Skip to content

[Snyk] Fix for 13 vulnerabilities#36

Open
mcdonaldtest wants to merge 1 commit intomasterfrom
snyk-fix-93f67cfe8988211e6bd73279f2db0611
Open

[Snyk] Fix for 13 vulnerabilities#36
mcdonaldtest wants to merge 1 commit intomasterfrom
snyk-fix-93f67cfe8988211e6bd73279f2db0611

Conversation

@mcdonaldtest
Copy link
Copy Markdown
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ANSIREGEX-1583908
Yes Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-HTMLMINIFIER-3091181
Yes Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Open Redirect
SNYK-JS-NODEFORGE-2330875
No Proof of Concept
medium severity 529/1000
Why? Has a fix available, CVSS 6.3
Prototype Pollution
SNYK-JS-NODEFORGE-2331908
No No Known Exploit
medium severity 494/1000
Why? Has a fix available, CVSS 5.6
Improper Verification of Cryptographic Signature
SNYK-JS-NODEFORGE-2430337
No No Known Exploit
high severity 579/1000
Why? Has a fix available, CVSS 7.3
Improper Verification of Cryptographic Signature
SNYK-JS-NODEFORGE-2430339
No No Known Exploit
medium severity 494/1000
Why? Has a fix available, CVSS 5.6
Improper Verification of Cryptographic Signature
SNYK-JS-NODEFORGE-2430341
No No Known Exploit
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Server-side Request Forgery (SSRF)
SNYK-JS-REQUEST-3361831
No Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JS-SOCKETIOPARSER-1056752
Yes Proof of Concept
critical severity 704/1000
Why? Has a fix available, CVSS 9.8
Improper Input Validation
SNYK-JS-SOCKETIOPARSER-3091012
Yes No Known Exploit
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Prototype Pollution
SNYK-JS-TOUGHCOOKIE-5672873
No Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:mime:20170907
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
npm:parsejson:20170908
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: console-io The new version differs by 105 commits.
  • 4995934 chore(package) v5.0.1
  • 0e270fc feature(package) join-io v2.0.0
  • 2cbf47a fix(index) node v4.0.0 support
  • 0a4dd6e feature(package) babel-cli -> babel-core
  • 0df186e chore(package) v5.0.0
  • bc65fb6 feature(console) drop support of node version < 4.0.0
  • ceca499 feature(package) spawnify v4.0.0
  • 63fc742 chore(package) v4.0.0
  • 8108ee1 feature(console) rm minify option
  • 897c022 feature(client) minify css in bundle
  • 636d76f feature(package) rm bower
  • a4b3d18 chore(package) v3.1.3
  • 78ccb36 feature(package) webpack v3.0.0
  • 7cb36b8 fix(console) addOnMouseUp: console -> $console
  • a35a182 chore(package) v3.1.2
  • a805f32 refactor(console) es2015-ify
  • 56fda97 feature(gitignore) package-lock.json
  • f4338f3 chore(package) v3.1.1
  • b88cb7d feature(package) eslint v4.0.0
  • eb43a3d feature(modules) socket.io v2.0.3
  • bb4ffef chore(package) v3.1.0
  • cdbd258 chore(console) es2015-ify
  • 60fb8ff fix(console) getPromptText: return value
  • dde7587 chore(console) es2015-ify

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)
🦉 Open Redirect
🦉 Prototype Pollution
🦉 More lessons are available in Snyk Learn

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants