Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 10 vulnerabilities #11

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

tjenkinson
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JS-ENGINEIO-1056749
Yes Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JS-SOCKETIOPARSER-1056752
Yes Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-WS-1296835
Yes Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
Yes No Known Exploit
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:ms:20170412
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
npm:negotiator:20160616
No No Known Exploit
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Remote Memory Exposure
npm:ws:20160104
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
npm:ws:20160624
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Insecure Randomness
npm:ws:20160920
No No Known Exploit
high severity 761/1000
Why? Mature exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
npm:ws:20171108
No Mature

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: debug The new version differs by 154 commits.

See the full diff

Package name: engine.io The new version differs by 175 commits.
  • 9df38d5 docs: update the list of supported engines
  • 078527a feat: disable perMessageDeflate by default
  • 54c6797 docs: update the default value of maxHttpBufferSize
  • 1916d3a test: remove Node.js 8 from the test matrix
  • 14ca7a1 chore: restore package-lock.json file
  • ed29e59 chore: bump engine.io-parser version
  • 03b4967 chore: bump cookie version
  • 09708eb docs(changelog): include changelog for release 3.4.2
  • 82cdca2 fix: remove implicit require of uws
  • 94623c8 docs(changelog): include changelog for release 3.4.1
  • dcdbccb fix: ignore errors when forcefully closing the socket (Multiplexing connection and client disconnect socketio/socket.io#601)
  • 71ece3e chore(release): 4.0.0-alpha.1
  • b27215d chore(release): 4.0.0-alpha.0
  • 734f9d1 feat: decrease the default value of maxHttpBufferSize
  • 61b9492 feat: use the cors module to handle cross-origin requests
  • bafe684 refactor: refactor the handling of the options
  • 61e639b test: add Node.js 10, 12 and 13 in the test matrix
  • a374471 feat: disable cookie by default and add sameSite attribute
  • 31ff875 feat: reverse the ping-pong mechanism
  • 2ae2520 chore: point towards the v4 branch
  • f3c291f feat: generateId method can now return a Promise
  • 33564b2 refactor: use prettier to format code
  • da93fb6 refactor: migrate to ES6 syntax
  • ecfcc69 [chore] Release 3.4.0

See the full diff

Package name: socket.io-adapter The new version differs by 12 commits.

See the full diff

Package name: socket.io-parser The new version differs by 55 commits.

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)
🦉 Regular Expression Denial of Service (ReDoS)
🦉 Regular Expression Denial of Service (ReDoS)
🦉 More lessons are available in Snyk Learn

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants