Skip to content

Commit 414885c

Browse files
authored
Merge pull request #1485 from forcedotcom/dev-3
RELEASE @W-15819273@: Conducting v3.25.0 release.
2 parents f270643 + e131f5b commit 414885c

File tree

3 files changed

+50
-6
lines changed

3 files changed

+50
-6
lines changed

messages/common.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ We're continually improving Salesforce Code Analyzer. Tell us what you think! Gi
1212

1313
# upgradeTo4xRecommendation
1414

15-
To use the most up-to-date Code Analyzer features including PMD 7.x, install Code Analyzer v4.x (Beta). To install v4.x (beta), run this command: sf plugins install @salesforce/sfdx-scanner@latest-beta
15+
To use the most up-to-date Code Analyzer features including PMD 7.x, install Code Analyzer v4.x (Beta) by running this command: "sf plugins install @salesforce/sfdx-scanner@latest-beta". You are currently using Code Analyzer v3, which we plan to stop supporting soon.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "@salesforce/sfdx-scanner",
33
"description": "Static code scanner that applies quality and security rules to Apex code, and provides feedback.",
4-
"version": "3.24.0",
4+
"version": "3.25.0",
55
"author": "ISV SWAT",
66
"bugs": "https://github.com/forcedotcom/sfdx-scanner/issues",
77
"dependencies": {

retire-js/RetireJsVulns.json

Lines changed: 48 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1193,8 +1193,7 @@
11931193
"summary": "The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs",
11941194
"githubID": "GHSA-27gm-ghr9-4v95",
11951195
"CVE": [
1196-
"CVE-2020-17480",
1197-
"CVE-2020-23066"
1196+
"CVE-2020-17480"
11981197
]
11991198
},
12001199
"info": [
@@ -1264,8 +1263,7 @@
12641263
"summary": "The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs",
12651264
"githubID": "GHSA-27gm-ghr9-4v95",
12661265
"CVE": [
1267-
"CVE-2020-17480",
1268-
"CVE-2020-23066"
1266+
"CVE-2020-17480"
12691267
]
12701268
},
12711269
"info": [
@@ -6333,6 +6331,52 @@
63336331
"info": [
63346332
"https://github.com/advisories/GHSA-c59h-r6p8-q9wc"
63356333
]
6334+
},
6335+
{
6336+
"atOrAbove": "13.4.0",
6337+
"below": "13.5.1",
6338+
"cwe": [
6339+
"CWE-444"
6340+
],
6341+
"severity": "high",
6342+
"identifiers": {
6343+
"summary": "Next.js Vulnerable to HTTP Request Smuggling",
6344+
"CVE": [
6345+
"CVE-2024-34350"
6346+
],
6347+
"githubID": "GHSA-77r5-gw3j-2mpf"
6348+
},
6349+
"info": [
6350+
"https://github.com/advisories/GHSA-77r5-gw3j-2mpf",
6351+
"https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf",
6352+
"https://nvd.nist.gov/vuln/detail/CVE-2024-34350",
6353+
"https://github.com/vercel/next.js/commit/44eba020c615f0d9efe431f84ada67b81576f3f5",
6354+
"https://github.com/vercel/next.js",
6355+
"https://github.com/vercel/next.js/compare/v13.5.0...v13.5.1"
6356+
]
6357+
},
6358+
{
6359+
"atOrAbove": "13.4.0",
6360+
"below": "14.1.1",
6361+
"cwe": [
6362+
"CWE-918"
6363+
],
6364+
"severity": "high",
6365+
"identifiers": {
6366+
"summary": "Next.js Server-Side Request Forgery in Server Actions",
6367+
"CVE": [
6368+
"CVE-2024-34351"
6369+
],
6370+
"githubID": "GHSA-fr5h-rqp8-mj6g"
6371+
},
6372+
"info": [
6373+
"https://github.com/advisories/GHSA-fr5h-rqp8-mj6g",
6374+
"https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g",
6375+
"https://nvd.nist.gov/vuln/detail/CVE-2024-34351",
6376+
"https://github.com/vercel/next.js/pull/62561",
6377+
"https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085",
6378+
"https://github.com/vercel/next.js"
6379+
]
63366380
}
63376381
],
63386382
"extractors": {

0 commit comments

Comments
 (0)