cloudinary-video-player
cloudinary-video-player copied to clipboard
[Snyk] Security upgrade dashjs from 4.7.3 to 4.7.4
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `yarn` dependencies of this project.
Changes included in this PR
- Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
- package.json
Note for zero-installs users
If you are using the Yarn feature zero-installs that was introduced in Yarn V2, note that this PR does not update the .yarn/cache/
directory meaning this code cannot be pulled and immediately developed on as one would expect for a zero-install project - you will need to run yarn
to update the contents of the ./yarn/cache
directory.
If you are not using zero-install you can ignore this as your flow should likely be unchanged.
⚠️ Warning
Failed to update the yarn.lock, please update manually before merging.
Vulnerabilities that will be fixed
With an upgrade:
Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity |
---|---|---|---|---|
![]() |
696/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 7.5 |
Regular Expression Denial of Service (ReDoS) SNYK-JS-ANSIREGEX-1583908 |
No | Proof of Concept |
![]() |
631/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 6.2 |
Missing Release of Resource after Effective Lifetime SNYK-JS-INFLIGHT-6095116 |
No | Proof of Concept |
![]() |
696/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 7.5 |
Regular Expression Denial of Service (ReDoS) SNYK-JS-NTHCHECK-1586032 |
No | Proof of Concept |
![]() |
479/1000 Why? Has a fix available, CVSS 5.3 |
Improper Input Validation SNYK-JS-POSTCSS-5926692 |
No | No Known Exploit |
![]() |
646/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 6.5 |
Validation Bypass SNYK-JS-SANITIZEHTML-1070780 |
No | Proof of Concept |
![]() |
539/1000 Why? Has a fix available, CVSS 6.5 |
Access Restriction Bypass SNYK-JS-SANITIZEHTML-1070786 |
No | No Known Exploit |
![]() |
479/1000 Why? Has a fix available, CVSS 5.3 |
Regular Expression Denial of Service (ReDoS) SNYK-JS-SANITIZEHTML-2957526 |
No | No Known Exploit |
![]() |
684/1000 Why? Has a fix available, CVSS 9.4 |
Arbitrary Code Execution SNYK-JS-SANITIZEHTML-585892 |
No | No Known Exploit |
![]() |
696/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 7.5 |
Internal Property Tampering SNYK-JS-TAFFYDB-2992450 |
No | Proof of Concept |
![]() |
479/1000 Why? Has a fix available, CVSS 5.3 |
Regular Expression Denial of Service (ReDoS) SNYK-JS-UGLIFYJS-1727251 |
No | No Known Exploit |
(*) Note that the real score may have changed since the PR was raised.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📚 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Regular Expression Denial of Service (ReDoS) 🦉 Improper Input Validation 🦉 Arbitrary Code Execution
Deploy Preview for cld-video-player failed.
Name | Link |
---|---|
Latest commit | f1dbd91425298227f0ea8e764d5756505daa232f |
Latest deploy log | https://app.netlify.com/sites/cld-video-player/deploys/65d83184e3d524000837b838 |