raindigi / site-landing

Equithon 2019's landing page.
https://equithon.org
MIT License
0 stars 0 forks source link

[Snyk] Fix for 48 vulnerabilities #348

Open saurabharch opened 7 months ago

saurabharch commented 7 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - package.json - package-lock.json #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-ANSIREGEX-1583908](https://snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908) | Yes | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **616/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.9 | Server-Side Request Forgery (SSRF)
[SNYK-JS-AXIOS-1038255](https://snyk.io/vuln/SNYK-JS-AXIOS-1038255) | Yes | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-AXIOS-1579269](https://snyk.io/vuln/SNYK-JS-AXIOS-1579269) | Yes | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **676/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.1 | Cross-site Request Forgery (CSRF)
[SNYK-JS-AXIOS-6032459](https://snyk.io/vuln/SNYK-JS-AXIOS-6032459) | Yes | Proof of Concept ![critical severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png "critical severity") | **679/1000**
**Why?** Has a fix available, CVSS 9.3 | Incomplete List of Disallowed Inputs
[SNYK-JS-BABELTRAVERSE-5962462](https://snyk.io/vuln/SNYK-JS-BABELTRAVERSE-5962462) | No | No Known Exploit ![critical severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png "critical severity") | **909/1000**
**Why?** Mature exploit, Has a fix available, CVSS 9.6 | Heap-based Buffer Overflow
[SNYK-JS-CWEBPBIN-5923346](https://snyk.io/vuln/SNYK-JS-CWEBPBIN-5923346) | No | Mature ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Denial of Service (DoS)
[SNYK-JS-DECODEURICOMPONENT-3149970](https://snyk.io/vuln/SNYK-JS-DECODEURICOMPONENT-3149970) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **636/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 6.3 | Arbitrary File Write via Archive Extraction (Zip Slip)
[SNYK-JS-DECOMPRESSTAR-559095](https://snyk.io/vuln/SNYK-JS-DECOMPRESSTAR-559095) | Yes | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **646/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 6.5 | Information Exposure
[SNYK-JS-EVENTSOURCE-2823375](https://snyk.io/vuln/SNYK-JS-EVENTSOURCE-2823375) | Yes | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Information Exposure
[SNYK-JS-FOLLOWREDIRECTS-2332181](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-2332181) | Yes | Proof of Concept ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **344/1000**
**Why?** Has a fix available, CVSS 2.6 | Information Exposure
[SNYK-JS-FOLLOWREDIRECTS-2396346](https://snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-2396346) | Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-GLOBPARENT-1016905](https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **484/1000**
**Why?** Has a fix available, CVSS 5.4 | Open Redirect
[SNYK-JS-GOT-2932019](https://snyk.io/vuln/SNYK-JS-GOT-2932019) | Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-HOSTEDGITINFO-1088355](https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-HTTPCACHESEMANTICS-3248783](https://snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783) | Yes | Proof of Concept ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **506/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 3.7 | Validation Bypass
[SNYK-JS-KINDOF-537849](https://snyk.io/vuln/SNYK-JS-KINDOF-537849) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-LODASH-1018905](https://snyk.io/vuln/SNYK-JS-LODASH-1018905) | No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **681/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.2 | Command Injection
[SNYK-JS-LODASH-1040724](https://snyk.io/vuln/SNYK-JS-LODASH-1040724) | No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **686/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.3 | Prototype Pollution
[SNYK-JS-LODASH-450202](https://snyk.io/vuln/SNYK-JS-LODASH-450202) | No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **731/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.2 | Prototype Pollution
[SNYK-JS-LODASH-567746](https://snyk.io/vuln/SNYK-JS-LODASH-567746) | No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **686/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.3 | Prototype Pollution
[SNYK-JS-LODASH-608086](https://snyk.io/vuln/SNYK-JS-LODASH-608086) | No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **686/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.3 | Prototype Pollution
[SNYK-JS-MIXINDEEP-450212](https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **539/1000**
**Why?** Has a fix available, CVSS 6.5 | Information Exposure
[SNYK-JS-NODEFETCH-2342118](https://snyk.io/vuln/SNYK-JS-NODEFETCH-2342118) | No | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **520/1000**
**Why?** Has a fix available, CVSS 5.9 | Denial of Service
[SNYK-JS-NODEFETCH-674311](https://snyk.io/vuln/SNYK-JS-NODEFETCH-674311) | No | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Open Redirect
