hypersign-protocol / hyperfyre-frontend

A platform to automate the IDO whitelisting process using Hypersign SSI infrastructure.
https://fyre.hypersign.id
Apache License 2.0
3 stars 2 forks source link

[Snyk] Upgrade nodemailer from 6.6.2 to 6.9.13 #1965

Open Vishwas1 opened 7 months ago

Vishwas1 commented 7 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade nodemailer from 6.6.2 to 6.9.13.

As this is a private repository, Snyk-bot does not have access. Therefore, this PR has been created automatically, but appears to have been created by a real user.
:sparkles: Snyk has automatically assigned this pull request, [set who gets assigned](https://app.snyk.io/org/vishwas1/project/2720c8e6-f642-42c7-953d-4401e8d2c85f/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr/settings/integration). :information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
- The recommended version is **27 versions** ahead of your current version. - The recommended version was released **25 days ago**, on 2024-03-20. The recommended version fixes: Severity | Issue | PriorityScore (*) | Exploit Maturity | :-------------------------:|:-------------------------|-------------------------|:------------------------- | Improper Verification of Cryptographic Signature
[SNYK-JS-BROWSERIFYSIGN-6037026](https://snyk.io/vuln/SNYK-JS-BROWSERIFYSIGN-6037026) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Denial of Service (DoS)
[SNYK-JS-DECODEURICOMPONENT-3149970](https://snyk.io/vuln/SNYK-JS-DECODEURICOMPONENT-3149970) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-ES5EXT-6095076](https://snyk.io/vuln/SNYK-JS-ES5EXT-6095076) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Prototype Poisoning
[SNYK-JS-QS-3153490](https://snyk.io/vuln/SNYK-JS-QS-3153490) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-SEMVER-3247795](https://snyk.io/vuln/SNYK-JS-SEMVER-3247795) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-SEMVER-3247795](https://snyk.io/vuln/SNYK-JS-SEMVER-3247795) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Information Exposure
[SNYK-JS-SIMPLEGET-2361683](https://snyk.io/vuln/SNYK-JS-SIMPLEGET-2361683) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Arbitrary File Overwrite
[SNYK-JS-TAR-1536528](https://snyk.io/vuln/SNYK-JS-TAR-1536528) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Prototype Pollution
[SNYK-JS-ASYNC-2441827](https://snyk.io/vuln/SNYK-JS-ASYNC-2441827) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-MONGOOSE-5777721](https://snyk.io/vuln/SNYK-JS-MONGOOSE-5777721) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Directory Traversal
[SNYK-JS-MOMENT-2440688](https://snyk.io/vuln/SNYK-JS-MOMENT-2440688) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-MOMENT-2944238](https://snyk.io/vuln/SNYK-JS-MOMENT-2944238) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-MONGOOSE-2961688](https://snyk.io/vuln/SNYK-JS-MONGOOSE-2961688) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Prototype Poisoning
[SNYK-JS-QS-3153490](https://snyk.io/vuln/SNYK-JS-QS-3153490) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-JSONSCHEMA-1920922](https://snyk.io/vuln/SNYK-JS-JSONSCHEMA-1920922) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Arbitrary File Overwrite
[SNYK-JS-TAR-1536531](https://snyk.io/vuln/SNYK-JS-TAR-1536531) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Arbitrary File Write
[SNYK-JS-TAR-1579147](https://snyk.io/vuln/SNYK-JS-TAR-1579147) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Arbitrary File Write
[SNYK-JS-TAR-1579152](https://snyk.io/vuln/SNYK-JS-TAR-1579152) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Arbitrary File Write
[SNYK-JS-TAR-1579155](https://snyk.io/vuln/SNYK-JS-TAR-1579155) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Improper Input Validation
[SNYK-JS-URLPARSE-2407770](https://snyk.io/vuln/SNYK-JS-URLPARSE-2407770) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-COOKIEJAR-3149984](https://snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Open Redirect
[SNYK-JS-EXPRESS-6474509](https://snyk.io/vuln/SNYK-JS-EXPRESS-6474509) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-RAMDA-1582370](https://snyk.io/vuln/SNYK-JS-RAMDA-1582370) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-VALIDATOR-1090600](https://snyk.io/vuln/SNYK-JS-VALIDATOR-1090600) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Open Redirect
[SNYK-JS-GOT-2932019](https://snyk.io/vuln/SNYK-JS-GOT-2932019) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Open Redirect
[SNYK-JS-GOT-2932019](https://snyk.io/vuln/SNYK-JS-GOT-2932019) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Denial of Service (DoS)
[SNYK-JS-JSZIP-1251497](https://snyk.io/vuln/SNYK-JS-JSZIP-1251497) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Arbitrary File Write via Archive Extraction (Zip Slip)
[SNYK-JS-JSZIP-3188562](https://snyk.io/vuln/SNYK-JS-JSZIP-3188562) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-MINIMATCH-3050818](https://snyk.io/vuln/SNYK-JS-MINIMATCH-3050818) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Prototype Pollution
[SNYK-JS-MPATH-1577289](https://snyk.io/vuln/SNYK-JS-MPATH-1577289) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Information Exposure
[SNYK-JS-NODEFETCH-2342118](https://snyk.io/vuln/SNYK-JS-NODEFETCH-2342118) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Information Exposure
[SNYK-JS-MONGODB-5871303](https://snyk.io/vuln/SNYK-JS-MONGODB-5871303) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-NODEMAILER-6219989](https://snyk.io/vuln/SNYK-JS-NODEMAILER-6219989) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-HTTPCACHESEMANTICS-3248783](https://snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-UGLIFYJS-1727251](https://snyk.io/vuln/SNYK-JS-UGLIFYJS-1727251) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit | Open Redirect
[SNYK-JS-URLPARSE-1533425](https://snyk.io/vuln/SNYK-JS-URLPARSE-1533425) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Access Restriction Bypass
[SNYK-JS-URLPARSE-2401205](https://snyk.io/vuln/SNYK-JS-URLPARSE-2401205) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Authorization Bypass
[SNYK-JS-URLPARSE-2407759](https://snyk.io/vuln/SNYK-JS-URLPARSE-2407759) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Authorization Bypass Through User-Controlled Key
[SNYK-JS-URLPARSE-2412697](https://snyk.io/vuln/SNYK-JS-URLPARSE-2412697) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Prototype Pollution
[SNYK-JS-MINIMIST-2429795](https://snyk.io/vuln/SNYK-JS-MINIMIST-2429795) | **375/1000**
**Why?** CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TAR-1536758](https://snyk.io/vuln/SNYK-JS-TAR-1536758) | **375/1000**
**Why?** CVSS 7.5 | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
Release notes
Package name: nodemailer
  • 6.9.13 - 2024-03-20

