Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.
Changes included in this PR
Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
Adding or updating a Snyk policy (.snyk) file; this file is required in order to apply Snyk vulnerability patches.
Find out more.
Vulnerabilities that will be fixed
With an upgrade:
Why? Has a fix available, CVSS 7.4
SNYK-JS-ADMZIP-1065796
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
SNYK-JS-ANSIREGEX-1583908
Why? Proof of Concept exploit, Has a fix available, CVSS 7.7
SNYK-JS-BL-608877
Why? Has a fix available, CVSS 7.4
SNYK-JS-HAWK-2808852
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-HOSTEDGITINFO-1088355
Why? Proof of Concept exploit, Has a fix available, CVSS 5.6
SNYK-JS-JQUERY-174006
Why? Mature exploit, Has a fix available, CVSS 6.3
SNYK-JS-JQUERY-565129
Why? Mature exploit, Has a fix available, CVSS 6.5
SNYK-JS-JQUERY-567880
Why? Has a fix available, CVSS 5.3
SNYK-JS-MARKED-174116
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-MARKED-2342073
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-MARKED-2342082
Why? Has a fix available, CVSS 5.3
SNYK-JS-MARKED-451540
Why? Has a fix available, CVSS 5.9
SNYK-JS-MARKED-584281
Why? Has a fix available, CVSS 7.5
SNYK-JS-MINIMATCH-1019388
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
SNYK-JS-NPM-537603
Why? Proof of Concept exploit, Has a fix available, CVSS 2.6
SNYK-JS-NPM-537604
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
SNYK-JS-NPM-537606
Why? Has a fix available, CVSS 5.3
SNYK-JS-NPM-575435
Why? Has a fix available, CVSS 7.5
SNYK-JS-NPMUSERVALIDATE-1019352
Why? Has a fix available, CVSS 8.2
SNYK-JS-TAR-1536528
Why? Has a fix available, CVSS 8.2
SNYK-JS-TAR-1536531
Why? Has a fix available, CVSS 3.7
SNYK-JS-TAR-1536758
Why? Has a fix available, CVSS 8.5
SNYK-JS-TAR-1579147
Why? Has a fix available, CVSS 8.5
SNYK-JS-TAR-1579152
Why? Has a fix available, CVSS 8.5
SNYK-JS-TAR-1579155
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-WS-1296835
Why? Proof of Concept exploit, Has a fix available, CVSS 5.6
SNYK-JS-YARGSPARSER-560381
Why? Mature exploit, Has a fix available, CVSS 9.4
npm:adm-zip:20180415
Why? Has a fix available, CVSS 4.4
npm:chownr:20180731
Why? Has a fix available, CVSS 8.1
npm:gmail-js:20160721
Why? Has a fix available, CVSS 3.7
npm:hawk:20160119
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
npm:hoek:20180212
Why? Has a fix available, CVSS 6.5
npm:http-signature:20150122
Why? Has a fix available, CVSS 5.4
npm:jquery:20150627
Why? Has a fix available, CVSS 8.8
npm:marked:20150520
Why? Has a fix available, CVSS 7.5
npm:marked:20170112
Why? Has a fix available, CVSS 7.5
npm:marked:20170815
Why? Has a fix available, CVSS 4.8
npm:marked:20170815-1
Why? Has a fix available, CVSS 7.5
npm:marked:20170907
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
npm:marked:20180225
Why? Has a fix available, CVSS 7.5
npm:minimatch:20160620
Why? Has a fix available, CVSS 5.3
npm:npm:20180222
Why? Has a fix available, CVSS 7.5
npm:qs:20140806
Why? Has a fix available, CVSS 6.5
npm:qs:20140806-1
Why? Has a fix available, CVSS 7.5
npm:qs:20170213
Why? Has a fix available, CVSS 5.1
npm:request:20160119
Why? Has a fix available, CVSS 5.3
npm:semver:20150403
Why? Has a fix available, CVSS 7.5
npm:tough-cookie:20160722
Why? Has a fix available, CVSS 5.9
npm:tough-cookie:20170905
Why? Proof of Concept exploit, Has a fix available, CVSS 5.1
npm:tunnel-agent:20170305
Why? Has a fix available, CVSS 6.5
npm:ws:20160104
Why? Has a fix available, CVSS 7.5
npm:ws:20160624
Why? Has a fix available, CVSS 5.3
npm:ws:20160920
Why? Mature exploit, Has a fix available, CVSS 7.5
npm:ws:20171108
(*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: falcor-router-demo
The new version differs by 6 commits.See the full diff
Package name: gmail-js
The new version differs by 163 commits.See the full diff
Package name: gulp
The new version differs by 134 commits.See the full diff
Package name: hapi
The new version differs by 107 commits.See the full diff
Package name: inert
The new version differs by 23 commits.See the full diff
Package name: marked
The new version differs by 250 commits.See the full diff
Package name: npm
The new version differs by 250 commits.See the full diff
Package name: ws
The new version differs by 250 commits.See the full diff
Package name: yargs
The new version differs by 250 commits.See the full diff
With a Snyk patch:
Why? Has a fix available, CVSS 5.3
npm:handlebars:20151207
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
npm:hoek:20180212
Why? Has a fix available, CVSS 6.5
npm:http-signature:20150122
Why? Has a fix available, CVSS 3.7
npm:mime:20170907
Why? Has a fix available, CVSS 7.5
npm:minimatch:20160620
Why? Has a fix available, CVSS 5.1
npm:request:20160119
Why? Proof of Concept exploit, Has a fix available, CVSS 5.1
npm:tunnel-agent:20170305
Why? Has a fix available, CVSS 5.3
npm:ws:20160920
(*) Note that the real score may have changed since the PR was raised.
Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
🛠 Adjust project settings
📚 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Arbitrary JavaScript Code Injection
🦉 Regular Expression Denial of Service (ReDoS)
🦉 Regular Expression Denial of Service (ReDoS)
🦉 More lessons are available in Snyk Learn