LinksHub aims to provide developers with access to a wide range of free resources and tools that they can use in their work. These resources include links to free software, libraries, frameworks, and other tools that can be used to build and deploy applications and websites.
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.
#### Changes included in this PR
- Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
- package.json
#### Vulnerabilities that will be fixed
##### With an upgrade:
Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity
:-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------
![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **661/1000** **Why?** Recently disclosed, Has a fix available, CVSS 7.5 | HTTP Request Smuggling [SNYK-JS-NEXT-6828456](https://snyk.io/vuln/SNYK-JS-NEXT-6828456) | No | No Known Exploit
![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **581/1000** **Why?** Recently disclosed, Has a fix available, CVSS 5.9 | Server-Side Request Forgery (SSRF) [SNYK-JS-NEXT-6828457](https://snyk.io/vuln/SNYK-JS-NEXT-6828457) | Yes | No Known Exploit
(*) Note that the real score may have changed since the PR was raised.
Commit messagesPackage name: next
The new version differs by 250 commits.
6aee03d fix router crash on revalidate + popstate (#62383)
8fd3d7e fix loading issue when navigating to page with async metadata (#61687)
05b972b revert changes to process default routes at build (#61241)
7026eb2 fix parallel route top-level catch-all normalization logic to support nested explicit (non-catchall) slot routes (#60776)
See the full diff
Check the changes in this PR to ensure they won't cause issues with your project.
------------
**Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.*
For more information:
🧐 [View latest project report](https://app.snyk.io/org/juanpablodiaz/project/791efabe-1cbd-4975-af5a-e1e5fec93e79?utm_source=github&utm_medium=referral&page=fix-pr)
🛠 [Adjust project settings](https://app.snyk.io/org/juanpablodiaz/project/791efabe-1cbd-4975-af5a-e1e5fec93e79?utm_source=github&utm_medium=referral&page=fix-pr/settings)
📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities)
[//]: # (snyk:metadata:{"prId":"5ba1f8dd-bedf-4dc3-a831-ebd50e33b70a","prPublicId":"5ba1f8dd-bedf-4dc3-a831-ebd50e33b70a","dependencies":[{"name":"next","from":"13.4.3","to":"14.1.1"}],"packageManager":"npm","projectPublicId":"791efabe-1cbd-4975-af5a-e1e5fec93e79","projectUrl":"https://app.snyk.io/org/juanpablodiaz/project/791efabe-1cbd-4975-af5a-e1e5fec93e79?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JS-NEXT-6828456","SNYK-JS-NEXT-6828457"],"upgrade":["SNYK-JS-NEXT-6828456","SNYK-JS-NEXT-6828457"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[661,581],"remediationStrategy":"vuln"})
---
**Learn how to fix vulnerabilities with free interactive lessons:**
🦉 [Server-Side Request Forgery (SSRF)](https://learn.snyk.io/lesson/ssrf-server-side-request-forgery/?loc=fix-pr)
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.
#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - package.json #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **661/1000****Why?** Recently disclosed, Has a fix available, CVSS 7.5 | HTTP Request Smuggling
[SNYK-JS-NEXT-6828456](https://snyk.io/vuln/SNYK-JS-NEXT-6828456) | No | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **581/1000**
**Why?** Recently disclosed, Has a fix available, CVSS 5.9 | Server-Side Request Forgery (SSRF)
[SNYK-JS-NEXT-6828457](https://snyk.io/vuln/SNYK-JS-NEXT-6828457) | Yes | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: next
The new version differs by 250 commits.