[SNYK-JS-NODEFORGE-2330875](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2330875) | Yes | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **529/1000**
**Why?** Has a fix available, CVSS 6.3 | Prototype Pollution
[SNYK-JS-NODEFORGE-2331908](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2331908) | Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **494/1000**
**Why?** Has a fix available, CVSS 5.6 | Improper Verification of Cryptographic Signature
[SNYK-JS-NODEFORGE-2430337](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2430337) | Yes | No Known Exploit ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **579/1000**
**Why?** Has a fix available, CVSS 7.3 | Improper Verification of Cryptographic Signature
[SNYK-JS-NODEFORGE-2430339](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2430339) | Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **494/1000**
**Why?** Has a fix available, CVSS 5.6 | Improper Verification of Cryptographic Signature
[SNYK-JS-NODEFORGE-2430341](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2430341) | Yes | No Known Exploit ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-NTHCHECK-1586032](https://snyk.io/vuln/SNYK-JS-NTHCHECK-1586032) | Yes | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **479/1000**
**Why?** Has a fix available, CVSS 5.3 | Improper Input Validation
[SNYK-JS-POSTCSS-5926692](https://snyk.io/vuln/SNYK-JS-POSTCSS-5926692) | Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **646/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 6.5 | Server-side Request Forgery (SSRF)
[SNYK-JS-REQUEST-3361831](https://snyk.io/vuln/SNYK-JS-REQUEST-3361831) | Yes | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-SEMVER-3247795](https://snyk.io/vuln/SNYK-JS-SEMVER-3247795) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **536/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 4.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-SEMVERREGEX-1047770](https://snyk.io/vuln/SNYK-JS-SEMVERREGEX-1047770) | Yes | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **589/1000**
**Why?** Has a fix available, CVSS 7.5 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-SEMVERREGEX-1584358](https://snyk.io/vuln/SNYK-JS-SEMVERREGEX-1584358) | Yes | No Known Exploit ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-SEMVERREGEX-1585624](https://snyk.io/vuln/SNYK-JS-SEMVERREGEX-1585624) | Yes | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-SEMVERREGEX-2824151](https://snyk.io/vuln/SNYK-JS-SEMVERREGEX-2824151) | Yes | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **686/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.3 | Prototype Pollution
[SNYK-JS-SETVALUE-1540541](https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541) | No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **686/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.3 | Prototype Pollution
[SNYK-JS-SETVALUE-450213](https://snyk.io/vuln/SNYK-JS-SETVALUE-450213) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **646/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 6.5 | Prototype Pollution
[SNYK-JS-TOUGHCOOKIE-5672873](https://snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873) | Yes | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **589/1000**
**Why?** Has a fix available, CVSS 7.5 | Denial of Service (DoS)
[SNYK-JS-TRIMNEWLINES-1298042](https://snyk.io/vuln/SNYK-JS-TRIMNEWLINES-1298042) | No | No Known Exploit ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-UAPARSERJS-1023599](https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **616/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.9 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-UAPARSERJS-1072471](https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1072471) | No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-UAPARSERJS-610226](https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226) | No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **589/1000**
**Why?** Has a fix available, CVSS 7.5 | Prototype Pollution
[SNYK-JS-UNSETVALUE-2400660](https://snyk.io/vuln/SNYK-JS-UNSETVALUE-2400660) | Yes | No Known Exploit ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **686/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.3 | Prototype Pollution
[SNYK-JS-Y18N-1021887](https://snyk.io/vuln/SNYK-JS-Y18N-1021887) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **601/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.6 | Prototype Pollution
[SNYK-JS-YARGSPARSER-560381](https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **469/1000**
**Why?** Has a fix available, CVSS 5.1 | Denial of Service (DoS)
[npm:mem:20180117](https://snyk.io/vuln/npm:mem:20180117) | No | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: gatsby The new version differs by 250 commits.
  • 0a455df chore(release): Publish
  • 91dc167 fix(gatsby): don't log FAST_DEV message for each worker (#32961) (#32967)
  • f936c93 fix(gatsby): set staticQueryResultHash to new hash on data change (#32949) (#32966)
  • ea161ce feat(gatsby-graphiql-explorer): upgrade to webpack 5 (#30642)
  • 944e381 chore(release): Publish next
  • d6326df fix(gatsby-core-utils): Switch `auth` option from got to username/password (#32665)
  • cf9c066 fix(gatsby): add this typings to actions (#32210)
  • 53aa88e chore: enable test parallelism (#32766)
  • b7deabc fix(deps): update starters and examples - gatsby (#32843)
  • 6025c84 chore(deps): update dependency katex to ^0.13.13 for gatsby-remark-katex (#32567)
  • d87c5cb chore: enable lmdb by default and update node for next major (#32695)
  • 818d6c1 feat(gatsby-plugin-gatsby-cloud): Add `disablePreviewUI` option (#32907)
  • f556a00 chore: update changelogs (#32924)
  • aba5eba feat(gatsby): enable webpack caching in development for everyone (#32922)
  • ac7bd4e feat(gatsby-source-wordpress): allow path to js file for beforeChangeNode option (#32901)
  • 1a87a8a docs(gatsby-source-wordpress): document content sync (#32768)
  • 417df15 chore: re-generate changelogs (#32886)
  • 1810874 fix(gatsby-source-wordpress): draft previews (#32915)
  • 7c72ab8 chore(gatsby): remove unused packages (#32903)
  • afb06d7 chore(docs): Add hint for MDX plugin in remark-plugin-tutorial (#32876)
  • 1303ecb chore(docs): Update wording for "using-web-fonts" (#32902)
  • 9589911 chore(docs): Fix code highlighting in part 6 (#32900)
  • 568d4ce feat(gatsby-source-drupal): Use the collection count from JSON:API extras to enable parallel API requests for cold builds (#32883)
  • 41f5337 fix(deps): update typescript to ^4.29.3 (#32614)
See the full diff
Package name: gatsby-plugin-sharp The new version differs by 250 commits.
  • 0a455df chore(release): Publish
  • 91dc167 fix(gatsby): don't log FAST_DEV message for each worker (#32961) (#32967)
  • f936c93 fix(gatsby): set staticQueryResultHash to new hash on data change (#32949) (#32966)
  • ea161ce feat(gatsby-graphiql-explorer): upgrade to webpack 5 (#30642)
  • 944e381 chore(release): Publish next
  • d6326df fix(gatsby-core-utils): Switch `auth` option from got to username/password (#32665)
  • cf9c066 fix(gatsby): add this typings to actions (#32210)
  • 53aa88e chore: enable test parallelism (#32766)
  • b7deabc fix(deps): update starters and examples - gatsby (#32843)
  • 6025c84 chore(deps): update dependency katex to ^0.13.13 for gatsby-remark-katex (#32567)
  • d87c5cb chore: enable lmdb by default and update node for next major (#32695)
  • 818d6c1 feat(gatsby-plugin-gatsby-cloud): Add `disablePreviewUI` option (#32907)
  • f556a00 chore: update changelogs (#32924)
  • aba5eba feat(gatsby): enable webpack caching in development for everyone (#32922)
  • ac7bd4e feat(gatsby-source-wordpress): allow path to js file for beforeChangeNode option (#32901)
  • 1a87a8a docs(gatsby-source-wordpress): document content sync (#32768)
  • 417df15 chore: re-generate changelogs (#32886)
  • 1810874 fix(gatsby-source-wordpress): draft previews (#32915)
  • 7c72ab8 chore(gatsby): remove unused packages (#32903)
  • afb06d7 chore(docs): Add hint for MDX plugin in remark-plugin-tutorial (#32876)
  • 1303ecb chore(docs): Update wording for "using-web-fonts" (#32902)
  • 9589911 chore(docs): Fix code highlighting in part 6 (#32900)
  • 568d4ce feat(gatsby-source-drupal): Use the collection count from JSON:API extras to enable parallel API requests for cold builds (#32883)
  • 41f5337 fix(deps): update typescript to ^4.29.3 (#32614)
See the full diff
Package name: gatsby-transformer-sharp The new version differs by 250 commits.
  • fbc5893 chore(release): Publish
  • e693b62 chore: update yarn.lock (#29078)
  • e998870 fix(gatsby): Always render the body component to ensure needed head & pre/post body components are added (#29077)
  • a1921b5 feat(gatsby): bump opt-in % to dev-ssr to 20% (#29075)
  • 2439b44 feat(gatsby-codemods): Handle or warn on nested options changes (#29046)
  • c0e6c92 fix(gatsby-plugin-typescript): add missing options validations (#29066)
  • 3163ca6 fix(gatsby-plugin-mdx): Add `root` to plugin validation (#29010)
  • 6233382 fix(gatsby-plugin-image): Fix onload race condition (#29064)
  • c76c175 benchmark(gabe-fs-markdown-images): add img benchmark (#29009)
  • bd5b5f7 feat(gatsby): allow to skip cache persistence (#29047)
  • 48db6ac fix(gatsby): fix broken GraphQL resolver tracing (#29015)
  • 90b6e3d fix(gatsby): Use fast-refresh for React 17 (#28930)
  • 9a55d12 feat(gatsby): Add eslint rules to warn against bad patterns in pageTemplates (for Fast Refresh) (#28689)
  • b9978e1 fix(gatsby-plugin-image): Handle imgStyle in SSR (#29043)
  • f23ba4b fix(gatsby-source-contentful): Improve base64 placeholders (#29034)
  • 18b5f30 fix(security): update vulnerable packages, include React 17 in peerDeps (#28545)
  • f8bbc06 docs: edit search documentation (#28737)
  • 004acf0 fix(sharp) wrap sharp calls in try/catch to avoid crashing on bad images (#28645)
  • bf6f264 Hydrate when the page was server rendered (#29016)
  • e72533d chore(gatsby-plugin-image): Unflag remote images (#29032)
  • 332543c chore(docs): adjust Contentful Rich Text example codes (#29029)
  • 9bcc12c feat(gatsby-plugin-image): Change fullWidth to use breakpoints (#29002)
  • 168ff60 Fix/contentful add header (#29028)
  • a3ad6d7 fix(gatsbu-source-contentful): apply useNameForId when creating the graphql schema (#28649)
See the full diff
Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/saurabharch/project/6b7e3f7b-e719-4702-a0d2-d259b0fbdf56?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/saurabharch/project/6b7e3f7b-e719-4702-a0d2-d259b0fbdf56?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"59710f68-be9b-48dc-a55d-aaceb7ef1a03","prPublicId":"59710f68-be9b-48dc-a55d-aaceb7ef1a03","dependencies":[{"name":"@firebase/firestore","from":"0.9.3","to":"1.14.0"},{"name":"firebase-admin","from":"6.5.1","to":"8.0.0"},{"name":"gatsby","from":"2.3.14","to":"3.13.0"},{"name":"gatsby-plugin-sharp","from":"2.0.32","to":"3.13.0"},{"name":"gatsby-transformer-sharp","from":"2.1.17","to":"2.11.0"}],"packageManager":"npm","projectPublicId":"6b7e3f7b-e719-4702-a0d2-d259b0fbdf56","projectUrl":"https://app.snyk.io/org/saurabharch/project/6b7e3f7b-e719-4702-a0d2-d259b0fbdf56?