[Snyk] Upgrade marked from 0.3.19 to 2.0.3 #5
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to upgrade marked from 0.3.19 to 2.0.3.
ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
Warning: This is a major version upgrade, and may be a breaking change.
The recommended version fixes:
SNYK-JS-Y18N-1021887
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-Y18N-1021887
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-XMLHTTPREQUESTSSL-1255647
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-XMLHTTPREQUESTSSL-1082936
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-TAR-174125
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SSRI-1246392
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SSRI-1085630
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SSRI-1246392
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SSRI-1085630
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SOCKETIOPARSER-1056752
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SETVALUE-450213
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SETVALUE-450213
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-NPMUSERVALIDATE-1019352
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-NPM-537606
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-NPM-537603
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-NODEEXTEND-73641
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MIXINDEEP-450212
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-LODASHMERGE-173732
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-INI-1048974
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-FSTREAM-174725
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-CACHEDPATHRELATIVE-72573
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-BL-608877
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-BINLINKS-537610
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-BINLINKS-537608
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-ANGULAR-572020
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-ANGULAR-534884
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-AJV-584908
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-ACORN-559469
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-ACORN-559469
Why? Proof of Concept exploit, CVSS 7.3
npm:chownr:20180731
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-NPMREGISTRYFETCH-575432
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-NPMREGISTRYFETCH-575432
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-NPM-575435
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-NODENOTIFIER-1035794
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MARKED-584281
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MARKED-451540
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MARKED-174116
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-LODASHMERGE-173733
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-HTTPSPROXYAGENT-469131
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-HOSTEDGITINFO-1088355
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-DOTPROP-543489
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-ANGULAR-570058
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-NPM-537604
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-KINDOF-537849
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-BINLINKS-537609
Why? Proof of Concept exploit, CVSS 7.3
(*) Note that the real score may have changed since the PR was raised.
Release notes
Package name: marked
2.0.3 (2021-04-11)
Bug Fixes
type
property to thedef
token (#2002) (47e65cf)2.0.2 (2021-04-10)
Bug Fixes
2.0.1 (2021-02-27)
Bug Fixes
2.0.0 (2021-02-07)
Bug Fixes
BREAKING CHANGES
em
andstrong
tokenizers have been merged into oneemStrong
tokenizer.code
andtext
tokenizers do not get passed all tokens as a second parameter.lib/marked.js
but some pollyfills may be needed for IE 11 in the future.1.2.9 (2021-02-03)
Bug Fixes
1.2.8 (2021-01-26)
Bug Fixes
1.2.7 (2020-12-15)
Bug Fixes
1.2.6 (2020-12-10)
Bug Fixes
possible breaking change: When using the block.heading rule the text provided in capture group 2 will not be trimmed of whitespace.
1.2.5 (2020-11-19)
Bug Fixes
1.2.4 (2020-11-15)
Bug Fixes
Possible Breaking Change: When using the inline.del rule the text is provided in capture group 2 instead of 1.
Commit messages
Package name: marked
Compare
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.
For more information:
🧐 View latest project report
🛠 Adjust upgrade PR settings
🔕 Ignore this dependency or unsubscribe from future upgrade PRs