    6.9.13 (2024-03-20)

    Bug Fixes

    • tls: Ensure servername for SMTP (d66fdd3)
  • 6.9.12 - 2024-03-08

    6.9.12 (2024-03-08)

    Bug Fixes

    • message-generation: Escape single quote in address names (4ae5fad)
  • 6.9.11 - 2024-02-29

    6.9.11 (2024-02-29)

    Bug Fixes

    • headers: Ensure that Content-type is the bottom header (c7cf97e)
  • 6.9.10 - 2024-02-22

    6.9.10 (2024-02-22)

    Bug Fixes

    • data-uri: Do not use regular expressions for parsing data URI schemes (12e65e9)
    • data-uri: Moved all data-uri regexes to use the non-regex parseDataUri method (edd5dfe)
  • 6.9.9 - 2024-02-01

    6.9.9 (2024-02-01)

    Bug Fixes

    • security: Fix issues described in GHSA-9h6g-pr28-7cqp. Do not use eternal matching pattern if only a few occurences are expected (dd8f5e8)
    • tests: Use native node test runner, added code coverage support, removed grunt (#1604) (be45c1b)
  • 6.9.8 - 2023-12-30

    6.9.8 (2023-12-30)

    Bug Fixes

    • punycode: do not use native punycode module (b4d0e0c)
  • 6.9.7 - 2023-10-22

    6.9.7 (2023-10-22)

    Bug Fixes

    • customAuth: Do not require user and pass to be set for custom authentication schemes (fixes #1584) (41d482c)
  • 6.9.6 - 2023-10-09

    6.9.6 (2023-10-09)

    Bug Fixes

    • inline: Use 'inline' as the default Content Dispostion value for embedded images (db32c93)
    • tests: Removed Node v12 from test matrix as it is not compatible with the test framework anymore (7fe0a60)
  • 6.9.5 - 2023-09-06

    6.9.5 (2023-09-06)

    Bug Fixes

    • license: Updated license year (da4744e)
  • 6.9.4 - 2023-07-19

    v6.9.4

      </li>
      <li>
        <b>6.9.3</b> - 2023-05-29
      </li>
      <li>
        <b>6.9.2</b> - 2023-05-11
      </li>
      <li>
        <b>6.9.1</b> - 2023-01-27
      </li>
      <li>
        <b>6.9.0</b> - 2023-01-12
      </li>
      <li>
        <b>6.8.0</b> - 2022-09-28
      </li>
      <li>
        <b>6.7.8</b> - 2022-08-11
      </li>
      <li>
        <b>6.7.7</b> - 2022-07-06
      </li>
      <li>
        <b>6.7.6</b> - 2022-06-30
      </li>
      <li>
        <b>6.7.5</b> - 2022-05-04
      </li>
      <li>
        <b>6.7.4</b> - 2022-04-28
      </li>
      <li>
        <b>6.7.3</b> - 2022-03-21
      </li>
      <li>
        <b>6.7.2</b> - 2021-11-26
      </li>
      <li>
        <b>6.7.1</b> - 2021-11-15
      </li>
      <li>
        <b>6.7.0</b> - 2021-10-11
      </li>
      <li>
        <b>6.6.5</b> - 2021-09-23
      </li>
      <li>
        <b>6.6.4</b> - 2021-09-23
      </li>
      <li>
        <b>6.6.3</b> - 2021-07-14
      </li>
      <li>
        <b>6.6.2</b> - 2021-06-18
      </li>
    </ul>
    from <a href="https://snyk.io/redirect/github/nodemailer/nodemailer/releases">nodemailer GitHub release notes</a>

Commit messages
Package name: nodemailer
  • fa63b52 chore(master): release 6.9.13 [skip-ci] (#1635)
  • ea0d32f Merge branch 'master' of github.com:nodemailer/nodemailer
  • d66fdd3 fix(tls): Ensure servername for SMTP
  • 1fcd103 chore(master): release 6.9.12 [skip-ci] (#1633)
  • 4ae5fad fix(message-generation): Escape single quote in address names
  • 88474d6 Merge branch 'master' of github.com:nodemailer/nodemailer
  • 14e1ddf Fixed tests
  • 2002282 chore(master): release 6.9.11 [skip-ci] (#1629)
  • c7cf97e fix(headers): Ensure that Content-type is the bottom header
  • ade59e0 chore(master): release 6.9.10 [skip-ci] (#1627)
  • edd5dfe fix(data-uri): Moved all data-uri regexes to use the non-regex parseDataUri method
  • db77249 Merge branch 'master' of github.com:nodemailer/nodemailer
  • 12e65e9 fix(data-uri): Do not use regular expressions for parsing data URI schemes
  • 5a2e10f chore(master): release 6.9.9 [skip-ci] (#1606)
  • dd8f5e8 fix(security): Fix issues described in GHSA-9h6g-pr28-7cqp. Do not use eternal matching pattern if only a few occurences are expected
  • 2c2b46a chore: do not use caret in version specifier
  • be45c1b fix(tests): Use native node test runner, added code coverage support, removed grunt (#1604)
  • 4233f6f chore(master): release 6.9.8 [skip-ci] (#1605)
  • 09d502f chore: removed double file
  • b4d0e0c fix(punycode): do not use native punycode module
  • 8376c02 Test new github notice syntax for README
  • bc46a3b Updated stale github action
  • 78bdaf8 chore: remove redundant AWS SDK for JavaScript v2 (#1593)
  • 971ced7 chore: add mailcatch.app to well-known/services.json (#1586)
Compare

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

👩‍💻 Set who automatically gets assigned

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs