This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to upgrade snyk from 1.290.2 to 1.1237.0.
:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
- The recommended version is **1081 versions** ahead of your current version.
- The recommended version was released **24 days ago**, on 2023-10-24.
The recommended version fixes:
Severity | Issue | PriorityScore (*) | Exploit Maturity |
:-------------------------:|:-------------------------|-------------------------|:-------------------------
| Remote Code Execution (RCE) [SNYK-JS-PACRESOLVER-1564857](https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Authorization Bypass Through User-Controlled Key [SNYK-JS-PARSEPATH-2936439](https://snyk.io/vuln/SNYK-JS-PARSEPATH-2936439) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Prototype Pollution [SNYK-JS-NCONF-2395478](https://snyk.io/vuln/SNYK-JS-NCONF-2395478) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Server-side Request Forgery (SSRF) [SNYK-JS-NETMASK-1089716](https://snyk.io/vuln/SNYK-JS-NETMASK-1089716) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Server-side Request Forgery (SSRF) [SNYK-JS-NETMASK-6056519](https://snyk.io/vuln/SNYK-JS-NETMASK-6056519) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Prototype Pollution [SNYK-JS-LODASHSET-1320032](https://snyk.io/vuln/SNYK-JS-LODASHSET-1320032) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Open Redirect [SNYK-JS-GOT-2932019](https://snyk.io/vuln/SNYK-JS-GOT-2932019) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | No Known Exploit
| Denial of Service (DoS) [SNYK-JS-JSZIP-1251497](https://snyk.io/vuln/SNYK-JS-JSZIP-1251497) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Arbitrary File Write via Archive Extraction (Zip Slip) [SNYK-JS-JSZIP-3188562](https://snyk.io/vuln/SNYK-JS-JSZIP-3188562) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | No Known Exploit
| Command Injection [SNYK-JS-SNYK-3037342](https://snyk.io/vuln/SNYK-JS-SNYK-3037342) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Command Injection [SNYK-JS-SNYK-3038622](https://snyk.io/vuln/SNYK-JS-SNYK-3038622) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Code Injection [SNYK-JS-SNYK-3111871](https://snyk.io/vuln/SNYK-JS-SNYK-3111871) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | No Known Exploit
| Command Injection [SNYK-JS-SNYKDOCKERPLUGIN-3039679](https://snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Command Injection [SNYK-JS-SNYKGOPLUGIN-3037316](https://snyk.io/vuln/SNYK-JS-SNYKGOPLUGIN-3037316) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Command Injection [SNYK-JS-SNYKGRADLEPLUGIN-3038624](https://snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Command Injection [SNYK-JS-SNYKMVNPLUGIN-3038623](https://snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Cross-site Scripting (XSS) [SNYK-JS-PARSEURL-2935944](https://snyk.io/vuln/SNYK-JS-PARSEURL-2935944) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Information Exposure [SNYK-JS-PARSEURL-2935947](https://snyk.io/vuln/SNYK-JS-PARSEURL-2935947) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Server-side Request Forgery (SSRF) [SNYK-JS-PARSEURL-2936249](https://snyk.io/vuln/SNYK-JS-PARSEURL-2936249) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Cross-site Scripting (XSS) [SNYK-JS-PARSEURL-2942134](https://snyk.io/vuln/SNYK-JS-PARSEURL-2942134) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Server-side Request Forgery (SSRF) [SNYK-JS-PARSEURL-3023021](https://snyk.io/vuln/SNYK-JS-PARSEURL-3023021) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Improper Input Validation [SNYK-JS-PARSEURL-3024398](https://snyk.io/vuln/SNYK-JS-PARSEURL-3024398) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Command Injection [SNYK-JS-SNYKPYTHONPLUGIN-3039677](https://snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Command Injection [SNYK-JS-SNYKSBTPLUGIN-3038626](https://snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Command Injection [SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625](https://snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Prototype Pollution [SNYK-JS-XML2JS-5414874](https://snyk.io/vuln/SNYK-JS-XML2JS-5414874) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Prototype Pollution [SNYK-JS-XML2JS-5414874](https://snyk.io/vuln/SNYK-JS-XML2JS-5414874) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
| Regular Expression Denial of Service (ReDoS) [SNYK-JS-WORDWRAP-3149973](https://snyk.io/vuln/SNYK-JS-WORDWRAP-3149973) | **726/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept
(*) Note that the real score may have changed since the PR was raised.
Release notes Package name: snyk
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to upgrade snyk from 1.290.2 to 1.1237.0.
:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.- The recommended version is **1081 versions** ahead of your current version. - The recommended version was released **24 days ago**, on 2023-10-24. The recommended version fixes: Severity | Issue | PriorityScore (*) | Exploit Maturity | :-------------------------:|:-------------------------|-------------------------|:------------------------- | Remote Code Execution (RCE)
[SNYK-JS-PACRESOLVER-1564857](https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Authorization Bypass Through User-Controlled Key
[SNYK-JS-PARSEPATH-2936439](https://snyk.io/vuln/SNYK-JS-PARSEPATH-2936439) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Prototype Pollution
[SNYK-JS-NCONF-2395478](https://snyk.io/vuln/SNYK-JS-NCONF-2395478) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Server-side Request Forgery (SSRF)
[SNYK-JS-NETMASK-1089716](https://snyk.io/vuln/SNYK-JS-NETMASK-1089716) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Server-side Request Forgery (SSRF)
[SNYK-JS-NETMASK-6056519](https://snyk.io/vuln/SNYK-JS-NETMASK-6056519) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Prototype Pollution
[SNYK-JS-LODASHSET-1320032](https://snyk.io/vuln/SNYK-JS-LODASHSET-1320032) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Open Redirect
[SNYK-JS-GOT-2932019](https://snyk.io/vuln/SNYK-JS-GOT-2932019) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | No Known Exploit | Denial of Service (DoS)
[SNYK-JS-JSZIP-1251497](https://snyk.io/vuln/SNYK-JS-JSZIP-1251497) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Arbitrary File Write via Archive Extraction (Zip Slip)
[SNYK-JS-JSZIP-3188562](https://snyk.io/vuln/SNYK-JS-JSZIP-3188562) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | No Known Exploit | Command Injection
[SNYK-JS-SNYK-3037342](https://snyk.io/vuln/SNYK-JS-SNYK-3037342) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Command Injection
[SNYK-JS-SNYK-3038622](https://snyk.io/vuln/SNYK-JS-SNYK-3038622) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Code Injection
[SNYK-JS-SNYK-3111871](https://snyk.io/vuln/SNYK-JS-SNYK-3111871) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | No Known Exploit | Command Injection
[SNYK-JS-SNYKDOCKERPLUGIN-3039679](https://snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Command Injection
[SNYK-JS-SNYKGOPLUGIN-3037316](https://snyk.io/vuln/SNYK-JS-SNYKGOPLUGIN-3037316) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Command Injection
[SNYK-JS-SNYKGRADLEPLUGIN-3038624](https://snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Command Injection
[SNYK-JS-SNYKMVNPLUGIN-3038623](https://snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Cross-site Scripting (XSS)
[SNYK-JS-PARSEURL-2935944](https://snyk.io/vuln/SNYK-JS-PARSEURL-2935944) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Information Exposure
[SNYK-JS-PARSEURL-2935947](https://snyk.io/vuln/SNYK-JS-PARSEURL-2935947) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Server-side Request Forgery (SSRF)
[SNYK-JS-PARSEURL-2936249](https://snyk.io/vuln/SNYK-JS-PARSEURL-2936249) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Cross-site Scripting (XSS)
[SNYK-JS-PARSEURL-2942134](https://snyk.io/vuln/SNYK-JS-PARSEURL-2942134) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Server-side Request Forgery (SSRF)
[SNYK-JS-PARSEURL-3023021](https://snyk.io/vuln/SNYK-JS-PARSEURL-3023021) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Improper Input Validation
[SNYK-JS-PARSEURL-3024398](https://snyk.io/vuln/SNYK-JS-PARSEURL-3024398) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Command Injection
[SNYK-JS-SNYKPYTHONPLUGIN-3039677](https://snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Command Injection
[SNYK-JS-SNYKSBTPLUGIN-3038626](https://snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Command Injection
[SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625](https://snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Prototype Pollution
[SNYK-JS-XML2JS-5414874](https://snyk.io/vuln/SNYK-JS-XML2JS-5414874) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Prototype Pollution
[SNYK-JS-XML2JS-5414874](https://snyk.io/vuln/SNYK-JS-XML2JS-5414874) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-WORDWRAP-3149973](https://snyk.io/vuln/SNYK-JS-WORDWRAP-3149973) | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Proof of Concept (*) Note that the real score may have changed since the PR was raised.
Release notes
Package name: snyk
1.1237.0 (2023-10-23)
Bug Fixes
Features
1.1236.0 (2023-10-18)
Bug Fixes
1.1235.0 (2023-10-16)
Bug Fixes
Features
1.1234.0 (2023-10-10)
Bug Fixes
Features
1.1233.0 (2023-10-09)
1.1232.0 (2023-10-05)
Bug Fixes
1.1231.0 (2023-10-05)
Features
1.1230.0 (2023-10-04)
Features
1.1229.0 (2023-10-02)
Bug Fixes
Reverts
1.1228.0 (2023-09-28)
Features
snyk-nuget-plugin
(#4869) (79f125d)Reverts