Closed renovate[bot] closed 1 year ago
Name | Link |
---|---|
Latest commit | 5fdf4ca1d30282f96ebd5a6c1072500aad350abb |
Latest deploy log | https://app.netlify.com/sites/walnut/deploys/63b47c7d12bf980007d30f6d |
Deploy Preview | https://deploy-preview-171--walnut.netlify.app |
Preview on mobile | Toggle QR Code...Use your smartphone camera to open QR code link. |
To edit notification comments on pull requests, go to your Netlify site settings.
Sider has detected 1 warning on analyzing the commit 9014229.
If the errors persist even after retrying, the following actions may resolve them:
sider.yml
If you still have problems, feel free to ask us via chat. π¬
You can turn off such notifications if unnecessary.
This PR contains the following updates:
6.2.3
->6.2.4
GitHub Vulnerability Alerts
CVE-2022-24999
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an proto key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[proto]=b&a[proto]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).
Configuration
π Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
π¦ Automerge: Disabled by config. Please merge this manually once you are satisfied.
β» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
π Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.