Mocha 8.3.0 presents a refinement of the popular JavaScript testing framework, building upon the foundation of version 8.2.1. While both versions retain the core characteristics of being a simple, flexible, and fun testing environment, several dependency updates introduce notable changes. Key dependency upgrades in mocha 8.3.0 include updates to debug, diff, glob js-yaml, supports-color and yargs offering potential bug fixes, performance improvements, or new features within those underlying libraries. specifically debug was updated from 4.2.0 to 4.3.1. diff was updated from 4.0.2 to 5.0.0. glob updated from 7.1.6 to 7.1.6. js-yaml updated from 3.14.0 to 4.0.0. supports-color updated from 7.2.0 to 8.1.1 and yargs updated from 13.3.2 to 16.2.0. These updates should provide modern features that come with the newer versions of the dependencies. Although the changes between each micro or minor release may not be massive, they introduce new features or patch vulnerabilities, making the new version more stable and performant. These updates are very important for every developer as they can improve the overall security and performance. Developers should evaluate these updated dependencies to ensure compatibility with their existing test suites and take advantage of any enhancements they offer. Besides the dependencies upgrades that mocha has, both versions share a common set of devDependencies, suggesting no significant tooling or development workflow changes between the releases.
All the vulnerabilities related to the version 8.3.0 of the package
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
Predictable results in nanoid generation when given non-integer values
When nanoid is called with a fractional value, there were a number of undesirable effects:
Version 3.3.8 and 5.0.9 are fixed.
minimatch ReDoS vulnerability
A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.