12b4e3 Ignore nyc output.
  • 2c41fb4 Support Node.js >= 12.
  • 5e44c20 Remove unneeded await.
  • b56999b Distribute ES Module bundle.
  • aa8f0cc Switch to Babel 'usage' mode.
  • b119cf8 Formatting.
  • 22c8023 Remove unused plugins option.
  • 6981a04 Update dependencies.
  • 0649324 Remove unused commander dependency.
  • 1779e3f Test in faster development mode.
  • a9c086f Update CHANGELOG to reflect latest changes.
  • 9fc8074 Include .js extension in browser alias for node documentLoader.
  • 34f00af Do not include node documentLoader in browser build.
  • ddce29c Use an httpsAgent with StrictSSL & user headers getters for other headers.
  • d99c855 Use headers.set not =.

See the full diff

Package name: nodemailer The new version differs by 4 commits.

See the full diff

Package name: rdflib The new version differs by 250 commits.

See the full diff

Package name: solid-permissions The new version differs by 7 commits.

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note:You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)
🦉 Prototype Pollution
🦉 Server-side Request Forgery (SSRF)
🦉 More lessons are available in Snyk Learn

Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants

@AH7@snyk-bot