Cli-table2 is a node.js package designed for creating visually appealing Unicode tables directly within your command-line interface. Based on the original cli-table package, it offers a polished way to present data in a readable and organized format. Comparing versions 0.1.4 and 0.1.5, the core functionality and dependencies remain consistent, utilizing colors for text styling and lodash for utility functions. Both versions tout the same set of developer dependencies, including tools for testing (chai, sinon, sinon-chai, gulp-mocha), code coverage (coveralls, gulp-istanbul), and task automation (gulp, gulp-util).
The primary distinction between the two versions lies in their release dates. Version 0.1.5 was published on December 22, 2014, while version 0.1.4 was released on December 21, 2014, indicating a minor update. While the specific changes introduced in version 0.1.5 aren't explicitly detailed in this data, the quick turnaround suggests bug fixes, very small enhancements, or dependency updates.
For developers using cli-table2, the package provides a clean and straightforward approach to constructing tables with customizable styling options. The underlying MIT license grants flexibility in incorporating the library into various projects. The presence of extensive testing and coverage tools in the devDependencies suggests a commitment to code quality. Developers can leverage cli-table2 to enhance command-line applications by presenting data in an easily digestible tabular format, improving user experience.
All the vulnerabilities related to the version 0.1.5 of the package
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Prototype Pollution in lodash
Versions of lodash
before 4.17.11 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.11 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via __proto__
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.5 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep
allows a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.12 or later.