Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability on micromatch 2.3.1, please consider upgrading to 3.*.* #6969

Closed
trollepierre opened this issue Sep 12, 2018 · 2 comments
Closed

Comments

@trollepierre
Copy link

🐛 Bug Report

Low severity vuln found in braces@1.8.5, introduced via randstad-front@1.0.0
Description: Regular Expression Denial of Service (ReDoS)
Info: https://snyk.io/vuln/npm:braces:20180219
From: randstad-front@1.0.0 > @randstad/ramda@1.0.0 > jest@23.6.0 > jest-cli@23.6.0 > micromatch@2.3.11 > braces@1.8.5

@SimenB
Copy link
Member

SimenB commented Sep 12, 2018

Dupe of #6743.

We will upgrade micromatch in the next major

@SimenB SimenB closed this as completed Sep 12, 2018
@github-actions
Copy link

This issue has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs.
Please note this issue tracker is not a help forum. We recommend using StackOverflow or our discord channel for questions.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators May 12, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants