Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

[Snyk] Fix for 18 vulnerabilities #29

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

mariotsi
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json
    • package-lock.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Prototype Pollution
SNYK-JS-AJV-584908
Yes No Known Exploit
high severity 584/1000
Why? Has a fix available, CVSS 7.4
Regular Expression Denial of Service (ReDoS)
SNYK-JS-HAWK-2808852
Yes No Known Exploit
high severity 644/1000
Why? Has a fix available, CVSS 8.6
Prototype Pollution
SNYK-JS-JSONSCHEMA-1920922
Yes No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-1018905
Yes Proof of Concept
high severity 681/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.2
Command Injection
SNYK-JS-LODASH-1040724
Yes Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-450202
Yes Proof of Concept
high severity 731/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.2
Prototype Pollution
SNYK-JS-LODASH-567746
Yes Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-608086
Yes Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-73638
Yes Proof of Concept
medium severity 541/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 4.4
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-73639
Yes Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Prototype Poisoning
SNYK-JS-QS-3153490
Yes Proof of Concept
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:bson:20180225
Yes Proof of Concept
high severity 579/1000
Why? Has a fix available, CVSS 7.3
Prototype Pollution
npm:extend:20180424
Yes No Known Exploit
medium severity 636/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
Prototype Pollution
npm:hoek:20180212
Yes Proof of Concept
medium severity 636/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
Prototype Pollution
npm:lodash:20180130
Yes Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
npm:sshpk:20180409
Yes Proof of Concept
medium severity 646/1000
Why? Mature exploit, Has a fix available, CVSS 5.2
Uninitialized Memory Exposure
npm:stringstream:20180511
Yes Mature
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Regular Expression Denial of Service (ReDoS)
npm:tough-cookie:20170905
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: bitfinex-api-node The new version differs by 250 commits.

See the full diff

Package name: kraken-api The new version differs by 24 commits.

See the full diff

Package name: mongodb The new version differs by 250 commits.
  • 79da11f 3.1.3
  • 337cb79 feat(core): update to mongodb-core 3.1.2
  • ff5fafc refactor(topology-base): `getServer` => `selectServer`
  • b33fc74 3.1.2
  • 78f6977 fix(mongo_client): translate options for connectWithUrl
  • 36e92f1 fix(db_ops): call collection.find() with correct parameters (Fix binance product update DeviaVir/zenbot#1795)
  • 759dd85 fix(buffer): replace deprecated Buffer constructor
  • cb9d915 docs(connect): remove references to MongoClient.connect
  • b8d2f1d fix(teardown): properly destroy a topology when initial connect fails
  • 64027e8 refactor(export): expose CommandCursor
  • 6ef85c4 refactor(export): expose AggregationCursor
  • 13d776f fix(cursor): set readPreference for cursor.count
  • a5d0f1d feat(deprecation): wrap deprecated functions
  • 4f907a0 feat(deprecation): create deprecation function
  • 666b8fa refactor(bulk): Unify bulk operations
  • a0d84f6 test(evergreen): adding evergreen config to native driver
  • b8471f1 fix(collection): isCapped returns false instead of undefined
  • 86344f4 fix(collection): ensure findAndModify always use readPreference primary
  • c25c519 test(countDocuments): full test coverage for countDocuments
  • 25ca557 docs(contributing): fix link to HISTORY.md
  • 4395110 chore(MongoClient): add missing legacy option name on warning message
  • 297d843 docs(sessions): updating docs for sessions
  • 15dc808 fix(db_ops): fix two incorrectly named variables
  • fca1185 fix(count-documents): return callback on error case

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Prototype Pollution
🦉 Regular Expression Denial of Service (ReDoS)
🦉 Command Injection

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants