hypersign-protocol / hyperfyre-frontend

A platform to automate the IDO whitelisting process using Hypersign SSI infrastructure.
https://fyre.hypersign.id
Apache License 2.0
3 stars 2 forks source link

[Snyk] Upgrade url-parse from 1.5.1 to 1.5.10 #1963

Open Vishwas1 opened 8 months ago

Vishwas1 commented 8 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade url-parse from 1.5.1 to 1.5.10.

As this is a private repository, Snyk-bot does not have access. Therefore, this PR has been created automatically, but appears to have been created by a real user.
:sparkles: Snyk has automatically assigned this pull request, [set who gets assigned](https://app.snyk.io/org/vishwas1/project/2720c8e6-f642-42c7-953d-4401e8d2c85f/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr/settings/integration). :information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
- The recommended version is **9 versions** ahead of your current version. - The recommended version was released **2 years ago**, on 2022-02-22. The recommended version fixes: Severity | Issue | PriorityScore (*) | Exploit Maturity | :-------------------------:|:-------------------------|-------------------------|:------------------------- | Prototype Poisoning
[SNYK-JS-QS-3153490](https://snyk.io/vuln/SNYK-JS-QS-3153490) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-SEMVER-3247795](https://snyk.io/vuln/SNYK-JS-SEMVER-3247795) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-SEMVER-3247795](https://snyk.io/vuln/SNYK-JS-SEMVER-3247795) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Information Exposure
[SNYK-JS-SIMPLEGET-2361683](https://snyk.io/vuln/SNYK-JS-SIMPLEGET-2361683) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Arbitrary File Overwrite
[SNYK-JS-TAR-1536528](https://snyk.io/vuln/SNYK-JS-TAR-1536528) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Arbitrary File Overwrite
[SNYK-JS-TAR-1536531](https://snyk.io/vuln/SNYK-JS-TAR-1536531) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Arbitrary File Write
[SNYK-JS-TAR-1579147](https://snyk.io/vuln/SNYK-JS-TAR-1579147) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Prototype Pollution
[SNYK-JS-ASYNC-2441827](https://snyk.io/vuln/SNYK-JS-ASYNC-2441827) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-JSONSCHEMA-1920922](https://snyk.io/vuln/SNYK-JS-JSONSCHEMA-1920922) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Prototype Pollution
[SNYK-JS-MONGOOSE-5777721](https://snyk.io/vuln/SNYK-JS-MONGOOSE-5777721) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Directory Traversal
[SNYK-JS-MOMENT-2440688](https://snyk.io/vuln/SNYK-JS-MOMENT-2440688) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-MOMENT-2944238](https://snyk.io/vuln/SNYK-JS-MOMENT-2944238) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-MONGOOSE-2961688](https://snyk.io/vuln/SNYK-JS-MONGOOSE-2961688) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Arbitrary File Write
[SNYK-JS-TAR-1579152](https://snyk.io/vuln/SNYK-JS-TAR-1579152) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Arbitrary File Write
[SNYK-JS-TAR-1579155](https://snyk.io/vuln/SNYK-JS-TAR-1579155) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Prototype Poisoning
[SNYK-JS-QS-3153490](https://snyk.io/vuln/SNYK-JS-QS-3153490) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Improper Input Validation
[SNYK-JS-URLPARSE-2407770](https://snyk.io/vuln/SNYK-JS-URLPARSE-2407770) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Improper Verification of Cryptographic Signature
[SNYK-JS-BROWSERIFYSIGN-6037026](https://snyk.io/vuln/SNYK-JS-BROWSERIFYSIGN-6037026) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Denial of Service (DoS)
[SNYK-JS-DECODEURICOMPONENT-3149970](https://snyk.io/vuln/SNYK-JS-DECODEURICOMPONENT-3149970) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-ES5EXT-6095076](https://snyk.io/vuln/SNYK-JS-ES5EXT-6095076) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-RAMDA-1582370](https://snyk.io/vuln/SNYK-JS-RAMDA-1582370) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-VALIDATOR-1090600](https://snyk.io/vuln/SNYK-JS-VALIDATOR-1090600) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Open Redirect
[SNYK-JS-GOT-2932019](https://snyk.io/vuln/SNYK-JS-GOT-2932019) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Open Redirect
[SNYK-JS-GOT-2932019](https://snyk.io/vuln/SNYK-JS-GOT-2932019) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-HTTPCACHESEMANTICS-3248783](https://snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Denial of Service (DoS)
[SNYK-JS-JSZIP-1251497](https://snyk.io/vuln/SNYK-JS-JSZIP-1251497) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-MPATH-1577289](https://snyk.io/vuln/SNYK-JS-MPATH-1577289) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Arbitrary File Write via Archive Extraction (Zip Slip)
[SNYK-JS-JSZIP-3188562](https://snyk.io/vuln/SNYK-JS-JSZIP-3188562) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-MINIMATCH-3050818](https://snyk.io/vuln/SNYK-JS-MINIMATCH-3050818) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Information Exposure
[SNYK-JS-NODEFETCH-2342118](https://snyk.io/vuln/SNYK-JS-NODEFETCH-2342118) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Information Exposure
[SNYK-JS-MONGODB-5871303](https://snyk.io/vuln/SNYK-JS-MONGODB-5871303) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-NODEMAILER-6219989](https://snyk.io/vuln/SNYK-JS-NODEMAILER-6219989) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-UGLIFYJS-1727251](https://snyk.io/vuln/SNYK-JS-UGLIFYJS-1727251) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Open Redirect
[SNYK-JS-URLPARSE-1533425](https://snyk.io/vuln/SNYK-JS-URLPARSE-1533425) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Access Restriction Bypass
[SNYK-JS-URLPARSE-2401205](https://snyk.io/vuln/SNYK-JS-URLPARSE-2401205) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Authorization Bypass
[SNYK-JS-URLPARSE-2407759](https://snyk.io/vuln/SNYK-JS-URLPARSE-2407759) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Authorization Bypass Through User-Controlled Key
[SNYK-JS-URLPARSE-2412697](https://snyk.io/vuln/SNYK-JS-URLPARSE-2412697) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-COOKIEJAR-3149984](https://snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept | Open Redirect
[SNYK-JS-EXPRESS-6474509](https://snyk.io/vuln/SNYK-JS-EXPRESS-6474509) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TAR-1536758](https://snyk.io/vuln/SNYK-JS-TAR-1536758) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | No Known Exploit | Prototype Pollution
[SNYK-JS-MINIMIST-2429795](https://snyk.io/vuln/SNYK-JS-MINIMIST-2429795) | **482/1000**
**Why?** Proof of Concept exploit, CVSS 7.5 | Proof of Concept (*) Note that the real score may have changed since the PR was raised.
Release notes
Package name: url-parse
  • 1.5.10 - 2022-02-22

