Grunt-conventional-changelog simplifies changelog generation for Grunt projects, using the conventional-changelog standard. Version 5.0.0 brings notable improvements over version 4.1.0, most significantly in its dependency on conventional-changelog. The update boosts this core dependency from version 0.4.0 to 0.5.0, unlocking the benefits of the underlying changelog generator updates. Developers could expect an updated set of features in how changelogs are created.
Examining the devDependencies, version 5.0.0 introduces "grunt-conventional-github-releaser":"^0.4.0" and removes grunt-bump dependency and so includes its features by replacing it with "grunt-conventional-github-releaser".
Both versions share considerable similarities, leveraging tools like Chalk for terminal styling, Concat-stream for efficient stream manipulation, and Q for promise management. The suite of Grunt-related development dependencies remains mostly consistent to aid in tasks such as linting, unit testing, code coverage, and style checking, ensuring code quality. The core functionality remains the same about enabling automated changelog generation based on commit messages, following the conventional-changelog format, improving project maintainability and communication with users. Version 5.0.0 can be considered a safe and beneficial update for developers already using the library. Given the focus on dependency upgrades, existing configurations are expected to remain compatible, simplifying the migration process.
All the vulnerabilities related to the version 5.0.0 of the package
Uncontrolled Resource Consumption in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end()
method.
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Prototype Pollution in lodash
Versions of lodash
before 4.17.11 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.11 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via __proto__
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.5 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep
allows a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.12 or later.
Prototype Pollution in lodash
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The functions pick
, set
, setWith
, update
, updateWith
, and zipObjectDeep
allow a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires manipulating objects based on user-provided property values or arrays.
This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.
dot-prop Prototype Pollution vulnerability
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.