Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade nodemailer from 6.4.14 to 6.9.15 #208

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

MRdevX
Copy link
Owner

@MRdevX MRdevX commented Sep 25, 2024

snyk-top-banner

Snyk has created this PR to upgrade nodemailer from 6.4.14 to 6.9.15.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 37 versions ahead of your current version.

  • The recommended version was released on 22 days ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Prototype Pollution
SNYK-JS-ASYNC-2441827
696 Proof of Concept
high severity Prototype Pollution
SNYK-JS-ASYNC-2441827
696 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-AXIOS-1579269
696 Proof of Concept
high severity Asymmetric Resource Consumption (Amplification)
SNYK-JS-BODYPARSER-7926860
696 No Known Exploit
high severity Uncontrolled resource consumption
SNYK-JS-BRACES-6838727
696 Proof of Concept
high severity Prototype Pollution
SNYK-JS-MONGOOSE-5777721
696 Proof of Concept
high severity Prototype Pollution
SNYK-JS-MQUERY-1050858
696 Proof of Concept
high severity Code Injection
SNYK-JS-LODASH-1040724
696 Proof of Concept
high severity Directory Traversal
SNYK-JS-MOMENT-2440688
696 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-MOMENT-2944238
696 Proof of Concept
high severity Command Injection
SNYK-JS-VIZION-565230
696 Proof of Concept
high severity Prototype Poisoning
SNYK-JS-QS-3153490
696 Proof of Concept
high severity Improper Handling of Extra Parameters
SNYK-JS-FOLLOWREDIRECTS-6141137
696 Proof of Concept
high severity Server-side Request Forgery (SSRF)
SNYK-JS-IP-6240864
696 Proof of Concept
high severity Prototype Pollution
SNYK-JS-MQUERY-1089718
696 Proof of Concept
high severity Server-side Request Forgery (SSRF)
SNYK-JS-NETMASK-1089716
696 Proof of Concept
high severity Server-side Request Forgery (SSRF)
SNYK-JS-NETMASK-6056519
696 Proof of Concept
high severity Command Injection
SNYK-JS-NODEMAILER-1038834
696 Proof of Concept
high severity Command Injection
SNYK-JS-SYSTEMINFORMATION-1050436
696 Proof of Concept
high severity Command Injection
SNYK-JS-SYSTEMINFORMATION-1074913
696 Mature
high severity Prototype Pollution
SNYK-JS-MONGOOSE-2961688
696 Proof of Concept
medium severity Server-Side Request Forgery (SSRF)
SNYK-JS-AXIOS-1038255
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SIDEWAYFORMULA-3317169
696 No Known Exploit
medium severity Prototype Pollution
SNYK-JS-MPATH-1577289
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-1018905
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-MINIMATCH-3050818
696 No Known Exploit
medium severity Information Exposure
SNYK-JS-MONGODB-5871303
696 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090602
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHPARSE-1077067
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHTOREGEXP-7925106
696 Proof of Concept
medium severity Cross-site Scripting
SNYK-JS-EXPRESS-7926867
696 No Known Exploit
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-2332181
696 Proof of Concept
medium severity Server-side Request Forgery (SSRF)
SNYK-JS-SYSTEMINFORMATION-1078290
696 Proof of Concept
medium severity Arbitrary Command Injection
SNYK-JS-SYSTEMINFORMATION-1243748
696 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090599
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090600
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090601
696 Proof of Concept
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-6444610
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-GLOBPARENT-1016905
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-COLORSTRING-1082939
696 Proof of Concept
medium severity Open Redirect
SNYK-JS-EXPRESS-6474509
696 No Known Exploit
medium severity HTTP Header Injection
SNYK-JS-NODEMAILER-1296415
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-NODEMAILER-6219989
696 Proof of Concept
medium severity Server-side Request Forgery (SSRF)
SNYK-JS-SWAGGERUIDIST-2314884
696 Mature
medium severity Server-side Request Forgery (SSRF)
SNYK-JS-SWAGGERUIDIST-6056393
696 Proof of Concept
medium severity Server-side Request Forgery (SSRF)
SNYK-JS-SWAGGERUIEXPRESS-6815423
696 Proof of Concept
medium severity Server-side Request Forgery (SSRF)
SNYK-JS-SWAGGERUIEXPRESS-6815424
696 Mature
medium severity Denial of Service (DoS)
SNYK-JS-SYSTEMINFORMATION-1073627
696 No Known Exploit
medium severity Prototype Pollution
SNYK-JS-MONGOOSE-1086688
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090602
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090599
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090600
696 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090601
696 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
696 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
696 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-WORDWRAP-3149973
696 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
696 Proof of Concept
low severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-2396346
696 No Known Exploit
low severity Improper Input Validation
SNYK-JS-SYSTEMINFORMATION-1244526
696 Proof of Concept
low severity Cross-site Scripting
SNYK-JS-SEND-7926862
696 No Known Exploit
low severity Cross-site Scripting
SNYK-JS-SERVESTATIC-7926865
696 No Known Exploit
critical severity Prototype Pollution
SNYK-JS-SYSTEMINFORMATION-1043753
696 No Known Exploit
critical severity Prototype Pollution
SNYK-JS-SYSTEMINFORMATION-1047312
696 No Known Exploit
Release notes
Package name: nodemailer
  • 6.9.15 - 2024-09-03