    1.5.10

      </li>
      <li>
        <b>1.5.9</b> - <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases/tag/1.5.9">2022-02-20</a></br><p>1.5.9</p>
      </li>
      <li>
        <b>1.5.8</b> - <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases/tag/1.5.8">2022-02-19</a></br><p>1.5.8</p>
      </li>
      <li>
        <b>1.5.7</b> - <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases/tag/1.5.7">2022-02-16</a></br><p>1.5.7</p>
      </li>
      <li>
        <b>1.5.6</b> - <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases/tag/1.5.6">2022-02-13</a></br><p>1.5.6</p>
      </li>
      <li>
        <b>1.5.5</b> - <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases/tag/1.5.5">2022-02-13</a></br><p>1.5.5</p>
      </li>
      <li>
        <b>1.5.4</b> - <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases/tag/1.5.4">2021-12-28</a></br><p>[dist] 1.5.4</p>
      </li>
      <li>
        <b>1.5.3</b> - <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases/tag/1.5.3">2021-07-25</a></br><p>[dist] 1.5.3</p>
      </li>
      <li>
        <b>1.5.2</b> - <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases/tag/1.5.2">2021-07-25</a></br><p>[dist] 1.5.2</p>
      </li>
      <li>
        <b>1.5.1</b> - <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases/tag/1.5.1">2021-02-18</a></br><p>[dist] 1.5.1</p>
      </li>
    </ul>
    from <a href="https://snyk.io/redirect/github/unshiftio/url-parse/releases">url-parse GitHub release notes</a>

Commit messages
Package name: url-parse
  • 8cd4c6c 1.5.10
  • ce7a01f [fix] Improve handling of empty port
  • 0071490 [doc] Update JSDoc comment
  • a7044e3 [minor] Use more descriptive variable name
  • d547792 [security] Add credits for CVE-2022-0691
  • ad23357 1.5.9
  • 0e3fb54 [fix] Strip all control characters from the beginning of the URL
  • 61864a8 [security] Add credits for CVE-2022-0686
  • bb0104d 1.5.8
  • d5c6479 [fix] Handle the case where the port is specified but empty
  • 4f2ae67 [security] Add credits for CVE-2022-0639
  • 8b3f5f2 1.5.7
  • ef45a13 [fix] Readd the empty userinfo to `url.href` (#226)
  • 88df234 [doc] Add soft deprecation notice
  • 78e9f2f [security] Fix nits
  • e6fa434 [security] Add credits for incorrect handling of userinfo vulnerability
  • 4c9fa23 1.5.6
  • 7b0b8a6 Merge pull request #223 from unshiftio/fix/at-sign-handling-in-userinfo
  • e4a5807 1.5.5
  • 193b44b [minor] Simplify whitespace regex
  • 319851b [fix] Remove CR, HT, and LF
  • 4e53a8c [doc] Document that the returned hostname might be invalid
  • 9be7ee8 [fix] Correctly handle userinfo containing the at sign
  • f7774f6 [security] Fix typos in SECURITY.md
Compare

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

👩‍💻 Set who automatically gets assigned

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs