Moment version 2.11.2 represents a minor update over its predecessor, 2.11.1, within the widely adopted JavaScript date manipulation library. Both versions maintain the core functionalities for parsing, validating, manipulating, and displaying dates and times in JavaScript. A key observation is the consistency in the development dependencies, indicating a similar build and testing environment. Developers familiar with the earlier version will find a seamless transition, as 2.11.2 doesn't introduce breaking changes or alter fundamental APIs.
The upgrade from 2.11.1 to 2.11.2 primarily involves bug fixes, performance enhancements, and potentially minor internal refactoring. While the specific changes aren't explicitly detailed in the provided metadata, users can anticipate improvements in date handling accuracy, efficiency in common operations such as formatting and timezone conversions, and enhanced stability across diverse JavaScript environments. Developers should consult the official changelog or release notes for a complete breakdown of the modifications. The consistent dependency list suggests a focus on refining existing features rather than introducing significant new capabilities. Therefore, upgrading from 2.11.1 is recommended to leverage the bug fixes and optimizations.
All the vulnerabilities related to the version 2.11.2 of the package
Regular Expression Denial of Service in moment
Affected versions of moment
are vulnerable to a low severity regular expression denial of service when parsing dates as strings.
Update to version 2.19.3 or later.
Path Traversal: 'dir/../../filename' in moment.locale
This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg fr
is directly used to switch moment locale.
This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).
Sanitize user-provided locale name before passing it to moment.js.
Are there any links users can visit to find out more?
If you have any questions or comments about this advisory: