Closed renovate[bot] closed 1 month ago
The latest updates on your projects. Learn more about Vercel for Git ↗︎
Name | Status | Preview | Comments | Updated (UTC) |
---|---|---|---|---|
nusmods-export | ✅ Ready (Inspect) | Visit Preview | 💬 Add feedback | May 28, 2024 5:18pm |
nusmods-website | ✅ Ready (Inspect) | Visit Preview | 💬 Add feedback | May 28, 2024 5:18pm |
All modified and coverable lines are covered by tests :white_check_mark:
Project coverage is 53.53%. Comparing base (
e5b9774
) to head (5a996f7
).
:umbrella: View full report in Codecov by Sentry.
:loudspeaker: Have feedback on the report? Share it here.
This PR contains the following updates:
3.0.2
->3.0.3
GitHub Vulnerability Alerts
CVE-2024-36361
Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the
compileClient
,compileFileClient
, orcompileClientWithDependenciesTracked
function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers.Release Notes
pugjs/pug (pug)
### [`v3.0.3`](https://togithub.com/pugjs/pug/releases/tag/pug%403.0.3) [Compare Source](https://togithub.com/pugjs/pug/compare/pug@3.0.2...pug@3.0.3) #### Bug Fixes - Update pug-code-gen with the following fix: ([#3438](https://togithub.com/pugjs/pug/issues/3438)) Validate `templateName` and `globals` are valid JavaScript identifiers to prevent possible remote code execution if un-trusted user input is passed to the compilation optionsConfiguration
📅 Schedule: Branch creation - "" in timezone Asia/Singapore, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.