Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: mycoding/node-email
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: master
Choose a base ref
...
head repository: aheckmann/node-email
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: master
Choose a head ref
Checking mergeability… Don’t worry, you can still create the pull request.
  • 12 commits
  • 6 files changed
  • 4 contributors

Commits on Sep 7, 2011

  1. test for global var leaks

    aheckmann committed Sep 7, 2011
    Configuration menu
    Copy the full SHA
    8215a29 View commit details
    Browse the repository at this point in the history

Commits on Mar 3, 2012

  1. Configuration menu
    Copy the full SHA
    4cd7e00 View commit details
    Browse the repository at this point in the history

Commits on Mar 5, 2012

  1. Merge pull request aheckmann#21 from boozedog/master

    Get rid of the npm "should probably be bugs['url']" warning
    aheckmann committed Mar 5, 2012
    Configuration menu
    Copy the full SHA
    c876760 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    da80784 View commit details
    Browse the repository at this point in the history
  3. release 0.2.5

    aheckmann committed Mar 5, 2012
    Configuration menu
    Copy the full SHA
    59f69a6 View commit details
    Browse the repository at this point in the history

Commits on May 30, 2013

  1. bump gleak;

    aheckmann committed May 30, 2013
    Configuration menu
    Copy the full SHA
    d1ef1f2 View commit details
    Browse the repository at this point in the history
  2. Fix shell injection vulnerability.

    send() was shelling out using `echo` to write to sendmail's
    stdin. This opened the possibility of shell injection if your
    email body contained something like:
    
        var evil_body = "$(touch /tmp/evil_access && cat /etc/passwd)";
    
    This commit makes send() spawn sendmail directly (without making a new shell)
    and then writes to sendmail's stdin.
    Peter Sanford authored and aheckmann committed May 30, 2013
    Configuration menu
    Copy the full SHA
    8e27e59 View commit details
    Browse the repository at this point in the history
  3. release 0.2.6

    aheckmann committed May 30, 2013
    Configuration menu
    Copy the full SHA
    c81a838 View commit details
    Browse the repository at this point in the history

Commits on Jan 9, 2014

  1. travis

    Aaron Heckmann committed Jan 9, 2014
    Configuration menu
    Copy the full SHA
    bdedd58 View commit details
    Browse the repository at this point in the history
  2. add travis badge

    Aaron Heckmann committed Jan 9, 2014
    Configuration menu
    Copy the full SHA
    9828925 View commit details
    Browse the repository at this point in the history

Commits on Mar 4, 2016

  1. Update README.md

    Fix README
    
    Ooold repo
    aheckmann committed Mar 4, 2016
    Configuration menu
    Copy the full SHA
    0ff6323 View commit details
    Browse the repository at this point in the history

Commits on Oct 3, 2024

  1. deprecated

    aheckmann authored Oct 3, 2024
    Configuration menu
    Copy the full SHA
    c09ebb7 View commit details
    Browse the repository at this point in the history
Loading