[Snyk] Upgrade firebase-admin from 5.10.0 to 5.13.1 #1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to upgrade firebase-admin from 5.10.0 to 5.13.1.
ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
The recommended version fixes:
SNYK-JS-Y18N-1021887
Why? Proof of Concept exploit, CVSS 7.3
npm:base64url:20180511
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-AJV-584908
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-AJV-584908
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-HAWK-2808852
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-HAWK-2808852
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-INI-1048974
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SEMVER-3247795
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SETVALUE-1540541
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SETVALUE-450213
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SETVALUE-1540541
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-SETVALUE-450213
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-TAR-1536528
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MIXINDEEP-450212
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-TAR-1536531
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-TAR-1579147
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-TAR-1579152
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-TAR-1579155
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-TAR-174125
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-LODASH-1040724
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-DECODEURICOMPONENT-3149970
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-LODASH-450202
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-LODASH-567746
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-LODASH-608086
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-WEBSOCKETEXTENSIONS-570623
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-LODASH-73638
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-FSTREAM-174725
Why? Proof of Concept exploit, CVSS 7.3
npm:deep-extend:20180409
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-GRPC-598671
Why? Proof of Concept exploit, CVSS 7.3
npm:extend:20180424
Why? Proof of Concept exploit, CVSS 7.3
npm:protobufjs:20180305
Why? Proof of Concept exploit, CVSS 7.3
npm:sshpk:20180409
Why? Proof of Concept exploit, CVSS 7.3
npm:atob:20180429
Why? Proof of Concept exploit, CVSS 7.3
npm:node-forge:20180226
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MINIMIST-559764
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MINIMIST-559764
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-LODASH-1018905
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-LODASH-73639
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MINIMATCH-3050818
Why? Proof of Concept exploit, CVSS 7.3
npm:cryptiles:20180710
Why? Proof of Concept exploit, CVSS 7.3
npm:stringstream:20180511
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MINIMIST-2429795
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-MINIMIST-2429795
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-TAR-1536758
Why? Proof of Concept exploit, CVSS 7.3
SNYK-JS-KINDOF-537849
Why? Proof of Concept exploit, CVSS 7.3
(*) Note that the real score may have changed since the PR was raised.
Release notes
Package name: firebase-admin
Timestamp
type from theadmin.firestore
namespace.GCLOUD_PROJECT
andGOOGLE_CLOUD_PROJECT
environment variables.Authentication
serviceAccountId
app option, which can be used to specify just the client email of a service account.Database
admin.database.Query.once()
method to return a more specific type.Cloud Messaging
admin.messaging.WebpushNotification
type to include all supported notification fields.Authentication
auth.createSessionCookie()
method for creating a session cookie from a Firebase ID token.auth.verifySessionCookie()
method for validating a given session cookie string.Cloud Messaging
mutableContent
optional field to themessaging.Aps
type. This can be used to set themutable-content
property when sending FCM messages to APNS targets.messaging.Aps
type.Firebase Auth
auth.importUsers()
method for importing users to Firebase Auth in bulk.admin.database().ref()
method with anotherReference
instance as the argument.Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.
For more information:
🧐 View latest project report
🛠 Adjust upgrade PR settings
🔕 Ignore this dependency or unsubscribe from future upgrade PRs