Skip to content

Commit 50fd780

Browse files
committed
Bump version
1 parent f4e2e26 commit 50fd780

File tree

4 files changed

+52
-7
lines changed

4 files changed

+52
-7
lines changed

chrome/extension/js/generated/retire-chrome.js

Lines changed: 48 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ function deepScan(content, repo) {
5050
*/
5151

5252
var exports = exports || {};
53-
exports.version = '5.2.7';
53+
exports.version = '5.2.8';
5454

5555
function isDefined(o) {
5656
return typeof o !== 'undefined';
@@ -7993,7 +7993,7 @@ module.exports={
79937993
]
79947994
},
79957995
{
7996-
"below": "0.21.3",
7996+
"below": "0.21.2",
79977997
"severity": "high",
79987998
"cwe": [
79997999
"CWE-1333",
@@ -9228,6 +9228,28 @@ module.exports={
92289228
"https://vercel.com/changelog/cve-2025-32421"
92299229
]
92309230
},
9231+
{
9232+
"atOrAbove": "15.0.4-canary.51",
9233+
"below": "15.1.8",
9234+
"cwe": [
9235+
"CWE-444"
9236+
],
9237+
"severity": "high",
9238+
"identifiers": {
9239+
"summary": "### Summary\nA vulnerability affecting Next.js has been addressed. It impacted versions 15.0.4 through 15.1.8 and involved a cache poisoning bug leading to a Denial of Service (DoS) condition.\n\nUnder certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page\n\nMore details: [CVE-2025-49826](https://vercel.com/changelog/cve-2025-49826)\n\n## Credits\n- Allam Rachid [zhero;](https://zhero-web-sec.github.io/research-and-things/)\n- Allam Yasser (inzo)",
9240+
"githubID": "GHSA-67rr-84xm-4c7r",
9241+
"CVE": [
9242+
"CVE-2025-49826"
9243+
]
9244+
},
9245+
"info": [
9246+
"https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7r",
9247+
"https://github.com/vercel/next.js/commit/16bfce64ef2157f2c1dfedcfdb7771bc63103fd2",
9248+
"https://github.com/vercel/next.js/commit/a15b974ed707d63ad4da5b74c1441f5b7b120e93",
9249+
"https://github.com/vercel/next.js/releases/tag/v15.1.8",
9250+
"https://vercel.com/changelog/cve-2025-49826"
9251+
]
9252+
},
92319253
{
92329254
"atOrAbove": "15.0.0",
92339255
"below": "15.2.2",
@@ -9300,6 +9322,29 @@ module.exports={
93009322
"https://github.com/vercel/next.js",
93019323
"https://vercel.com/changelog/cve-2025-30218-5DREmEH765PoeAsrNNQj3O"
93029324
]
9325+
},
9326+
{
9327+
"atOrAbove": "15.3.0",
9328+
"below": "15.3.3",
9329+
"cwe": [
9330+
"CWE-444"
9331+
],
9332+
"severity": "low",
9333+
"identifiers": {
9334+
"summary": "### Summary\n\nA cache poisoning issue in **Next.js App Router >=15.3.0 and < 15.3.3** may have allowed RSC payloads to be cached and served in place of HTML, under specific conditions involving middleware and redirects. This issue has been fixed in **Next.js 15.3.3**.\n\nUsers on affected versions should **upgrade immediately** and **redeploy** to ensure proper caching behavior.\n\nMore details: [CVE-2025-49005](https://vercel.com/changelog/cve-2025-49005)",
9335+
"githubID": "GHSA-r2fc-ccr8-96c4",
9336+
"CVE": [
9337+
"CVE-2025-49005"
9338+
]
9339+
},
9340+
"info": [
9341+
"https://github.com/vercel/next.js/security/advisories/GHSA-r2fc-ccr8-96c4",
9342+
"https://github.com/vercel/next.js/issues/79346",
9343+
"https://github.com/vercel/next.js/pull/79939",
9344+
"https://github.com/vercel/next.js/commit/ec202eccf05820b60c6126d6411fe16766ecc066",
9345+
"https://github.com/vercel/next.js/releases/tag/v15.3.3",
9346+
"https://vercel.com/changelog/cve-2025-49005"
9347+
]
93039348
}
93049349
],
93059350
"extractors": {
@@ -9946,7 +9991,7 @@ module.exports={
99469991
"/\\*[\\s*!]+(?:@license)?[\\s*]+(?:Lo-Dash|lodash|Lodash) v?(§§version§§)[\\s\\S]{1,200}Build: `lodash modern -o",
99479992
"/\\*[\\s*!]+(?:@license)?[\\s*]+(?:Lo-Dash|lodash|Lodash) v?(§§version§§) <",
99489993
"/\\*[\\s*!]+(?:@license)?[\\s*]+(?:Lo-Dash|lodash|Lodash) v?(§§version§§) lodash.com/license",
9949-
"=\"(§§version§§)(?<=[0-9]+(\\.[0-9]{1,3}){1,5})\"[\\s\\S]{1,300}__lodash_hash_undefined__",
9994+
"=\"(§§version§§)(?<=[0-9]{1,2}\\.[0-9]{1,2}\\.[0-9]{1,2})\"[\\s\\S]{1,300}__lodash_hash_undefined__",
99509995
"/\\*[\\s*]+@license[\\s*]+(?:Lo-Dash|lodhash|Lodash)[\\s\\S]{1,500}var VERSION *= *['\"](§§version§§)['\"]",
99519996
"var VERSION=\"(§§version§§)\";var BIND_FLAG=1,BIND_KEY_FLAG=2,CURRY_BOUND_FLAG=4,CURRY_FLAG=8"
99529997
],

node/lib/retire.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
*/
55

66
var exports = exports || {};
7-
exports.version = '5.2.7';
7+
exports.version = '5.2.8';
88

99
function isDefined(o) {
1010
return typeof o !== 'undefined';

node/package-lock.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

node/package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"author": "Erlend Oftedal <erlend@oftedal.no>",
33
"name": "retire",
44
"description": "Retire is a tool for detecting use of vulnerable libraries",
5-
"version": "5.2.7",
5+
"version": "5.2.8",
66
"license": "Apache-2.0",
77
"repository": {
88
"type": "git",

0 commit comments

Comments
 (0)