Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade @11ty/eleventy from 1.0.0-canary.49 to 1.0.2 #16

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

snyk-bot
Copy link

Snyk has created this PR to upgrade @11ty/eleventy from 1.0.0-canary.49 to 1.0.2.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 8 versions ahead of your current version.
  • The recommended version was released 7 months ago, on 2022-08-16.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ANSIREGEX-1583908
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LUXON-3225081
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Remote Code Execution (RCE)
SNYK-JS-EJS-2803307
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Denial of Service (DoS)
SNYK-JS-ENGINEIO-1056749
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Denial of Service (DoS)
SNYK-JS-ENGINEIO-3136336
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MARKDOWNIT-2331914
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Prototype Pollution
SNYK-JS-MINIMIST-2429795
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Improper Input Validation
SNYK-JS-SOCKETIOPARSER-3091012
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Improper Input Validation
SNYK-JS-SOCKETIOPARSER-3091012
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-UAPARSERJS-3244450
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Release notes
Package name: @11ty/eleventy from @11ty/eleventy GitHub release notes
Commit messages
Package name: @11ty/eleventy
  • f90e54f v1.0.2 code coverage
  • bd42a2a v1.0.2
  • 8a0d955 Bump dependencies (no major version bumps on deps, only devdeps)
  • 880255e Cherry pick https://github.com/add test for pr #2367 11ty/eleventy#2369#issuecomment-1121560097
  • 5cae435 Cherry pick of 4c710d68965b0d0d19d9a6e7e76b1004f4e6e4e1
  • baca2ad fix liquid template argument parsing
  • 6ea1944 v1.0.1
  • b184ac9 v1.0.1-canary.4
  • 8fd660e Update dependencies for 1.0.1
  • e2b121f Add a named function for serverless middleware to make it more obvious what’s happening in the dev server.
  • 6b3db05 Switch to static functions for Eleventy version and help args. Fixes #1313
  • e25a7d2 Fixes #2267
  • bf130f7 Downgrade ava for Node dump errors
  • 7ce1494 Cherry pick to 1.x: Adds `eleventy.version` and `eleventy.generator` to Eleventy supplied global data to fix #2293.
  • e42467b Update dependencies
  • 5d12aad Update dependencies for 1.x
  • 5deb71b Wrong version on utils
  • 2b8fd26 Test for #2278
  • c9f8d16 Fixes #2278
  • aba9676 Forgot a dep in the eleventy-utils cherry-pick
  • f5aa491 Fix bug with incremental and passthrough copy with glob patterns
  • 65a9b91 Re-adds TemplatePath file for backwards compat
  • 9b5dc84 Cherry pick: use @ 11ty/eleventy-utils for TemplatePath.
  • 7091b3d Somehow this test needs a join now.

Compare


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

@github-advanced-security
Copy link

You have successfully added a new checkov configuration .github/workflows/security.yml:Checkov. As part of the setup process, we have scanned this repository and found no existing alerts. In the future, you will see all code scanning alerts on the repository Security tab.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

1 participant