E530 [Snyk] Security upgrade nocodb from 0.264.8 to 0.301.3 by o1lab · Pull Request #13176 · nocodb/nocodb · GitHub
[go: up one dir, main page]

Skip to content

[Snyk] Security upgrade nocodb from 0.264.8 to 0.301.3#13176

Open
o1lab wants to merge 1 commit intodevelopfrom
snyk-fix-e7913e89f19627608efe71f98a5e4e4e
Open

[Snyk] Security upgrade nocodb from 0.264.8 to 0.301.3#13176
o1lab wants to merge 1 commit intodevelopfrom
snyk-fix-e7913e89f19627608efe71f98a5e4e4e

Conversation

@o1lab
Copy link
Member
@o1lab o1lab commented Mar 4, 2026

snyk-top-banner

Snyk has created this PR to fix 9 vulnerabilities in the npm dependencies of this project.

Snyk changed the following file(s):

  • scripts/pkg-executable/package.json

Vulnerabilities that will be fixed with an upgrade:

Issue
medium severity Credential Exposure
SNYK-JS-NOCODB-15369507
medium severity Information Exposure
SNYK-JS-NOCODB-15369535
high severity Insufficient Session Expiration
SNYK-JS-NOCODB-15369536
medium severity Authorization Bypass Through User-Controlled Key
SNYK-JS-NOCODB-15369537
medium severity Cross-site Scripting (XSS)
SNYK-JS-NOCODB-15369546
high severity SQL Injection
SNYK-JS-NOCODB-15369547
medium severity Cross-site Scripting (XSS)
SNYK-JS-NOCODB-15369553
medium severity Cross-site Scripting (XSS)
SNYK-JS-NOCODB-15369557
medium severity Cross-site Scripting (XSS)
SNYK-JS-NOCODB-15369558

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Insufficient Session Expiration
🦉 Authorization Bypass Through User-Controlled Key
🦉 Cross-site Scripting (XSS)
🦉 More lessons are available in Snyk Learn

@CLAassistant
Copy link

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants

0