Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 17 vulnerabilities #66

Open
wants to merge 47 commits into
base: master
Choose a base branch
from

Conversation

cniweb
Copy link
Owner

@cniweb cniweb commented Nov 28, 2023

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ANSIREGEX-1583908
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-1018905
No Proof of Concept
high severity 681/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.2
Command Injection
SNYK-JS-LODASH-1040724
No Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-450202
No Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-608086
No Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-73638
No Proof of Concept
medium severity 541/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 4.4
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-73639
No Proof of Concept
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Server-side Request Forgery (SSRF)
SNYK-JS-REQUEST-3361831
Yes Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JS-SOCKETIOPARSER-1056752
Yes Proof of Concept
critical severity 704/1000
Why? Has a fix available, CVSS 9.8
Improper Input Validation
SNYK-JS-SOCKETIOPARSER-3091012
Yes No Known Exploit
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Prototype Pollution
SNYK-JS-TOUGHCOOKIE-5672873
Yes Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-UGLIFYJS-1727251
Yes No Known Exploit
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:clean-css:20180306
No Proof of Concept
medium severity 636/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
Prototype Pollution
npm:lodash:20180130
No Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
npm:parsejson:20170908
Yes No Known Exploit
high severity 629/1000
Why? Has a fix available, CVSS 8.3
Improper minification of non-boolean comparisons
npm:uglify-js:20150824
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
npm:uglify-js:20151024
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: bcrypt The new version differs by 19 commits.
  • 2f124bd Fix artifact upload path
  • 10eacf5 Prepare v5.0.1
  • 6eacfe1 Merge pull request #856 from kelektiv/update-deps
  • feb477c Update node-pre-gyp to 1.0.0
  • 42c8b0c Merge pull request #852 from kelektiv/update-deps
  • bafefc3 Update packages
  • 7c5d8df Merge pull request #851 from recrsn/node-15-ci
  • 1ba55f9 Add Node 15 to CI
  • 19c06c1 Update Node version compatibility info
  • 09cb4fc Merge pull request #825 from dogon11/patch-1
  • 2821c03 Merge pull request #811 from techhead/use_buffers
  • 63c8403 Merge pull request #838 from alete89/docs/improve-hash-info
  • 984ef18 remove reference to $2y$ algo identifier
  • 630c897 fixes: #828
  • 0f93284 README.md typo fix
  • 4125ebc Update README.md
  • f503e57 Create SECURITY.md
  • f158e6e Allow optional use of Node Buffers.
  • 8866277 Deploy on any travis tag

See the full diff

Package name: node-gcm The new version differs by 44 commits.

See the full diff

Package name: socket.io-client The new version differs by 250 commits.
  • d30914d [chore] Release 2.0.0
  • 9e7b543 [chore] Bump engine.io to version 3.1.0 (#1109)
  • 442587e [chore] Bump dev dependencies (#1108)
  • ff4cb3e [feat] Move binary detection to the parser (#1103)
  • b4c7e49 [chore] Bump debug to version 2.6.4 (#1101)
  • 3f19445 Merge pull request #1096 from satya164/patch-1
  • 628eb3b Fix dependencies
  • d32bc5b [docs] Fix messed events documentation (#1089)
  • 2135ed8 [docs] Fix Manager constructor documentation (#1093)
  • 25321d1 [docs] Fix format in API.md (#1090)
  • 9064608 [docs] Add note regarding the Emitter class (#1079)
  • 49fb3e0 [fix] Run tests on the minified files (#1042)
  • 4af8fd3 [docs] Add missing path option in the documentation (#1078)
  • 2dcc794 [feature] Allow the use of a custom parser (#1075)
  • 4322cf2 [docs] Fix typo (#1076)
  • 1ac8374 [chore] Bump engine.io-client to version 2.0.2 (#1074)
  • 3d63875 [chore] Bump socket.io-parser to version 2.3.2 (#1071)
  • 8fc4b44 [docs] Fix typo (#1066)
  • a98f94d [chore] Bump engine.io-client to version 2.0.0 (#1062)
  • fcb5c43 [fix] Add nsp prefix to socket.id (#1058)
  • ba5dca3 [test] Update browsers matrix (#1059)
  • 7a533cd [chore] Update issue template with fiddle (#1057)
  • 55411df [docs] Add `connect_error` and `connect_timeout` events (#1051)
  • 558163d [docs] API documentation (#1049)

See the full diff

Package name: socket.io-redis The new version differs by 62 commits.

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)
🦉 Prototype Pollution
🦉 Server-side Request Forgery (SSRF)
🦉 More lessons are available in Snyk Learn

fossabot and others added 30 commits September 23, 2020 21:49
Signed-off-by: fossabot <badges@fossa.io>
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-LODASH-590103
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/npm:base64-url:20180512
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/npm:ws:20171108
…97f146

[Snyk] Security upgrade nodemailer from 0.5.2 to 6.4.16
…43137e

[Snyk] Security upgrade express from 3.20.2 to 3.21.0
…0f8dd1cc119

[Snyk] Upgrade request from 2.16.6 to 2.88.2
…61e2e58d472

[Snyk] Upgrade moment from 2.3.1 to 2.29.1
…4c93408fdb1

[Snyk] Upgrade cron from 1.0.3 to 1.8.2
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/npm:ms:20170412
…27bd9e6

[Snyk] Security upgrade socket.io from 1.3.7 to 1.7.4
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/npm:ms:20170412
…2716d82

[Snyk] Fix for 11 vulnerabilities
…2b81730

[Snyk] Security upgrade express from 3.21.0 to 4.15.3
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-AJV-584908
…f36c0c8

[Snyk] Security upgrade request from 2.82.0 to 2.88.0
…e491cda

[Snyk] Security upgrade express from 3.21.0 to 4.15.3
…f78d83e

[Snyk] Fix for 4 vulnerabilities
…570194f

[Snyk] Security upgrade express from 4.15.3 to 4.16.0
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-AJV-584908
…383c9e5

[Snyk] Security upgrade request from 2.82.0 to 2.88.0
snyk-bot and others added 17 commits December 9, 2020 06:52
…6d7ef47217f

[Snyk] Upgrade jquery from 1.8.3 to 1.12.4
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-MQUERY-1050858
…8e081ff2b00

[Snyk] Upgrade cron from 1.0.3 to 1.8.2
…1249ac26f01

[Snyk] Upgrade timezone from 0.0.23 to 0.0.48
…50378e2e72c

[Snyk] Upgrade socket.io from 1.3.7 to 1.7.4
…aea7d5e1df6

[Snyk] Upgrade oauth2orize from 1.0.1 to 1.11.0
…438cffe0fd0

[Snyk] Upgrade express-form from 0.8.1 to 0.12.6
…e8a5af3

[Snyk] Security upgrade mongoose from 4.4.8 to 5.11.7
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-ENGINEIO-3136336
…f90a1d2

[Snyk] Security upgrade socket.io from 1.7.4 to 2.5.0
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Server is not running, Cannot read property 'prototype' of undefined
3 participants