high severity |
Prototype Pollution SNYK-JS-JSONSCHEMA-1920922 |
644 |
No Known Exploit |
high severity |
Code Injection SNYK-JS-LODASH-1040724 |
644 |
Proof of Concept |
high severity |
Arbitrary Code Injection SNYK-JS-XMLHTTPREQUESTSSL-1082936 |
644 |
Proof of Concept |
high severity |
Access Restriction Bypass SNYK-JS-XMLHTTPREQUESTSSL-1255647 |
644 |
Proof of Concept |
high severity |
Prototype Pollution SNYK-JS-LODASH-450202 |
644 |
Proof of Concept |
high severity |
Prototype Pollution SNYK-JS-LODASH-608086 |
644 |
Proof of Concept |
high severity |
Prototype Pollution SNYK-JS-LODASH-6139239 |
644 |
Proof of Concept |
high severity |
Prototype Pollution SNYK-JS-LODASH-73638 |
644 |
Proof of Concept |
high severity |
Prototype Pollution SNYK-JS-OBJECTPATH-1017036 |
644 |
Proof of Concept |
high severity |
Prototype Poisoning SNYK-JS-QS-3153490 |
644 |
Proof of Concept |
high severity |
Denial of Service (DoS) npm:qs:20140806 |
644 |
No Known Exploit |
high severity |
Prototype Override Protection Bypass npm:qs:20170213 |
644 |
No Known Exploit |
high severity |
Prototype Poisoning SNYK-JS-QS-3153490 |
644 |
Proof of Concept |
high severity |
Prototype Poisoning SNYK-JS-QS-3153490 |
644 |
Proof of Concept |
high severity |
Prototype Override Protection Bypass npm:qs:20170213 |
644 |
No Known Exploit |
high severity |
Denial of Service (DoS) SNYK-JS-DECODEURICOMPONENT-3149970 |
644 |
Proof of Concept |
high severity |
Denial of Service (DoS) SNYK-JS-ENGINEIO-1056749 |
644 |
Proof of Concept |
high severity |
Denial of Service (DoS) SNYK-JS-ENGINEIO-3136336 |
644 |
No Known Exploit |
high severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-ES5EXT-6095076 |
644 |
Proof of Concept |
high severity |
Arbitrary File Overwrite SNYK-JS-FSTREAM-174725 |
644 |
No Known Exploit |
high severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-SEMVER-3247795 |
644 |
Proof of Concept |
high severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-SEMVER-3247795 |
644 |
Proof of Concept |
high severity |
Denial of Service (DoS) SNYK-JS-SOCKETIOPARSER-1056752 |
644 |
Proof of Concept |
high severity |
Arbitrary File Overwrite SNYK-JS-TAR-1536528 |
644 |
No Known Exploit |
high severity |
Arbitrary File Overwrite SNYK-JS-TAR-1536531 |
644 |
No Known Exploit |
high severity |
Arbitrary File Write SNYK-JS-TAR-1579147 |
644 |
No Known Exploit |
high severity |
Arbitrary File Write SNYK-JS-TAR-1579152 |
644 |
No Known Exploit |
high severity |
Arbitrary File Write SNYK-JS-TAR-1579155 |
644 |
No Known Exploit |
high severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-UAPARSERJS-1023599 |
644 |
Proof of Concept |
high severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-UAPARSERJS-610226 |
644 |
Proof of Concept |
high severity |
Denial of Service (DoS) npm:ws:20171108 |
644 |
Mature |
high severity |
Prototype Pollution npm:deap:20180415 |
644 |
Proof of Concept |
high severity |
Prototype Pollution npm:deep-extend:20180409 |
644 |
Proof of Concept |
high severity |
Prototype Pollution npm:extend:20180424 |
644 |
No Known Exploit |
high severity |
Regular Expression Denial of Service (ReDoS) npm:fresh:20170908 |
644 |
No Known Exploit |
high severity |
Regular Expression Denial of Service (ReDoS) npm:fresh:20170908 |
644 |
No Known Exploit |
high severity |
Regular Expression Denial of Service (ReDoS) npm:parsejson:20170908 |
644 |
No Known Exploit |
high severity |
Regular Expression Denial of Service (ReDoS) npm:sshpk:20180409 |
644 |
Proof of Concept |
high severity |
Regular Expression Denial of Service (ReDoS) npm:sshpk:20180409 |
644 |
Proof of Concept |
medium severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-LODASH-1018905 |
644 |
Proof of Concept |
medium severity |
Prototype Pollution SNYK-JS-YARGSPARSER-560381 |
644 |
Proof of Concept |
medium severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-LODASH-73639 |
644 |
Proof of Concept |
medium severity |
Prototype Pollution npm:lodash:20180130 |
644 |
Proof of Concept |
medium severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-MINIMATCH-3050818 |
644 |
No Known Exploit |
medium severity |
Prototype Pollution SNYK-JS-MINIMIST-559764 |
644 |
Proof of Concept |
medium severity |
Prototype Pollution SNYK-JS-MINIMIST-559764 |
644 |
Proof of Concept |
medium severity |
Prototype Pollution SNYK-JS-OBJECTPATH-1569453 |
644 |
Proof of Concept |
medium severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-PATHPARSE-1077067 |
644 |
Proof of Concept |
medium severity |
Denial of Service (DoS) npm:qs:20140806-1 |
644 |
No Known Exploit |
medium severity |
Cross-site Scripting (XSS) SNYK-JS-CONNECT-5846225 |
644 |
Proof of Concept |
medium severity |
Denial of Service (DoS) npm:connect:20120107 |
644 |
No Known Exploit |
medium severity |
Cross-site Scripting (XSS) npm:connect:20130701 |
644 |
No Known Exploit |
medium severity |
Cross-site Scripting (XSS) SNYK-JS-COOKIE-8163060 |
644 |
No Known Exploit |
medium severity |
Prototype Pollution SNYK-JS-EAZYLOGGER-8708044 |
644 |
Proof of Concept |
medium severity |
Open Redirect SNYK-JS-EXPRESS-6474509 |
644 |
No Known Exploit |
medium severity |
Cross-site Scripting SNYK-JS-EXPRESS-7926867 |
644 |
No Known Exploit |
medium severity |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') SNYK-JS-EXPRESS-8310337 |
644 |
Proof of Concept |
medium severity |
Cross-site Scripting (XSS) npm:express:20140912 |
644 |
No Known Exploit |
medium severity |
Denial of Service (DoS) SNYK-JS-HTTPPROXY-569139 |
644 |
Proof of Concept |
medium severity |
Insecure Defaults SNYK-JS-SOCKETIO-1024859 |
644 |
Proof of Concept |
medium severity |
Uncontrolled Resource Consumption ('Resource Exhaustion') SNYK-JS-TAR-6476909 |
644 |
Proof of Concept |
medium severity |
Regular Expression Denial of Service (ReDoS) npm:tough-cookie:20170905 |
644 |
No Known Exploit |
medium severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-UAPARSERJS-1072471 |
644 |
Proof of Concept |
medium severity |
Regular Expression Denial of Service (ReDoS) npm:ua-parser-js:20180227 |
644 |
Proof of Concept |
medium severity |
Arbitrary Code Injection SNYK-JS-UNDERSCORE-1080984 |
644 |
Proof of Concept |
medium severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-WS-1296835 |
644 |
Proof of Concept |
low severity |
Prototype Pollution SNYK-JS-MINIMIST-2429795 |
644 |
Proof of Concept |
low severity |
Prototype Pollution SNYK-JS-MINIMIST-2429795 |
644 |
Proof of Concept |
low severity |
Prototype Pollution SNYK-JS-MINIMIST-2429795 |
644 |
Proof of Concept |
low severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-BRACEEXPANSION-9789073 |
644 |
Proof of Concept |
low severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-BRACEEXPANSION-9789073 |
644 |
Proof of Concept |
low severity |
Regular Expression Denial of Service (ReDoS) npm:braces:20180219 |
644 |
Proof of Concept |
low severity |
Cross-site Scripting SNYK-JS-SEND-7926862 |
644 |
No Known Exploit |
low severity |
Cross-site Scripting SNYK-JS-SERVESTATIC-7926865 |
644 |
No Known Exploit |
critical severity |
Improper Input Validation SNYK-JS-SOCKETIOPARSER-3091012 |
644 |
No Known Exploit |
medium severity |
Regular Expression Denial of Service (ReDoS) npm:ua-parser-js:20171012 |
644 |
No Known Exploit |
medium severity |
Insecure Randomness npm:ws:20160920 |
644 |
No Known Exploit |
low severity |
Regular Expression Denial of Service (ReDoS) SNYK-JS-TAR-1536758 |
644 |
No Known Exploit |
low severity |
Regular Expression Denial of Service (ReDoS) npm:clean-css:20180306 |
644 |
Proof of Concept |
low severity |
Regular Expression Denial of Service (ReDoS) npm:debug:20170905 |
644 |
Proof of Concept |
low severity |
Regular Expression Denial of Service (ReDoS) npm:debug:20170905 |
644 |
Proof of Concept |
low severity |
Regular Expression Denial of Service (ReDoS) npm:debug:20170905 |
644 |
Proof of Concept |
low severity |
Regular Expression Denial of Service (ReDoS) npm:debug:20170905 |
644 |
Proof of Concept |
low severity |
Regular Expression Denial of Service (ReDoS) npm:mime:20170907 |
644 |
No Known Exploit |
low severity |
Regular Expression Denial of Service (ReDoS) npm:mime:20170907 |
644 |
No Known Exploit |
low severity |
Regular Expression Denial of Service (ReDoS) npm:ms:20170412 |
644 |
No Known Exploit |
low severity |
Regular Expression Denial of Service (ReDoS) npm:ms:20170412 |
644 |
No Known Exploit |
low severity |
Regular Expression Denial of Service (ReDoS) npm:ms:20170412 |
644 |
No Known Exploit |
low severity |
Regular Expression Denial of Service (ReDoS) npm:ms:20170412 |
644 |
No Known Exploit |
snyk-top-banner
Snyk has created this PR to upgrade browser-sync from 2.18.13 to 3.0.4.
i️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
The recommended version is 79 versions ahead of your current version.
The recommended version was released 5 months ago.
Issues fixed by the recommended upgrade:
SNYK-JS-JSONSCHEMA-1920922
SNYK-JS-LODASH-1040724
SNYK-JS-XMLHTTPREQUESTSSL-1082936
SNYK-JS-XMLHTTPREQUESTSSL-1255647
SNYK-JS-LODASH-450202
SNYK-JS-LODASH-608086
SNYK-JS-LODASH-6139239
SNYK-JS-LODASH-73638
SNYK-JS-OBJECTPATH-1017036
SNYK-JS-QS-3153490
npm:qs:20140806
npm:qs:20170213
SNYK-JS-QS-3153490
SNYK-JS-QS-3153490
npm:qs:20170213
SNYK-JS-DECODEURICOMPONENT-3149970
SNYK-JS-ENGINEIO-1056749
SNYK-JS-ENGINEIO-3136336
SNYK-JS-ES5EXT-6095076
SNYK-JS-FSTREAM-174725
SNYK-JS-SEMVER-3247795
SNYK-JS-SEMVER-3247795
SNYK-JS-SOCKETIOPARSER-1056752
SNYK-JS-TAR-1536528
SNYK-JS-TAR-1536531
SNYK-JS-TAR-1579147
SNYK-JS-TAR-1579152
SNYK-JS-TAR-1579155
SNYK-JS-UAPARSERJS-1023599
SNYK-JS-UAPARSERJS-610226
npm:ws:20171108
npm:deap:20180415
npm:deep-extend:20180409
npm:extend:20180424
npm:fresh:20170908
npm:fresh:20170908
npm:parsejson:20170908
npm:sshpk:20180409
npm:sshpk:20180409
SNYK-JS-LODASH-1018905
SNYK-JS-YARGSPARSER-560381
SNYK-JS-LODASH-73639
npm:lodash:20180130
SNYK-JS-MINIMATCH-3050818
SNYK-JS-MINIMIST-559764
SNYK-JS-MINIMIST-559764
SNYK-JS-OBJECTPATH-1569453
SNYK-JS-PATHPARSE-1077067
npm:qs:20140806-1
SNYK-JS-CONNECT-5846225
npm:connect:20120107
npm:connect:20130701
SNYK-JS-COOKIE-8163060
SNYK-JS-EAZYLOGGER-8708044
SNYK-JS-EXPRESS-6474509
SNYK-JS-EXPRESS-7926867
SNYK-JS-EXPRESS-8310337
npm:express:20140912
SNYK-JS-HTTPPROXY-569139
SNYK-JS-SOCKETIO-1024859
SNYK-JS-TAR-6476909
npm:tough-cookie:20170905
SNYK-JS-UAPARSERJS-1072471
npm:ua-parser-js:20180227
SNYK-JS-UNDERSCORE-1080984
SNYK-JS-WS-1296835
SNYK-JS-MINIMIST-2429795
SNYK-JS-MINIMIST-2429795
SNYK-JS-MINIMIST-2429795
SNYK-JS-BRACEEXPANSION-9789073
SNYK-JS-BRACEEXPANSION-9789073
npm:braces:20180219
SNYK-JS-SEND-7926862
SNYK-JS-SERVESTATIC-7926865
SNYK-JS-SOCKETIOPARSER-3091012
npm:ua-parser-js:20171012
npm:ws:20160920
SNYK-JS-TAR-1536758
npm:clean-css:20180306
npm:debug:20170905
npm:debug:20170905
npm:debug:20170905
npm:debug:20170905
npm:mime:20170907
npm:mime:20170907
npm:ms:20170412
npm:ms:20170412
npm:ms:20170412
npm:ms:20170412
Release notes
Package name: browser-sync
v3.0.4
What's Changed
Full Changelog: v3.0.2...v3.0.3
What's Changed
New Contributors
Full Changelog: v3.0.1...v3.0.2
What's Changed
Full Changelog: v2.29.3...v3.0.1
v3.0.0
v3.0.0-alpha.2
v3.0.0-alpha.1
v3.0.0-alpha.0
v2.30.0-alpha.3
v2.30.0-alpha.2
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.
For more information: