Skip to content

Commit 43e4697

Browse files
Merge pull request #1734 from forcedotcom/m2d/v4.9.0
Main2Dev @W-17615470@ Merging main-4 to dev-4 after v4.9.0
2 parents 2078442 + 69042a6 commit 43e4697

File tree

2 files changed

+68
-7
lines changed

2 files changed

+68
-7
lines changed

package.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "@salesforce/sfdx-scanner",
33
"description": "Static code scanner that applies quality and security rules to Apex code, and provides feedback.",
4-
"version": "4.8.0",
4+
"version": "4.9.0",
55
"author": "Salesforce Code Analyzer Team",
66
"bugs": "https://github.com/forcedotcom/sfdx-scanner/issues",
77
"dependencies": {
@@ -143,13 +143,13 @@
143143
"prepack": "rm -rf lib && tsc -b && oclif manifest && oclif readme && oclif lock && npm shrinkwrap",
144144
"postpack": "rm -f oclif.manifest.json oclif.lock npm-shrinkwrap.json",
145145
"lint-typescript": "eslint ./src --ext .ts --max-warnings 0",
146-
"test": "./gradlew test jacocoTestCoverageVerification && nyc mocha --timeout 60000 --retries 5 \"./test/**/*.test.ts\"",
147-
"test-quiet": "cross-env SFGE_LOGGING=false ./gradlew test jacocoTestCoverageVerification && nyc mocha --timeout 60000 --retries 5 \"./test/**/*.test.ts\"",
146+
"test": "./gradlew test jacocoTestCoverageVerification && cross-env NODE_OPTIONS=--no-experimental-strip-types nyc mocha --timeout 60000 --retries 5 \"./test/**/*.test.ts\"",
147+
"test-quiet": "cross-env SFGE_LOGGING=false ./gradlew test jacocoTestCoverageVerification && cross-env NODE_OPTIONS=--no-experimental-strip-types nyc mocha --timeout 60000 --retries 5 \"./test/**/*.test.ts\"",
148148
"test-cli-messaging": "./gradlew cli-messaging:test cli-messaging:jacocoTestCoverageVerification",
149149
"test-pmd-cataloger": "./gradlew pmd-cataloger:test pmd-cataloger:jacocoTestCoverageVerification",
150150
"test-sfge": "./gradlew sfge:test sfge:jacocoTestCoverageVerification",
151151
"test-sfge-quiet": "cross-env SFGE_LOGGING=false ./gradlew sfge:test sfge:jacocoTestCoverageVerification",
152-
"test-typescript": "tsc -b && nyc mocha --timeout 60000 \"./test/**/*.test.ts\"",
152+
"test-typescript": "tsc -b && cross-env NODE_OPTIONS=--no-experimental-strip-types nyc mocha --timeout 60000 \"./test/**/*.test.ts\"",
153153
"version": "oclif readme && git add README.md"
154154
}
155155
}

retire-js/RetireJsVulns.json

Lines changed: 64 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4957,8 +4957,7 @@
49574957
"identifiers": {
49584958
"summary": "Regular Expression Denial of Service (ReDoS), Affecting moment package, versions >=2.18.0 <2.29.4",
49594959
"CVE": [
4960-
"CVE-2022-31129",
4961-
"CVE-2023-22467"
4960+
"CVE-2022-31129"
49624961
],
49634962
"githubID": "GHSA-wc69-rhjr-hc9g"
49644963
},
@@ -6815,6 +6814,27 @@
68156814
"https://github.com/vercel/next.js"
68166815
]
68176816
},
6817+
{
6818+
"atOrAbove": "13.0.0",
6819+
"below": "13.5.8",
6820+
"cwe": [
6821+
"CWE-770"
6822+
],
6823+
"severity": "medium",
6824+
"identifiers": {
6825+
"summary": "Next.js Allows a Denial of Service (DoS) with Server Actions",
6826+
"CVE": [
6827+
"CVE-2024-56332"
6828+
],
6829+
"githubID": "GHSA-7m27-7ghc-44w9"
6830+
},
6831+
"info": [
6832+
"https://github.com/advisories/GHSA-7m27-7ghc-44w9",
6833+
"https://github.com/vercel/next.js/security/advisories/GHSA-7m27-7ghc-44w9",
6834+
"https://nvd.nist.gov/vuln/detail/CVE-2024-56332",
6835+
"https://github.com/vercel/next.js"
6836+
]
6837+
},
68186838
{
68196839
"atOrAbove": "13.4.0",
68206840
"below": "14.1.1",
@@ -6906,6 +6926,48 @@
69066926
"https://github.com/vercel/next.js",
69076927
"https://github.com/vercel/next.js/releases/tag/v14.2.15"
69086928
]
6929+
},
6930+
{
6931+
"atOrAbove": "14.0.0",
6932+
"below": "14.2.21",
6933+
"cwe": [
6934+
"CWE-770"
6935+
],
6936+
"severity": "medium",
6937+
"identifiers": {
6938+
"summary": "Next.js Allows a Denial of Service (DoS) with Server Actions",
6939+
"CVE": [
6940+
"CVE-2024-56332"
6941+
],
6942+
"githubID": "GHSA-7m27-7ghc-44w9"
6943+
},
6944+
"info": [
6945+
"https://github.com/advisories/GHSA-7m27-7ghc-44w9",
6946+
"https://github.com/vercel/next.js/security/advisories/GHSA-7m27-7ghc-44w9",
6947+
"https://nvd.nist.gov/vuln/detail/CVE-2024-56332",
6948+
"https://github.com/vercel/next.js"
6949+
]
6950+
},
6951+
{
6952+
"atOrAbove": "15.0.0",
6953+
"below": "15.1.2",
6954+
"cwe": [
6955+
"CWE-770"
6956+
],
6957+
"severity": "medium",
6958+
"identifiers": {
6959+
"summary": "Next.js Allows a Denial of Service (DoS) with Server Actions",
6960+
"CVE": [
6961+
"CVE-2024-56332"
6962+
],
6963+
"githubID": "GHSA-7m27-7ghc-44w9"
6964+
},
6965+
"info": [
6966+
"https://github.com/advisories/GHSA-7m27-7ghc-44w9",
6967+
"https://github.com/vercel/next.js/security/advisories/GHSA-7m27-7ghc-44w9",
6968+
"https://nvd.nist.gov/vuln/detail/CVE-2024-56332",
6969+
"https://github.com/vercel/next.js"
6970+
]
69096971
}
69106972
],
69116973
"extractors": {
@@ -7867,7 +7929,6 @@
78677929
"identifiers": {
78687930
"summary": "PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF",
78697931
"CVE": [
7870-
"CVE-2024-34342",
78717932
"CVE-2024-4367"
78727933
],
78737934
"githubID": "GHSA-wgrm-67xf-hhpq"

0 commit comments

Comments
 (0)