Skip to content

[Snyk] Security upgrade trianglify from 1.1.0 to 4.0.0#15

Open
rkazakov wants to merge 1 commit intomasterfrom
snyk-fix-db44ba13b0f3050f2736eac830dceeec
Open

[Snyk] Security upgrade trianglify from 1.1.0 to 4.0.0#15
rkazakov wants to merge 1 commit intomasterfrom
snyk-fix-db44ba13b0f3050f2736eac830dceeec

Conversation

@rkazakov
Copy link
Copy Markdown
Member

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-1018905
No Proof of Concept
high severity 681/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.2
Command Injection
SNYK-JS-LODASH-1040724
No Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-450202
No Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-608086
No Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
SNYK-JS-LODASH-73638
No Proof of Concept
medium severity 541/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 4.4
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-73639
No Proof of Concept
high severity 681/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.2
Command Injection
SNYK-JS-LODASHTEMPLATE-1088054
No Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MINIMATCH-1019388
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MINIMATCH-3050818
No No Known Exploit
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Server-side Request Forgery (SSRF)
SNYK-JS-REQUEST-3361831
Yes Proof of Concept
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Prototype Pollution
SNYK-JS-TOUGHCOOKIE-5672873
Yes Proof of Concept
medium severity 636/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
Prototype Pollution
npm:lodash:20180130
No Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: trianglify The new version differs by 91 commits.
  • 1238aba v4.0.0
  • 8ced4fb Merge pull request #126 from qrohlf/next
  • 6d3e163 update changelog
  • 62c9423 4.0.0-next.5
  • e047cd9 fix issue with canvasOpts object spread
  • 0f0f418 re-work how the retina scaling works
  • da895a4 more more tests
  • 62a7583 v4.0.0-next.2
  • 4603292 more testing
  • 9faf26b fixup basic-web-example
  • 6d7645b fix string colorOpt shortcut
  • c8684b7 fix publish-beta script
  • 35b9986 npm publish-beta script
  • 13abf91 full test suite is now passing
  • 525a096 update workflows, readme
  • 91409a9 theoretically, this should work in all target environments
  • a7b102b transpile to es5 for older browsers/node runtimes
  • 4289c92 try again with the PR trigger
  • 7164dc0 test workflow naming
  • f439bc0 cleanup and workflow
  • 99ce0e4 standard.js linting
  • af94485 basic testing framework
  • 5070e9d cleanup colorFunction method signatures
  • 409ecca basic shadows color function works

See the full diff

Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)
🦉 Prototype Pollution
🦉 Server-side Request Forgery (SSRF)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants