Closed depfu[bot] closed 8 months ago
The latest updates on your projects. Learn more about Vercel for Git ↗︎
Name | Status | Preview | Comments | Updated (UTC) |
---|---|---|---|---|
client-cra | ❌ Failed (Inspect) | Jan 20, 2024 1:51am | ||
mussia12 | ❌ Failed (Inspect) | Jan 20, 2024 1:51am |
The Denial of Service (DoS) attack is focused on making a resource (site, application, server) unavailable for the purpose it was designed. There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical, or resources handling vulnerabilities, among others. Source: https://www.owasp.org/index.php/Denial_of_Service
Kudos, no new issues were introduced!
0 New issues
0 Security Hotspots
No data about Coverage
0.0% Duplication on New Code
Closed in favor of #1324.
Closed in favor of #1324.
Closed in favor of #1324.
🚨 Your current dependencies have known security vulnerabilities 🚨
This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!
Here is everything you need to know about this upgrade. Please take a good look at what changed and the test results before merging this pull request.
What changed?
✳️ eslint-config-next (12.0.4 → 14.1.0)
Sorry, we couldn't find anything useful about this release.
✳️ next (12.0.4 → 14.1.0) · Repo
Security Advisories 🚨
🚨 Next.js missing cache-control header may lead to CDN caching empty reply
🚨 Unexpected server crash in Next.js
🚨 Improper CSP in Image Optimization API for Next.js versions between 10.0.0 and 12.1.0
🚨 DOS Vulnerability for self-hosted next.js apps using i18n
🚨 Unexpected server crash in Next.js
Release Notes
Too many releases to show here. View the full release notes.
Commits
See the full diff on Github.
Sorry, we couldn't find anything useful about this release.
Depfu will automatically keep this PR conflict-free, as long as you don't add any commits to this branch yourself. You can also trigger a rebase manually by commenting with
@depfu rebase
.All Depfu comment commands