    6.9.15 (2024-08-08)

    Bug Fixes

  • 6.9.14 - 2024-06-19

    6.9.14 (2024-06-19)

    Bug Fixes

    • api: Added support for Ethereal authentication (56b2205)
    • services.json: Add Email Services Provider Feishu Mail (CN) (#1648) (e9e9ecc)
    • services.json: update Mailtrap host and port in well known (#1652) (fc2c9ea)
    • well-known-services: Add Loopia in well known services (#1655) (21a28a1)
  • 6.9.13 - 2024-03-20

    6.9.13 (2024-03-20)

    Bug Fixes

    • tls: Ensure servername for SMTP (d66fdd3)
  • 6.9.12 - 2024-03-08

    6.9.12 (2024-03-08)

    Bug Fixes

    • message-generation: Escape single quote in address names (4ae5fad)
  • 6.9.11 - 2024-02-29

    6.9.11 (2024-02-29)

    Bug Fixes

    • headers: Ensure that Content-type is the bottom header (c7cf97e)
  • 6.9.10 - 2024-02-22

    6.9.10 (2024-02-22)

    Bug Fixes

    • data-uri: Do not use regular expressions for parsing data URI schemes (12e65e9)
    • data-uri: Moved all data-uri regexes to use the non-regex parseDataUri method (edd5dfe)
  • 6.9.9 - 2024-02-01

    6.9.9 (2024-02-01)

    Bug Fixes

    • security: Fix issues described in GHSA-9h6g-pr28-7cqp. Do not use eternal matching pattern if only a few occurences are expected (dd8f5e8)
    • tests: Use native node test runner, added code coverage support, removed grunt (#1604) (be45c1b)
  • 6.9.8 - 2023-12-30

    6.9.8 (2023-12-30)

    Bug Fixes

    • punycode: do not use native punycode module (b4d0e0c)
  • 6.9.7 - 2023-10-22

    6.9.7 (2023-10-22)

    Bug Fixes

    • customAuth: Do not require user and pass to be set for custom authentication schemes (fixes #1584) (41d482c)
  • 6.9.6 - 2023-10-09

    6.9.6 (2023-10-09)

    Bug Fixes

    • inline: Use 'inline' as the default Content Dispostion value for embedded images (db32c93)
    • tests: Removed Node v12 from test matrix as it is not compatible with the test framework anymore (7fe0a60)
  • 6.9.5 - 2023-09-06
  • 6.9.4 - 2023-07-19
  • 6.9.3 - 2023-05-29
  • 6.9.2 - 2023-05-11
  • 6.9.1 - 2023-01-27
  • 6.9.0 - 2023-01-12
  • 6.8.0 - 2022-09-28
  • 6.7.8 - 2022-08-11
  • 6.7.7 - 2022-07-06
  • 6.7.6 - 2022-06-30
  • 6.7.5 - 2022-05-04
  • 6.7.4 - 2022-04-28
  • 6.7.3 - 2022-03-21
  • 6.7.2 - 2021-11-26
  • 6.7.1 - 2021-11-15
  • 6.7.0 - 2021-10-11
  • 6.6.5 - 2021-09-23
  • 6.6.4 - 2021-09-23
  • 6.6.3 - 2021-07-14
  • 6.6.2 - 2021-06-18
  • 6.6.1 - 2021-05-23
  • 6.6.0 - 2021-04-28
  • 6.5.0 - 2021-02-26
  • 6.4.18 - 2021-02-11
  • 6.4.17 - 2020-12-11
  • 6.4.16 - 2020-11-12
  • 6.4.15 - 2020-11-06
  • 6.4.14 - 2020-10-14
from nodemailer GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

Snyk has created this PR to upgrade nodemailer from 6.4.14 to 6.9.15.

See this package in npm:
nodemailer

See this project in Snyk:
https://app.snyk.io/org/m8rashidi/project/d6ac0ae4-fc5a-47fb-b858-5f4a05d81990?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

MIME: GeoJSON mapping customAuth requires user and pass in credentials
2 participants