gzacharski / AGH-Praca-inzynierska-front-end

Praca inżynierska "System do wspomagania zarządzania placówką profilaktyki zdrowotnej" autorstwa Bartosza Kordka i Grzegorza Zacharskiego.
MIT License
1 stars 0 forks source link

[Snyk] Upgrade yup from 0.32.9 to 0.32.11 #575

Open gzacharski opened 6 months ago

gzacharski commented 6 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade yup from 0.32.9 to 0.32.11.

:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
- The recommended version is **2 versions** ahead of your current version. - The recommended version was released **3 years ago**, on 2021-10-12. The recommended version fixes: Severity | Issue | PriorityScore (*) | Exploit Maturity | :-------------------------:|:-------------------------|-------------------------|:------------------------- | Arbitrary File Write
[SNYK-JS-TAR-1579155](https://snyk.io/vuln/SNYK-JS-TAR-1579155) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Improper Verification of Cryptographic Signature
[SNYK-JS-BROWSERIFYSIGN-6037026](https://snyk.io/vuln/SNYK-JS-BROWSERIFYSIGN-6037026) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Improper Input Validation
[SNYK-JS-FOLLOWREDIRECTS-6141137](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Improper Input Validation
[SNYK-JS-FOLLOWREDIRECTS-6141137](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-LUXON-3225081](https://snyk.io/vuln/SNYK-JS-LUXON-3225081) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Arbitrary File Overwrite
[SNYK-JS-TAR-1536528](https://snyk.io/vuln/SNYK-JS-TAR-1536528) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Server-side Request Forgery (SSRF)
[SNYK-JS-IP-6240864](https://snyk.io/vuln/SNYK-JS-IP-6240864) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Arbitrary File Overwrite
[SNYK-JS-TAR-1536531](https://snyk.io/vuln/SNYK-JS-TAR-1536531) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Arbitrary File Write
[SNYK-JS-TAR-1579147](https://snyk.io/vuln/SNYK-JS-TAR-1579147) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Arbitrary File Write
[SNYK-JS-TAR-1579152](https://snyk.io/vuln/SNYK-JS-TAR-1579152) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Prototype Pollution
[SNYK-JS-JSONSCHEMA-1920922](https://snyk.io/vuln/SNYK-JS-JSONSCHEMA-1920922) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Improper Input Validation
[SNYK-JS-URLPARSE-2407770](https://snyk.io/vuln/SNYK-JS-URLPARSE-2407770) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Prototype Poisoning
[SNYK-JS-QS-3153490](https://snyk.io/vuln/SNYK-JS-QS-3153490) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Prototype Poisoning
[SNYK-JS-QS-3153490](https://snyk.io/vuln/SNYK-JS-QS-3153490) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Directory Traversal
[SNYK-JS-MOMENT-2440688](https://snyk.io/vuln/SNYK-JS-MOMENT-2440688) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-MOMENT-2944238](https://snyk.io/vuln/SNYK-JS-MOMENT-2944238) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TMPL-1583443](https://snyk.io/vuln/SNYK-JS-TMPL-1583443) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Denial of Service (DoS)
[SNYK-JS-DECODEURICOMPONENT-3149970](https://snyk.io/vuln/SNYK-JS-DECODEURICOMPONENT-3149970) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-ES5EXT-6095076](https://snyk.io/vuln/SNYK-JS-ES5EXT-6095076) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-ASYNC-2441827](https://snyk.io/vuln/SNYK-JS-ASYNC-2441827) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Uncontrolled Resource Consumption ('Resource Exhaustion')
[SNYK-JS-TAR-6476909](https://snyk.io/vuln/SNYK-JS-TAR-6476909) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Denial of Service (DoS)
[SNYK-JS-NWSAPI-2841516](https://snyk.io/vuln/SNYK-JS-NWSAPI-2841516) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-PATHPARSE-1077067](https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-POSTCSS-1090595](https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-POSTCSS-1255640](https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Open Redirect
[SNYK-JS-EXPRESS-6474509](https://snyk.io/vuln/SNYK-JS-EXPRESS-6474509) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Information Exposure
[SNYK-JS-FOLLOWREDIRECTS-2332181](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-2332181) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Information Exposure
[SNYK-JS-FOLLOWREDIRECTS-6444610](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6444610) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Information Exposure
[SNYK-JS-FOLLOWREDIRECTS-2332181](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-2332181) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Information Exposure
[SNYK-JS-FOLLOWREDIRECTS-6444610](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6444610) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-ISSVG-1085627](https://snyk.io/vuln/SNYK-JS-ISSVG-1085627) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-ISSVG-1243891](https://snyk.io/vuln/SNYK-JS-ISSVG-1243891) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Reverse Tabnabbing
[SNYK-JS-ISTANBULREPORTS-2328088](https://snyk.io/vuln/SNYK-JS-ISTANBULREPORTS-2328088) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Prototype Pollution
[SNYK-JS-JSON5-3182856](https://snyk.io/vuln/SNYK-JS-JSON5-3182856) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-JSON5-3182856](https://snyk.io/vuln/SNYK-JS-JSON5-3182856) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Authorization Bypass
[SNYK-JS-URLPARSE-2407759](https://snyk.io/vuln/SNYK-JS-URLPARSE-2407759) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Authorization Bypass Through User-Controlled Key
[SNYK-JS-URLPARSE-2412697](https://snyk.io/vuln/SNYK-JS-URLPARSE-2412697) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-POSTCSS-1090595](https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-POSTCSS-1255640](https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Server-side Request Forgery (SSRF)
[SNYK-JS-REQUEST-3361831](https://snyk.io/vuln/SNYK-JS-REQUEST-3361831) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Information Exposure
[SNYK-JS-NANOID-2332193](https://snyk.io/vuln/SNYK-JS-NANOID-2332193) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TERSER-2806366](https://snyk.io/vuln/SNYK-JS-TERSER-2806366) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TERSER-2806366](https://snyk.io/vuln/SNYK-JS-TERSER-2806366) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Prototype Pollution
[SNYK-JS-TOUGHCOOKIE-5672873](https://snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-TOUGHCOOKIE-5672873](https://snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Open Redirect
[SNYK-JS-URLPARSE-1533425](https://snyk.io/vuln/SNYK-JS-URLPARSE-1533425) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Access Restriction Bypass
[SNYK-JS-URLPARSE-2401205](https://snyk.io/vuln/SNYK-JS-URLPARSE-2401205) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Information Exposure
[SNYK-JS-EVENTSOURCE-2823375](https://snyk.io/vuln/SNYK-JS-EVENTSOURCE-2823375) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Information Exposure
[SNYK-JS-FOLLOWREDIRECTS-2396346](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-2396346) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Information Exposure
[SNYK-JS-FOLLOWREDIRECTS-2396346](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-2396346) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TAR-1536758](https://snyk.io/vuln/SNYK-JS-TAR-1536758) | **425/1000**
**Why?** CVSS 8.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-WORDWRAP-3149973](https://snyk.io/vuln/SNYK-JS-WORDWRAP-3149973) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-MINIMIST-2429795](https://snyk.io/vuln/SNYK-JS-MINIMIST-2429795) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept | Incomplete List of Disallowed Inputs
[SNYK-JS-BABELTRAVERSE-5962462](https://snyk.io/vuln/SNYK-JS-BABELTRAVERSE-5962462) | **425/1000**
**Why?** CVSS 8.5 | Proof of Concept (*) Note that the real score may have changed since the PR was raised.
Release notes
Package name: yup
  • 0.32.11 - 2021-10-12