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JS-ANSIREGEX-1583908","SNYK-JS-AXIOS-1038255","SNYK-JS-AXIOS-1579269","SNYK-JS-AXIOS-6032459","SNYK-JS-BABELTRAVERSE-5962462","SNYK-JS-CWEBPBIN-5923346","SNYK-JS-DECODEURICOMPONENT-3149970","SNYK-JS-DECOMPRESSTAR-559095","SNYK-JS-EVENTSOURCE-2823375","SNYK-JS-FOLLOWREDIRECTS-2332181","SNYK-JS-FOLLOWREDIRECTS-2396346","SNYK-JS-GLOBPARENT-1016905","SNYK-JS-GOT-2932019","SNYK-JS-HOSTEDGITINFO-1088355","SNYK-JS-HTTPCACHESEMANTICS-3248783","SNYK-JS-KINDOF-537849","SNYK-JS-LODASH-1018905","SNYK-JS-LODASH-1040724","SNYK-JS-LODASH-450202","SNYK-JS-LODASH-567746","SNYK-JS-LODASH-608086","SNYK-JS-MIXINDEEP-450212","SNYK-JS-NODEFETCH-2342118","SNYK-JS-NODEFETCH-674311","SNYK-JS-NODEFORGE-2330875","SNYK-JS-NODEFORGE-2331908","SNYK-JS-NODEFORGE-2430337","SNYK-JS-NODEFORGE-2430339","SNYK-JS-NODEFORGE-2430341","SNYK-JS-NTHCHECK-1586032","SNYK-JS-POSTCSS-5926692","SNYK-JS-REQUEST-3361831","SNYK-JS-SEMVER-3247795","SNYK-JS-SEMVERREGEX-1047770","SNYK-JS-SEMVERREGEX-1584358","SNYK-JS-SEMVERREGEX-1585624","SNYK-JS-SEMVERREGEX-2824151","SNYK-JS-SETVALUE-1540541","SNYK-JS-SETVALUE-450213","SNYK-JS-TOUGHCOOKIE-5672873","SNYK-JS-TRIMNEWLINES-1298042","SNYK-JS-UAPARSERJS-1023599","SNYK-JS-UAPARSERJS-1072471","SNYK-JS-UAPARSERJS-610226","SNYK-JS-UNSETVALUE-2400660","SNYK-JS-Y18N-1021887","SNYK-JS-YARGSPARSER-560381","npm:mem:20180117"],"upgrade":["SNYK-JS-ANSIREGEX-1583908","SNYK-JS-AXIOS-1038255","SNYK-JS-AXIOS-1579269","SNYK-JS-AXIOS-6032459","SNYK-JS-BABELTRAVERSE-5962462","SNYK-JS-CWEBPBIN-5923346","SNYK-JS-DECODEURICOMPONENT-3149970","SNYK-JS-DECOMPRESSTAR-559095","SNYK-JS-EVENTSOURCE-2823375","SNYK-JS-FOLLOWREDIRECTS-2332181","SNYK-JS-FOLLOWREDIRECTS-2396346","SNYK-JS-GLOBPARENT-1016905","SNYK-JS-GOT-2932019","SNYK-JS-HOSTEDGITINFO-1088355","SNYK-JS-HTTPCACHESEMANTICS-3248783","SNYK-JS-KINDOF-537849","SNYK-JS-LODASH-1018905","SNYK-JS-LODASH-1040724","SNYK-JS-LODASH-450202","SNYK-JS-LODASH-567746","SNYK-JS-LODASH-608086","SNYK-JS-MIXINDEEP-450212","SNYK-JS-NODEFETCH-2342118","SNYK-JS-NODEFETCH-674311","SNYK-JS-NODEFORGE-2330875","SNYK-JS-NODEFORGE-2331908","SNYK-JS-NODEFORGE-2430337","SNYK-JS-NODEFORGE-2430339","SNYK-JS-NODEFORGE-2430341","SNYK-JS-NTHCHECK-1586032","SNYK-JS-POSTCSS-5926692","SNYK-JS-REQUEST-3361831","SNYK-JS-SEMVER-3247795","SNYK-JS-SEMVERREGEX-1047770","SNYK-JS-SEMVERREGEX-1584358","SNYK-JS-SEMVERREGEX-1585624","SNYK-JS-SEMVERREGEX-2824151","SNYK-JS-SETVALUE-1540541","SNYK-JS-SETVALUE-450213","SNYK-JS-TOUGHCOOKIE-5672873","SNYK-JS-TRIMNEWLINES-1298042","SNYK-JS-UAPARSERJS-1023599","SNYK-JS-UAPARSERJS-1072471","SNYK-JS-UAPARSERJS-610226","SNYK-JS-UNSETVALUE-2400660","SNYK-JS-Y18N-1021887","SNYK-JS-YARGSPARSER-560381","npm:mem:20180117"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["priorityScore"],"priorityScoreList":[696,616,696,676,679,909,696,636,646,586,344,586,484,586,586,506,586,681,686,731,686,686,539,520,586,529,494,579,494,696,479,646,696,536,589,696,586,686,686,646,589,696,616,696,589,686,601,469],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Regular Expression Denial of Service (ReDoS)](https://learn.snyk.io/lesson/redos/?loc=fix-pr) 🦉 [Server-Side Request Forgery (SSRF)](https://learn.snyk.io/lesson/ssrf-server-side-request-forgery/?loc=fix-pr) 🦉 [Cross-site Request Forgery (CSRF)](https://learn.snyk.io/lesson/csrf-attack/?loc=fix-pr) 🦉 [More lessons are available in Snyk Learn](https://learn.snyk.io/?loc=fix-pr)