mirror of
https://github.com/spamscanner/spamscanner.git
synced 2026-04-27 12:45:50 +03:00
[PR #22] [CLOSED] [Snyk] Security upgrade parse-domain from 5.0.0 to 6.0.0 #23
Labels
No labels
bug
bug
enhancement
help wanted
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/spamscanner#23
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/spamscanner/spamscanner/pull/22
Author: @titanism
Created: 7/31/2022
Status: ❌ Closed
Base:
master← Head:snyk-fix-191b5fbf534d95b549ecc570f62e6ce3📝 Commits (1)
5a00255fix: package.json to reduce vulnerabilities📊 Changes
1 file changed (+1 additions, -1 deletions)
View changed files
📝
package.json(+1 -1)📄 Description
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `yarn` dependencies of this project.
Changes included in this PR
⚠️ Warning
Vulnerabilities that will be fixed
With an upgrade:
Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 7.5
SNYK-JS-NODEFETCH-2964180
(*) Note that the real score may have changed since the PR was raised.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
🛠 Adjust project settings
📚 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.