Skip to content
This repository has been archived by the owner on Aug 21, 2024. It is now read-only.

[Snyk] Fix for 29 vulnerabilities #3

Closed
wants to merge 1 commit into from

Conversation

snyk-bot
Copy link

Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:

    • package.json
  • Adding or updating a Snyk policy (.snyk) file; this file is required in order to apply Snyk vulnerability patches.
    Find out more.

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Prototype Pollution
SNYK-JS-GETOBJECT-1054932
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-GLOBPARENT-1016905
Yes No Known Exploit
high severity 569/1000
Why? Has a fix available, CVSS 7.1
Arbitrary Code Execution
SNYK-JS-GRUNT-597546
Yes No Known Exploit
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Denial of Service (DoS)
SNYK-JS-HTTPPROXY-569139
No Proof of Concept
medium severity 601/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.6
Prototype Pollution
SNYK-JS-JQUERY-174006
Yes Proof of Concept
medium severity 636/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
Cross-site Scripting (XSS)
SNYK-JS-JQUERY-565129
Yes Proof of Concept
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Cross-site Scripting (XSS)
SNYK-JS-JQUERY-567880
Yes Proof of Concept
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Arbitrary Code Execution
SNYK-JS-JSYAML-174129
Yes No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-1018905
Yes Proof of Concept
high severity 681/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.2
Command Injection
SNYK-JS-LODASH-1040724
Yes Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-450202
Yes Proof of Concept
medium severity 636/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
Prototype Pollution
SNYK-JS-LODASH-567746
Yes Proof of Concept
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Prototype Pollution
SNYK-JS-LODASH-590103
Yes No Known Exploit
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-608086
Yes Proof of Concept
high severity 579/1000
Why? Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-73638
Yes No Known Exploit
medium severity 434/1000
Why? Has a fix available, CVSS 4.4
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-73639
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MINIMATCH-1019388
Yes No Known Exploit
medium severity 601/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.6
Prototype Pollution
SNYK-JS-MINIMIST-559764
Yes Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Insecure Defaults
SNYK-JS-SOCKETIO-1024859
Yes Proof of Concept
low severity 486/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.3
Arbitrary Code Injection
SNYK-JS-UNDERSCORE-1080984
No Proof of Concept
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:braces:20180219
Yes Proof of Concept
low severity 354/1000
Why? Has a fix available, CVSS 2.8
Insecure use of /tmp folder
npm:cli:20160615
No No Known Exploit
medium severity 641/1000
Why? Mature exploit, Has a fix available, CVSS 5.1
Uninitialized Memory Exposure
npm:concat-stream:20160901
Yes Mature
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
No No Known Exploit
medium severity 484/1000
Why? Has a fix available, CVSS 5.4
Cross-site Scripting (XSS)
npm:jquery:20150627
No No Known Exploit
medium severity 529/1000
Why? Has a fix available, CVSS 6.3
Prototype Pollution
npm:lodash:20180130
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
npm:minimatch:20160620
Yes No Known Exploit
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:ms:20170412
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
npm:semver:20150403
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: grunt-contrib-jshint The new version differs by 9 commits.

See the full diff

Package name: grunt-contrib-uglify The new version differs by 74 commits.

See the full diff

Package name: grunt-replace The new version differs by 26 commits.

See the full diff

Package name: karma The new version differs by 250 commits.
  • 16010eb chore(release): 5.0.8 [skip ci]
  • a409696 chore: remove unused `grunt lint` command (#3515)
  • 47f1cb2 fix(dependencies): update to latest log4js major (#3514)
  • b60391f fix(dependencies): update and unlock socket.io dependency (#3513)
  • 4d49948 chore(release): 5.0.7 [skip ci]
  • f399063 fix: detect type for URLs with query parameter or fragment identifier (#3509)
  • 17b50bc chore(release): 5.0.6 [skip ci]
  • 0cd696f fix(dependencies): update production dependencies (#3512)
  • 7c24a03 chore: fix broken HTML markup in the changelog file (#3507)
  • fdc4f9d refactor(test): remove no debug matching option (#3504)
  • 35d57e9 chore(release): 5.0.5 [skip ci]
  • e99da31 fix(cli): restore command line help contents (#3502)
  • 4f2fe56 chore: add Node 14 to the build matrix (#3501)
  • 100b227 refactor(test): move execKarma into the World (#3500)
  • f375884 refactor(test): reduce execKarma to a reasonable size (#3496)
  • a3d1f11 refactor(test): add common method to start server in background (#3495)
  • e4a5126 refactor(test): write config file in its own steps (#3494)
  • 0bd5c2b refactor(test): adjust sandbox folder location and simplify config logic (#3493)
  • b788f94 refactor(test): extract proxy into a separate Given claim (#3492)
  • 633f833 chore(release): 5.0.4 [skip ci]
  • 810489d refactor(test): migrate Proxy to ES2015 (#3490)
  • fa95fa3 fix(browser): make sure that empty results array is still recognized (#3486)
  • 255bf67 refactor(test): migrate World to ES2015 (#3489)
  • be5db67 chore(test): remove usage of deprecated defineSupportCode (#3488)

See the full diff

With a Snyk patch:
Severity Priority Score (*) Issue Exploit Maturity
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
npm:minimatch:20160620
No Known Exploit
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:ms:20170412
No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-GETOBJECT-1054932
- https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905
- https://snyk.io/vuln/SNYK-JS-GRUNT-597546
- https://snyk.io/vuln/SNYK-JS-HTTPPROXY-569139
- https://snyk.io/vuln/SNYK-JS-JQUERY-174006
- https://snyk.io/vuln/SNYK-JS-JQUERY-565129
- https://snyk.io/vuln/SNYK-JS-JQUERY-567880
- https://snyk.io/vuln/SNYK-JS-JSYAML-174129
- https://snyk.io/vuln/SNYK-JS-LODASH-1018905
- https://snyk.io/vuln/SNYK-JS-LODASH-1040724
- https://snyk.io/vuln/SNYK-JS-LODASH-450202
- https://snyk.io/vuln/SNYK-JS-LODASH-567746
- https://snyk.io/vuln/SNYK-JS-LODASH-590103
- https://snyk.io/vuln/SNYK-JS-LODASH-608086
- https://snyk.io/vuln/SNYK-JS-LODASH-73638
- https://snyk.io/vuln/SNYK-JS-LODASH-73639
- https://snyk.io/vuln/SNYK-JS-MINIMATCH-1019388
- https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
- https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859
- https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984
- https://snyk.io/vuln/npm:braces:20180219
- https://snyk.io/vuln/npm:cli:20160615
- https://snyk.io/vuln/npm:concat-stream:20160901
- https://snyk.io/vuln/npm:debug:20170905
- https://snyk.io/vuln/npm:jquery:20150627
- https://snyk.io/vuln/npm:lodash:20180130
- https://snyk.io/vuln/npm:minimatch:20160620
- https://snyk.io/vuln/npm:ms:20170412
- https://snyk.io/vuln/npm:semver:20150403


The following vulnerabilities are fixed with a Snyk patch:
- https://snyk.io/vuln/npm:debug:20170905
- https://snyk.io/vuln/npm:minimatch:20160620
- https://snyk.io/vuln/npm:ms:20170412
@x-way x-way closed this Feb 14, 2022
@x-way x-way deleted the snyk-fix-2fbbf314319600e4c8524ed7b1a9ff96 branch March 13, 2022 08:42
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
2 participants