Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade sockjs-client from 1.6.0 to 1.6.1 #21

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

P-Varshney08
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade sockjs-client from 1.6.0 to 1.6.1.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 1 version ahead of your current version.
  • The recommended version was released 2 years ago, on 2022-05-28.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Incomplete List of Disallowed Inputs
SNYK-JS-BABELTRAVERSE-5962462
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Path Traversal
SNYK-JS-WEBPACKDEVMIDDLEWARE-6476555
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-NTHCHECK-1586032
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Prototype Pollution
SNYK-JS-LOADERUTILS-3043105
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Improper Verification of Cryptographic Signature
SNYK-JS-BROWSERIFYSIGN-6037026
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Denial of Service (DoS)
SNYK-JS-DECODEURICOMPONENT-3149970
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Server-side Request Forgery (SSRF)
SNYK-JS-IP-6240864
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Authorization Bypass Through User-Controlled Key
SNYK-JS-PARSEPATH-2936439
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Prototype Pollution
SNYK-JS-LOADERUTILS-3043105
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Prototype Pollution
SNYK-JS-JSON5-3182856
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LOADERUTILS-3042992
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LOADERUTILS-3105943
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JS-TAR-6476909
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-TERSER-2806366
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-TERSER-2806366
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-UAPARSERJS-3244450
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Information Exposure
SNYK-JS-EVENTSOURCE-2823375
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Prototype Pollution
SNYK-JS-JSON5-3182856
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Cross-site Scripting (XSS)
SNYK-JS-PARSEURL-2935944
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Information Exposure
SNYK-JS-PARSEURL-2935947
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Server-side Request Forgery (SSRF)
SNYK-JS-PARSEURL-2936249
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Cross-site Scripting (XSS)
SNYK-JS-PARSEURL-2942134
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Server-side Request Forgery (SSRF)
SNYK-JS-PARSEURL-3023021
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Improper Input Validation
SNYK-JS-PARSEURL-3024398
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LOADERUTILS-3042992
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LOADERUTILS-3105943
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Release notes
Package name: sockjs-client from sockjs-client GitHub release notes
Commit messages
Package name: sockjs-client
  • bdec828 1.6.1
  • f656e05 Merge pull request #585 from sockjs/dependabot/npm_and_yarn/minimist-1.2.6
  • f19946b Merge pull request #590 from brammitch/main
  • 1cf4a5a Update eventsource due to CVE-2022-1650
  • 33aa4b6 Bump minimist from 1.2.5 to 1.2.6

Compare


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants