stanleyowen / otlio

An open source project of Todo which is easy to use and easy to organize!
https://otlio.netlify.app
MIT License
23 stars 4 forks source link

[Snyk] Upgrade @testing-library/jest-dom from 5.14.1 to 5.16.5 #388

Closed stanleyowen closed 1 year ago

stanleyowen commented 1 year ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade @testing-library/jest-dom from 5.14.1 to 5.16.5.

![merge advice](https://app.snyk.io/badges/merge-advice/?package_manager=npm&package_name=@testing-library/jest-dom&from_version=5.14.1&to_version=5.16.5&pr_id=cb9c8f1e-0140-4012-aff4-2835fcee706e&visibility=true&has_feature_flag=false) :information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
- The recommended version is **8 versions** ahead of your current version. - The recommended version was released **2 months ago**, on 2022-08-04. The recommended version fixes: Severity | Issue | PriorityScore (*) | Exploit Maturity | :-------------------------:|:-------------------------|-------------------------|:------------------------- | Improper Input Validation
[SNYK-JS-URLPARSE-2407770](https://snyk.io/vuln/SNYK-JS-URLPARSE-2407770) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Prototype Pollution
[SNYK-JS-UNSETVALUE-2400660](https://snyk.io/vuln/SNYK-JS-UNSETVALUE-2400660) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TMPL-1583443](https://snyk.io/vuln/SNYK-JS-TMPL-1583443) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Arbitrary File Write
[SNYK-JS-TAR-1579155](https://snyk.io/vuln/SNYK-JS-TAR-1579155) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Arbitrary File Write
[SNYK-JS-TAR-1579152](https://snyk.io/vuln/SNYK-JS-TAR-1579152) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Arbitrary File Write
[SNYK-JS-TAR-1579147](https://snyk.io/vuln/SNYK-JS-TAR-1579147) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Remote Code Execution (RCE)
[SNYK-JS-SHELLQUOTE-1766506](https://snyk.io/vuln/SNYK-JS-SHELLQUOTE-1766506) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Improper Verification of Cryptographic Signature
[SNYK-JS-NODEFORGE-2430339](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2430339) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Command Injection
[SNYK-JS-LODASHTEMPLATE-1088054](https://snyk.io/vuln/SNYK-JS-LODASHTEMPLATE-1088054) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Remote Code Execution (RCE)
[SNYK-JS-EJS-2803307](https://snyk.io/vuln/SNYK-JS-EJS-2803307) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Prototype Pollution
[SNYK-JS-ASYNC-2441827](https://snyk.io/vuln/SNYK-JS-ASYNC-2441827) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-ANSIHTML-1296849](https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Authorization Bypass Through User-Controlled Key
[SNYK-JS-URLPARSE-2412697](https://snyk.io/vuln/SNYK-JS-URLPARSE-2412697) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Authorization Bypass
[SNYK-JS-URLPARSE-2407759](https://snyk.io/vuln/SNYK-JS-URLPARSE-2407759) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Access Restriction Bypass
[SNYK-JS-URLPARSE-2401205](https://snyk.io/vuln/SNYK-JS-URLPARSE-2401205) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TERSER-2806366](https://snyk.io/vuln/SNYK-JS-TERSER-2806366) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TERSER-2806366](https://snyk.io/vuln/SNYK-JS-TERSER-2806366) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-PROMPTS-1729737](https://snyk.io/vuln/SNYK-JS-PROMPTS-1729737) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Denial of Service (DoS)
[SNYK-JS-NWSAPI-2841516](https://snyk.io/vuln/SNYK-JS-NWSAPI-2841516) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Improper Verification of Cryptographic Signature
[SNYK-JS-NODEFORGE-2430341](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2430341) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Improper Verification of Cryptographic Signature
[SNYK-JS-NODEFORGE-2430337](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2430337) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Prototype Pollution
[SNYK-JS-NODEFORGE-2331908](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2331908) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Open Redirect
[SNYK-JS-NODEFORGE-2330875](https://snyk.io/vuln/SNYK-JS-NODEFORGE-2330875) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Information Exposure
[SNYK-JS-NANOID-2332193](https://snyk.io/vuln/SNYK-JS-NANOID-2332193) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Reverse Tabnabbing
[SNYK-JS-ISTANBULREPORTS-2328088](https://snyk.io/vuln/SNYK-JS-ISTANBULREPORTS-2328088) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | No Known Exploit | Prototype Pollution
[SNYK-JS-IMMER-1540542](https://snyk.io/vuln/SNYK-JS-IMMER-1540542) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-GLOBPARENT-1016905](https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Arbitrary Code Injection
[SNYK-JS-EJS-1049328](https://snyk.io/vuln/SNYK-JS-EJS-1049328) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-BROWSERSLIST-1090194](https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept | Prototype Pollution
[SNYK-JS-MINIMIST-2429795](https://snyk.io/vuln/SNYK-JS-MINIMIST-2429795) | **512/1000**
**Why?** Proof of Concept exploit, CVSS 8.1 | Proof of Concept (*) Note that the real score may have changed since the PR was raised.
Release notes
Package name: @testing-library/jest-dom from @testing-library/jest-dom GitHub release notes
Commit messages
Package name: @testing-library/jest-dom
  • 948d90f fix: migrate ccs v3 to @ adobe/css-tools v4 (#470)
  • af18453 fix: Support unenclosed inner text for details elements in to be visible (#396)
  • 6988a67 fix: clarify toHaveFocus message when using `.not` (#447)
  • 4d0ceeb docs: add ashleyryan as a contributor for code, ideas (#434)
  • 1f389f8 docs: add astorije as a contributor for code, ideas (#433)
  • 8162115 fix: add custom element support to `toBeDisabled` (#368)
  • 3094eb1 docs: add cbroeren as a contributor for doc (#432)
  • 43a420a docs: Fix wrong toHaveValue example (#431)
  • a9beb47 fix: Improve `toHaveClass` error message format (#405)
  • 6f69437 docs: add IanVS as a contributor for code (#423)
  • de26c7a feat: Update aria-query to 5.0.0 (#414)
  • dfcefa2 fix: wrong deprecate error message (#422)
  • 4cb606c feat: import parse directly from css (#415)
  • 35ab97d docs: add yannbf as a contributor for code (#416)
  • 8876038 docs: add MatanBobi as a contributor for platform (#410)
  • d085039 chore: set protocol for npm to `https` (#409)
  • d24b6be docs: add tu4mo as a contributor for doc (#386)
  • 51ea536 chore: upgrade to Jest 27 (#384)
  • 60832f6 Fix typo (#385)
  • 0e34a35 docs: add icecream17 as a contributor for doc (#381)
  • eccbfcf fix grammar (#380)
Compare

**Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/stanleyowen06/project/6c4f0783-1007-4aa3-8da0-92885788a6c2?utm_source=github&utm_medium=referral&page=upgrade-pr) 🛠 [Adjust upgrade PR settings](https://app.snyk.io/org/stanleyowen06/project/6c4f0783-1007-4aa3-8da0-92885788a6c2/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr) 🔕 [Ignore this dependency or unsubscribe from future upgrade PRs](https://app.snyk.io/org/stanleyowen06/project/6c4f0783-1007-4aa3-8da0-92885788a6c2/settings/integration?pkg=@testing-library/jest-dom&utm_source=github&utm_medium=referral&page=upgrade-pr#auto-dep-upgrades)
netlify[bot] commented 1 year ago

Deploy Preview for otlio ready!

Name Link
Latest commit ffbda6b81b230436eb946579c8dc934240715033
Latest deploy log https://app.netlify.com/sites/otlio/deploys/634db8d23e26f5000824295a
Deploy Preview https://deploy-preview-388--otlio.netlify.app
Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site settings.