    v0.32.11

      </li>
      <li>
        <b>0.32.10</b> - <a href="https://snyk.io/redirect/github/jquense/yup/releases/tag/v0.32.10">2021-10-11</a></br><p>v0.32.10</p>
      </li>
      <li>
        <b>0.32.9</b> - <a href="https://snyk.io/redirect/github/jquense/yup/releases/tag/v0.32.9">2021-02-17</a></br><p>v0.32.9</p>
      </li>
    </ul>
    from <a href="https://snyk.io/redirect/github/jquense/yup/releases">yup GitHub release notes</a>

Commit messages
Package name: yup
  • d072af3 Publish v0.32.11
  • 2015c0f fix: dep ranges
  • 846161e Publish v0.32.10
  • 1d767b4 chore: fix ts compilation
  • 2778b88 Merge pull request #1483 from jquense/bug-bash
  • 4bdc4e4 chore: bump deps and clean up tooling
  • 5334349 fix: carry over excluded edges when concating objects
  • f3056f2 fix: missing transforms on concat
  • 03584f6 feat: add resolved to params (#1437)
  • 7842afb fix: oneOf, notOneOf swallowing multiple errors (#1434)
  • 7576cd8 feat: add types to setLocale (#1427)
  • eab974f Update typescript.md
  • 877f777 chore(deps): update dependency lint-staged to v11 (#1359)
  • 94cfd11 feat: allows custom types to be passed to avoid cast to ObjectSchema (#1358)
  • 70d0b67 fix: update lodash/lodash-es to fix CVEs flagged in 4.17.20 (#1334)
  • acbb8b4 fix(utils): use named functions for default exports (#1329)
  • 5eda549 fix: prevent unhandled Promise rejection when returning rejected Promise inside test function (#1327)
  • 91ace1e fix: SchemaOf<>'s treatment of Date objects. (#1305)
  • 0fca0a4 docs: clarify wording
  • 4c17508 fix: fix the typo for the array length validation (#1287)
  • bbd44d0 chore(deps): update dependency husky to v5 (#1251)
  • 357ffa4 docs: Fix typo (#1272)
Compare

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs