This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to upgrade sequelize from 6.21.2 to 6.33.0.
:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
- The recommended version is **34 versions** ahead of your current version.
- The recommended version was released **a month ago**, on 2023-09-08.
The recommended version fixes:
Severity | Issue | PriorityScore (*) | Exploit Maturity |
:-------------------------:|:-------------------------|-------------------------|:-------------------------
| Prototype Pollution [SNYK-JS-DOTTIE-3332763](https://snyk.io/vuln/SNYK-JS-DOTTIE-3332763) | **482/1000** **Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept
| Improper Filtering of Special Elements [SNYK-JS-SEQUELIZE-3324088](https://snyk.io/vuln/SNYK-JS-SEQUELIZE-3324088) | **482/1000** **Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit
| Information Exposure [SNYK-JS-SEQUELIZE-3324089](https://snyk.io/vuln/SNYK-JS-SEQUELIZE-3324089) | **482/1000** **Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit
| Access of Resource Using Incompatible Type ('Type Confusion') [SNYK-JS-SEQUELIZE-3324090](https://snyk.io/vuln/SNYK-JS-SEQUELIZE-3324090) | **482/1000** **Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit
(*) Note that the real score may have changed since the PR was raised.
Release notes Package name: sequelize
2e50bd9 feat(postgres, sqlite): allow override of conflict keys for bulkCreate (#15787)
46d3553 fix: pass CLS transaction to model hooks (#15818)
1e68681 feat(postgres, sqlite): add conflictWhere option to upsert (#15786)
5bda2ce fix: fix unnamed dollar string detection (#15759)
1ad9a64 fix(postgres): escape identifier in createSchema and dropSchema (#15752)
1b94462 fix(postgres): make sync not fail when trying to create existing enum (#15718)
d3f5b5a feat: throw an error if attribute includes parentheses (fixes CVE-2023-22578) (#15710)
53bd9b7 meta: fix null test getWhereConditions (#15705)
Compare
**Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.*
For more information:
🧐 [View latest project report](https://app.snyk.io/org/saamstep/project/13c50e71-f715-4e0b-913d-47b8a7304aa8?utm_source=github&utm_medium=referral&page=upgrade-pr)
🛠 [Adjust upgrade PR settings](https://app.snyk.io/org/saamstep/project/13c50e71-f715-4e0b-913d-47b8a7304aa8/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr)
🔕 [Ignore this dependency or unsubscribe from future upgrade PRs](https://app.snyk.io/org/saamstep/project/13c50e71-f715-4e0b-913d-47b8a7304aa8/settings/integration?pkg=sequelize&utm_source=github&utm_medium=referral&page=upgrade-pr#auto-dep-upgrades)
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to upgrade sequelize from 6.21.2 to 6.33.0.
:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.- The recommended version is **34 versions** ahead of your current version. - The recommended version was released **a month ago**, on 2023-09-08. The recommended version fixes: Severity | Issue | PriorityScore (*) | Exploit Maturity | :-------------------------:|:-------------------------|-------------------------|:------------------------- | Prototype Pollution
[SNYK-JS-DOTTIE-3332763](https://snyk.io/vuln/SNYK-JS-DOTTIE-3332763) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Improper Filtering of Special Elements
[SNYK-JS-SEQUELIZE-3324088](https://snyk.io/vuln/SNYK-JS-SEQUELIZE-3324088) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Information Exposure
[SNYK-JS-SEQUELIZE-3324089](https://snyk.io/vuln/SNYK-JS-SEQUELIZE-3324089) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Access of Resource Using Incompatible Type ('Type Confusion')
[SNYK-JS-SEQUELIZE-3324090](https://snyk.io/vuln/SNYK-JS-SEQUELIZE-3324090) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
Release notes
Package name: sequelize
6.33.0 (2023-09-08)
Bug Fixes
Features
6.32.1 (2023-06-17)
Bug Fixes
6.32.0 (2023-06-01)
Bug Fixes
types
condition to the front (#16085) (99c3530)Features
Commit messages
Package name: sequelize
**Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/saamstep/project/13c50e71-f715-4e0b-913d-47b8a7304aa8?utm_source=github&utm_medium=referral&page=upgrade-pr) 🛠 [Adjust upgrade PR settings](https://app.snyk.io/org/saamstep/project/13c50e71-f715-4e0b-913d-47b8a7304aa8/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr) 🔕 [Ignore this dependency or unsubscribe from future upgrade PRs](https://app.snyk.io/org/saamstep/project/13c50e71-f715-4e0b-913d-47b8a7304aa8/settings/integration?pkg=sequelize&utm_source=github&utm_medium=referral&page=upgrade-pr#auto-dep-upgrades)