Cli-table2 offers developers a powerful tool for creating visually appealing and customizable tables directly within the command line interface. Both version 0.1.8 and 0.1.9 of cli-table2 provide the core functionality of rendering unicode tables, building upon the foundation of the original cli-table library. They share key dependencies like lodash (version 2.4.1) for utility functions and colors (version 1.0.3) for adding color to the tables. Developers will find a familiar set of development dependencies in both versions including tools for testing (chai, sinon, sinon-chai), code coverage (coveralls, gulp-istanbul), and build automation (gulp). These dependencies ensure code quality and a robust development environment.
The primary distinction between versions 0.1.8 and 0.1.9 lies in their release dates. Version 0.1.9 was published on July 28, 2015, at 23:04:06.989Z, approximately four hours after version 0.1.8, which was released on the same day at 19:05:43.733Z. This suggests that version 0.1.9 likely incorporates bug fixes, minor enhancements, or dependency updates made shortly after the initial release of 0.1.8. For developers seeking the most up-to-date and potentially more stable version, opting for 0.1.9 would be advisable. Given the rapid succession of releases, the changes are likely incremental and would not drastically alter the core usage or API of the library. Developers can leverage cli-table2 to structure and present data effectively within command-line applications leveraging its flexible customization options to tailor the tables appearance.
All the vulnerabilities related to the version 0.1.9 of the package
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Prototype Pollution in lodash
Versions of lodash
before 4.17.11 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.11 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via __proto__
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.5 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep
allows a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.12 or later.