Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump follow-redirects from 1.15.4 to 1.15.6 #715

Merged
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions yarn.lock
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# THIS IS AN AUTOGENERATED FILE. DO NOT EDIT THIS FILE DIRECTLY.

Check failure on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

glob-parent:3.1.0

Detected Vulnerabilities: CVE-2020-28469, Severity: High, Source: https://github.com/advisories/GHSA-ww39-953v-wcq6 CVSS score: 7.5, CVSS exploitability score: 3.9 🩹 Fixed version: 5.1.2 💥 Has public exploit 🧨 Has CISA KEV exploit

Check failure on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

ansi-regex:3.0.0

Detected Vulnerabilities: CVE-2021-3807, Severity: High, Source: https://github.com/advisories/GHSA-93q8-gq69-wqmw CVSS score: 7.5, CVSS exploitability score: 3.9 🩹 Fixed version: 3.0.1 💥 Has public exploit 🧨 Has CISA KEV exploit

Check failure on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

ansi-regex:4.1.0

Detected Vulnerabilities: CVE-2021-3807, Severity: High, Source: https://github.com/advisories/GHSA-93q8-gq69-wqmw CVSS score: 7.5, CVSS exploitability score: 3.9 🩹 Fixed version: 4.1.1 💥 Has public exploit 🧨 Has CISA KEV exploit

Check failure on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

flat:4.1.1

Detected Vulnerabilities: CVE-2020-36632, Severity: Critical, Source: https://github.com/advisories/GHSA-2j2x-2gpw-g8fm CVSS score: 9.8, CVSS exploitability score: 3.9 🩹 Fixed version: 5.0.1 💥 Has public exploit 🧨 Has CISA KEV exploit

Check failure on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

minimatch:3.0.4

Detected Vulnerabilities: CVE-2022-3517, Severity: High, Source: https://github.com/advisories/GHSA-f8q6-p94x-37v3 CVSS score: 7.5, CVSS exploitability score: 3.9 🩹 Fixed version: 3.0.5 💥 Has public exploit 🧨 Has CISA KEV exploit

Check failure on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

webpack-dev-middleware:5.3.1

Detected Vulnerabilities: CVE-2024-29180, Severity: High, Source: https://github.com/advisories/GHSA-wr3j-pwj9-hqq6 🩹 Fixed version: 5.3.4 💥 Has public exploit 🧨 Has CISA KEV exploit

Check warning on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

express:4.17.3

Detected Vulnerabilities: CVE-2024-29041, Severity: Medium, Source: https://github.com/advisories/GHSA-rv95-896h-c2vc 🩹 Fixed version: 4.19.2 💥 Has public exploit 🧨 Has CISA KEV exploit

Check warning on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

semver:7.0.0

Detected Vulnerabilities: CVE-2022-25883, Severity: Medium, Source: https://github.com/advisories/GHSA-c2qf-rxjj-qqgw CVSS score: 7.5, CVSS exploitability score: 3.9 🩹 Fixed version: 7.5.2 💥 Has public exploit 🧨 Has CISA KEV exploit

Check warning on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

tough-cookie:4.0.0

Detected Vulnerabilities: CVE-2023-26136, Severity: Medium, Source: https://github.com/advisories/GHSA-72xf-g2v4-qvf3 CVSS score: 9.8, CVSS exploitability score: 3.9 🩹 Fixed version: 4.1.3 💥 Has public exploit 🧨 Has CISA KEV exploit

Check warning on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

yargs-parser:9.0.2

Detected Vulnerabilities: CVE-2020-7608, Severity: Medium, Source: https://github.com/advisories/GHSA-p9pc-299p-vxgp CVSS score: 5.3, CVSS exploitability score: 1.8 🩹 Fixed version: 13.1.2 💥 Has public exploit 🧨 Has CISA KEV exploit

Check warning on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

request:2.88.2

Detected Vulnerabilities: CVE-2023-28155, Severity: Medium, Source: https://github.com/advisories/GHSA-p8p7-x288-28g6 CVSS score: 6.1, CVSS exploitability score: 2.8 💥 Has public exploit 🧨 Has CISA KEV exploit

Check warning on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

tough-cookie:2.5.0

Detected Vulnerabilities: CVE-2023-26136, Severity: Medium, Source: https://github.com/advisories/GHSA-72xf-g2v4-qvf3 CVSS score: 9.8, CVSS exploitability score: 3.9 🩹 Fixed version: 4.1.3 💥 Has public exploit 🧨 Has CISA KEV exploit

Check notice on line 1 in yarn.lock

View check run for this annotation

Wiz Inc. (87ff8274df) / Wiz Vulnerability Scanner

debug:3.2.6

Detected Vulnerabilities: CVE-2017-16137, Severity: Low, Source: https://github.com/advisories/GHSA-gxpj-cx7g-858c CVSS score: 5.3, CVSS exploitability score: 3.9 🩹 Fixed version: 3.2.7 💥 Has public exploit 🧨 Has CISA KEV exploit
# yarn lockfile v1


Expand Down Expand Up @@ -4420,9 +4420,9 @@
readable-stream "^2.3.6"

follow-redirects@^1.0.0:
version "1.15.4"
resolved "https://registry.yarnpkg.com/follow-redirects/-/follow-redirects-1.15.4.tgz#cdc7d308bf6493126b17ea2191ea0ccf3e535adf"
integrity sha512-Cr4D/5wlrb0z9dgERpUL3LrmPKVDsETIJhaCMeDfuFYcqa5bldGV6wBsAN6X/vxlXQtFBMrXdXxdL8CbDTGniw==
version "1.15.6"
resolved "https://registry.yarnpkg.com/follow-redirects/-/follow-redirects-1.15.6.tgz#7f815c0cda4249c74ff09e95ef97c23b5fd0399b"
integrity sha512-wWN62YITEaOpSK584EZXJafH1AGpO8RVgElfkuXbTOrPX4fIfOyEpW/CsiNd8JdYrAoOvafRTOEnvsO++qCqFA==

for-in@^1.0.2:
version "1.0.2"
Expand Down
Loading