Skip to content

[Snyk] Upgrade react-router-dom from 5.2.0 to 5.3.4#135

Open
prymehat wants to merge 1 commit intomainfrom
snyk-upgrade-fedf5846ce15c7034a4cc6b56223d7ed
Open

[Snyk] Upgrade react-router-dom from 5.2.0 to 5.3.4#135
prymehat wants to merge 1 commit intomainfrom
snyk-upgrade-fedf5846ce15c7034a4cc6b56223d7ed

Conversation

@prymehat
Copy link
Copy Markdown
Collaborator

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123)

Snyk has created this PR to upgrade react-router-dom from 5.2.0 to 5.3.4.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 6 versions ahead of your current version.

  • The recommended version was released on 2 years ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Remote Code Execution (RCE)
SNYK-JS-EJS-2803307
526 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ES5EXT-6095076
526 Proof of Concept
high severity Inefficient Regular Expression Complexity
SNYK-JS-MICROMATCH-6838728
526 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ANSIHTML-1296849
526 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
526 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
526 Proof of Concept
high severity Improper Input Validation
SNYK-JS-URLPARSE-2407770
526 Proof of Concept
high severity Path Traversal
SNYK-JS-WEBPACKDEVMIDDLEWARE-6476555
526 Proof of Concept
high severity Improper Input Validation
SNYK-JS-FOLLOWREDIRECTS-6141137
526 Proof of Concept
high severity Server-side Request Forgery (SSRF)
SNYK-JS-IP-6240864
526 Proof of Concept
high severity Prototype Poisoning
SNYK-JS-QS-3153490
526 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
526 Proof of Concept
high severity Improper Verification of Cryptographic Signature
SNYK-JS-NODEFORGE-2430339
526 No Known Exploit
high severity Arbitrary File Write
SNYK-JS-TAR-1579147
526 No Known Exploit
high severity Arbitrary File Write
SNYK-JS-TAR-1579152
526 No Known Exploit
high severity Arbitrary File Write
SNYK-JS-TAR-1579155
526 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TMPL-1583443
526 Proof of Concept
high severity Prototype Pollution
SNYK-JS-UNSETVALUE-2400660
526 No Known Exploit
high severity Prototype Pollution
SNYK-JS-ASYNC-2441827
526 Proof of Concept
high severity Uncontrolled resource consumption
SNYK-JS-BRACES-6838727
526 Proof of Concept
high severity Uncontrolled resource consumption
SNYK-JS-BRACES-6838727
526 Proof of Concept
high severity Improper Verification of Cryptographic Signature
SNYK-JS-BROWSERIFYSIGN-6037026
526 No Known Exploit
high severity Command Injection
SNYK-JS-LODASHTEMPLATE-1088054
526 Proof of Concept
high severity Inefficient Regular Expression Complexity
SNYK-JS-MICROMATCH-6838728
526 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
526 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
526 Proof of Concept
high severity Remote Code Execution (RCE)
SNYK-JS-SHELLQUOTE-1766506
526 No Known Exploit
high severity Arbitrary File Overwrite
SNYK-JS-TAR-1536528
526 No Known Exploit
high severity Arbitrary File Overwrite
SNYK-JS-TAR-1536531
526 No Known Exploit
medium severity Arbitrary Code Injection
SNYK-JS-EJS-1049328
526 Proof of Concept
medium severity Improper Control of Dynamically-Managed Code Resources
SNYK-JS-EJS-6689533
526 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-MINIMATCH-3050818
526 No Known Exploit
medium severity Information Exposure
SNYK-JS-NANOID-2332193
526 Proof of Concept
medium severity Access Restriction Bypass
SNYK-JS-URLPARSE-2401205
526 Proof of Concept
medium severity Authorization Bypass
SNYK-JS-URLPARSE-2407759
526 Proof of Concept
medium severity Authorization Bypass Through User-Controlled Key
SNYK-JS-URLPARSE-2412697
526 Proof of Concept
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-6444610
526 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-GLOBPARENT-1016905
526 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-IMMER-1540542
526 Proof of Concept
medium severity Reverse Tabnabbing
SNYK-JS-ISTANBULREPORTS-2328088
526 No Known Exploit
medium severity Prototype Pollution
SNYK-JS-JSON5-3182856
526 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-JSON5-3182856
526 Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JS-NWSAPI-2841516
526 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-POSTCSS-1090595
526 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-POSTCSS-1255640
526 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PROMPTS-1729737
526 Proof of Concept
medium severity Open Redirect
SNYK-JS-NODEFORGE-2330875
526 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-NODEFORGE-2331908
526 No Known Exploit
medium severity Improper Verification of Cryptographic Signature
SNYK-JS-NODEFORGE-2430337
526 No Known Exploit
medium severity Improper Verification of Cryptographic Signature
SNYK-JS-NODEFORGE-2430341
526 No Known Exploit
medium severity Information Exposure
SNYK-JS-EVENTSOURCE-2823375
526 Proof of Concept
medium severity Open Redirect
SNYK-JS-EXPRESS-6474509
526 No Known Exploit
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-2332181
526 Proof of Concept
medium severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JS-TAR-6476909
526 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TERSER-2806366
526 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TERSER-2806366
526 No Known Exploit
medium severity Prototype Pollution
SNYK-JS-TOUGHCOOKIE-5672873
526 Proof of Concept
medium severity Open Redirect
SNYK-JS-URLPARSE-1533425
526 Proof of Concept
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
526 Proof of Concept
low severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-2396346
526 No Known Exploit
critical severity Incomplete List of Disallowed Inputs
SNYK-JS-BABELTRAVERSE-5962462
526 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-BROWSERSLIST-1090194
526 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-WORDWRAP-3149973
526 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TAR-1536758
526 No Known Exploit
Release notes
Package name: react-router-dom
  • 5.3.4 - 2022-10-02
  • 5.3.3 - 2022-05-18
  • 5.3.2 - 2022-05-17
  • 5.3.1 - 2022-04-17
  • 5.3.0 - 2021-09-03
  • 5.2.1 - 2021-08-27
  • 5.2.0 - 2020-05-11
from react-router-dom GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

Snyk has created this PR to upgrade react-router-dom from 5.2.0 to 5.3.4.

See this package in npm:
react-router-dom

See this project in Snyk:
https://app.snyk.io/org/prymehat/project/7f703803-31c7-4bb5-b7e8-90ef855830bd?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants