Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade marked from 0.3.19 to 2.0.3 #5

Open
wants to merge 1 commit into
base: mercury
Choose a base branch
from

Conversation

snyk-bot
Copy link

@snyk-bot snyk-bot commented May 9, 2021

Snyk has created this PR to upgrade marked from 0.3.19 to 2.0.3.

merge advice
ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


Warning: This is a major version upgrade, and may be a breaking change.

  • The recommended version is 30 versions ahead of your current version.
  • The recommended version was released a month ago, on 2021-04-11.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Prototype Pollution
SNYK-JS-Y18N-1021887
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-Y18N-1021887
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Access Restriction Bypass
SNYK-JS-XMLHTTPREQUESTSSL-1255647
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Arbitrary Code Injection
SNYK-JS-XMLHTTPREQUESTSSL-1082936
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Arbitrary File Overwrite
SNYK-JS-TAR-174125
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SSRI-1246392
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SSRI-1085630
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SSRI-1246392
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SSRI-1085630
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Denial of Service (DoS)
SNYK-JS-SOCKETIOPARSER-1056752
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-SETVALUE-450213
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-SETVALUE-450213
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-NPMUSERVALIDATE-1019352
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Write
SNYK-JS-NPM-537606
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Arbitrary File Overwrite
SNYK-JS-NPM-537603
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-NODEEXTEND-73641
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-MIXINDEEP-450212
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-LODASHMERGE-173732
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-INI-1048974
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Arbitrary File Overwrite
SNYK-JS-FSTREAM-174725
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-CACHEDPATHRELATIVE-72573
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Remote Memory Exposure
SNYK-JS-BL-608877
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Write
SNYK-JS-BINLINKS-537610
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Arbitrary File Overwrite
SNYK-JS-BINLINKS-537608
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Cross-site Scripting (XSS)
SNYK-JS-ANGULAR-572020
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-ANGULAR-534884
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-AJV-584908
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ACORN-559469
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ACORN-559469
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Time of Check Time of Use (TOCTOU)
npm:chownr:20180731
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Insertion of Sensitive Information into Log File
SNYK-JS-NPMREGISTRYFETCH-575432
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Insertion of Sensitive Information into Log File
SNYK-JS-NPMREGISTRYFETCH-575432
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Insertion of Sensitive Information into Log File
SNYK-JS-NPM-575435
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Command Injection
SNYK-JS-NODENOTIFIER-1035794
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS )
SNYK-JS-MARKED-584281
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MARKED-451540
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MARKED-174116
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-LODASHMERGE-173733
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Man-in-the-Middle (MitM)
SNYK-JS-HTTPSPROXYAGENT-469131
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-HOSTEDGITINFO-1088355
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-DOTPROP-543489
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Cross-site Scripting (XSS)
SNYK-JS-ANGULAR-570058
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Unauthorized File Access
SNYK-JS-NPM-537604
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Validation Bypass
SNYK-JS-KINDOF-537849
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Unauthorized File Access
SNYK-JS-BINLINKS-537609
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Release notes
Package name: marked
  • 2.0.3 - 2021-04-11

    2.0.3 (2021-04-11)

    Bug Fixes

    • actually add a type property to the def token (#2002) (47e65cf)
  • 2.0.2 - 2021-04-10

    2.0.2 (2021-04-10)

    Bug Fixes

  • 2.0.1 - 2021-02-27

    2.0.1 (2021-02-27)

    Bug Fixes

  • 2.0.0 - 2021-02-07

    2.0.0 (2021-02-07)

    Bug Fixes

    BREAKING CHANGES

    • em and strong tokenizers have been merged into one emStrong tokenizer.
    • code and text tokenizers do not get passed all tokens as a second parameter.
    • No longer supporting IE 11. IE 11 may still work but we are not committed to making sure it works with every update. We still provide an es5 version in lib/marked.js but some pollyfills may be needed for IE 11 in the future.
  • 1.2.9 - 2021-02-03

    1.2.9 (2021-02-03)

    Bug Fixes

    • allow sublist to be single space in pedantic (#1924) (1e36afd)
  • 1.2.8 - 2021-01-26

    1.2.8 (2021-01-26)

    Bug Fixes

  • 1.2.7 - 2020-12-15

    1.2.7 (2020-12-15)

    Bug Fixes

    • Replace use of startsWith and endsWith with regex for IE11 (#1877) (4fdde20), closes #1876
  • 1.2.6 - 2020-12-10

    1.2.6 (2020-12-10)

    Bug Fixes

    • fix atx heading and make regex safe (#1853) (70ee29c)
      possible breaking change: When using the block.heading rule the text provided in capture group 2 will not be trimmed of whitespace.
    • fix link with angle brackets around href (#1851) (656c3e4)
  • 1.2.5 - 2020-11-19

    1.2.5 (2020-11-19)

    Bug Fixes

  • 1.2.4 - 2020-11-15

    1.2.4 (2020-11-15)

    Bug Fixes

    • no strikethrough on different number of tildes (#1821) (d79f210)

    Possible Breaking Change: When using the inline.del rule the text is provided in capture group 2 instead of 1.

  • 1.2.3 - 2020-11-04
  • 1.2.2 - 2020-10-21
  • 1.2.1 - 2020-10-21
  • 1.2.0 - 2020-09-28
  • 1.1.2 - 2020-10-21
  • 1.1.1 - 2020-07-14
  • 1.1.0 - 2020-05-16
  • 1.0.0 - 2020-04-21
  • 0.8.2 - 2020-03-22
  • 0.8.1 - 2020-03-18
  • 0.8.0 - 2019-12-12
  • 0.7.0 - 2019-07-06
  • 0.6.3 - 2019-06-30
  • 0.6.2 - 2019-04-05
  • 0.6.1 - 2019-02-19
  • 0.6.0 - 2019-01-01
  • 0.5.2 - 2018-11-20
  • 0.5.1 - 2018-09-26
  • 0.5.0 - 2018-08-16
  • 0.4.0 - 2018-05-21
  • 0.3.19 - 2018-03-26
from marked GitHub release notes
Commit messages
Package name: marked

Compare


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant