sendgrid-parse-api-example
sendgrid-parse-api-example copied to clipboard
[Snyk] Fix for 24 vulnerabilities
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.
Changes included in this PR
- Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
- package.json
Vulnerabilities that will be fixed
With an upgrade:
| Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity |
|---|---|---|---|---|
| 584/1000 Why? Has a fix available, CVSS 7.4 |
Regular Expression Denial of Service (ReDoS) SNYK-JS-HAWK-2808852 |
Yes | No Known Exploit | |
| 751/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.6 |
Command Injection SNYK-JS-NODEMAILER-1038834 |
No | Proof of Concept | |
| 636/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 6.3 |
HTTP Header Injection SNYK-JS-NODEMAILER-1296415 |
No | Proof of Concept | |
| 658/1000 Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 5.3 |
Regular Expression Denial of Service (ReDoS) SNYK-JS-NODEMAILER-6219989 |
No | Proof of Concept | |
| 696/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 7.5 |
Prototype Poisoning SNYK-JS-QS-3153490 |
No | Proof of Concept | |
| 646/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 6.5 |
Server-side Request Forgery (SSRF) SNYK-JS-REQUEST-3361831 |
No | Proof of Concept | |
| 696/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 7.5 |
Regular Expression Denial of Service (ReDoS) SNYK-JS-SEMVER-3247795 |
Yes | Proof of Concept | |
| 596/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 5.5 |
Arbitrary Code Injection SNYK-JS-UNDERSCORE-1080984 |
No | Proof of Concept | |
| 584/1000 Why? Has a fix available, CVSS 7.4 |
Rosetta-flash jsonp vulnerability npm:hapi:20140708-1 |
Yes | No Known Exploit | |
| 399/1000 Why? Has a fix available, CVSS 3.7 |
CORS Bypass npm:hapi:20151020 |
Yes | No Known Exploit | |
| 589/1000 Why? Has a fix available, CVSS 7.5 |
Denial of Service (DoS) npm:hapi:20151223 |
Yes | No Known Exploit | |
| 539/1000 Why? Has a fix available, CVSS 6.5 |
Potentially loose security restrictions npm:hapi:20151228 |
Yes | No Known Exploit | |
| 399/1000 Why? Has a fix available, CVSS 3.7 |
Regular Expression Denial of Service (ReDoS) npm:hawk:20160119 |
Yes | No Known Exploit | |
| 636/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 6.3 |
Prototype Pollution npm:hoek:20180212 |
Yes | Proof of Concept | |
| 539/1000 Why? Has a fix available, CVSS 6.5 |
Unsigned Request Headers npm:http-signature:20130418 |
No | No Known Exploit | |
| 539/1000 Why? Has a fix available, CVSS 6.5 |
Timing Attack npm:http-signature:20150122 |
No | No Known Exploit | |
| 399/1000 Why? Has a fix available, CVSS 3.7 |
Regular Expression Denial of Service (ReDoS) npm:mime:20170907 |
Yes | No Known Exploit | |
| 589/1000 Why? Has a fix available, CVSS 7.5 |
Regular Expression Denial of Service (ReDoS) npm:negotiator:20160616 |
Yes | No Known Exploit | |
| 589/1000 Why? Has a fix available, CVSS 7.5 |
Denial of Service (DoS) npm:qs:20140806 |
No | No Known Exploit | |
| 539/1000 Why? Has a fix available, CVSS 6.5 |
Denial of Service (DoS) npm:qs:20140806-1 |
No | No Known Exploit | |
| 589/1000 Why? Has a fix available, CVSS 7.5 |
Prototype Override Protection Bypass npm:qs:20170213 |
No | No Known Exploit | |
| 469/1000 Why? Has a fix available, CVSS 5.1 |
Remote Memory Exposure npm:request:20160119 |
No | No Known Exploit | |
| 479/1000 Why? Has a fix available, CVSS 5.3 |
Regular Expression Denial of Service (ReDoS) npm:semver:20150403 |
Yes | No Known Exploit | |
| 576/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 5.1 |
Uninitialized Memory Exposure npm:tunnel-agent:20170305 |
No | Proof of Concept |
(*) Note that the real score may have changed since the PR was raised.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📚 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 CORS Bypass 🦉 Denial of Service (DoS) 🦉 Command Injection 🦉 More lessons are available in Snyk Learn