forms-angular 0.12.0-beta.316 → 0.12.0-beta.317
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +95 -27
package/package.json
CHANGED
|
@@ -6,7 +6,7 @@
|
|
|
6
6
|
},
|
|
7
7
|
"description": "A form builder that sits on top of Angular.js, Twitter Bootstrap, jQuery UI, Angular-UI, Express and Mongoose. Opinionated or what?",
|
|
8
8
|
"homepage": "http://forms-angular.org",
|
|
9
|
-
"version": "0.12.0-beta.
|
|
9
|
+
"version": "0.12.0-beta.317",
|
|
10
10
|
"engines": {
|
|
11
11
|
"node": ">=8.x",
|
|
12
12
|
"npm": ">=5.x"
|
|
@@ -45,16 +45,84 @@
|
|
|
45
45
|
"RESTful API"
|
|
46
46
|
],
|
|
47
47
|
"dependencies": {
|
|
48
|
-
"angular":"^1.8.3",
|
|
49
|
-
"angular-elastic":"^2.5.1",
|
|
50
|
-
"angular-messages":"^1.8.3",
|
|
51
|
-
"angular-sanitize":"^1.8.3",
|
|
48
|
+
"angular": "^1.8.3",
|
|
49
|
+
"angular-elastic": "^2.5.1",
|
|
50
|
+
"angular-messages": "^1.8.3",
|
|
51
|
+
"angular-sanitize": "^1.8.3",
|
|
52
52
|
"angular-ui-bootstrap": "1.3.2 || 2.5.6",
|
|
53
|
-
"angular-ui-grid":"^4.12.7",
|
|
54
|
-
"async":"^3.2.5",
|
|
53
|
+
"angular-ui-grid": "^4.12.7",
|
|
54
|
+
"async": "^3.2.5",
|
|
55
55
|
"lodash": "^4.17.21",
|
|
56
|
-
"ng-infinite-scroll":"^1.3.0",
|
|
57
|
-
"node.extend":"^2.0.3"
|
|
56
|
+
"ng-infinite-scroll": "^1.3.0",
|
|
57
|
+
"node.extend": "^2.0.3"
|
|
58
|
+
},
|
|
59
|
+
"npmAuditMitigations": {
|
|
60
|
+
"angular": [
|
|
61
|
+
{
|
|
62
|
+
"https://github.com/advisories/GHSA-m2h2-264f-f486": {
|
|
63
|
+
"description": "angular vulnerable to regular expression denial of service (ReDoS)",
|
|
64
|
+
"mitigation": "Can't see an exploit in Plait. Can port fix from https://github.com/continu/angular.js/commit/77b7b0c3f02ebed1c7565dc4a63abc6d96065afa"
|
|
65
|
+
}
|
|
66
|
+
},
|
|
67
|
+
{
|
|
68
|
+
"https://github.com/advisories/GHSA-prc3-vjfx-vhm9": {
|
|
69
|
+
"description": "Angular (deprecated package) Cross-site Scripting",
|
|
70
|
+
"mitigation": "Only applies to IE which is obsolete"
|
|
71
|
+
}
|
|
72
|
+
},
|
|
73
|
+
{
|
|
74
|
+
"https://github.com/advisories/GHSA-j58c-ww9w-pwp5": {
|
|
75
|
+
"description": "AngularJS improperly sanitizes SVG elements",
|
|
76
|
+
"mitigation": "See angular-sanitize https://github.com/advisories/GHSA-4p4w-6hg8-63wx"
|
|
77
|
+
}
|
|
78
|
+
},
|
|
79
|
+
{
|
|
80
|
+
"https://github.com/advisories/GHSA-4w4v-5hc9-xrr2": {
|
|
81
|
+
"description": "angular vulnerable to super-linear runtime due to backtracking",
|
|
82
|
+
"mitigation": "We do not make any use of ng-srcset",
|
|
83
|
+
"nextReview": "2026-01-01T00:00:00Z",
|
|
84
|
+
"reviewBy": "Search plait and forms-angular looking for srcset"
|
|
85
|
+
}
|
|
86
|
+
},
|
|
87
|
+
{
|
|
88
|
+
"https://github.com/advisories/GHSA-m9gf-397r-hwpg": {
|
|
89
|
+
"description": "AngularJS allows attackers to bypass common image source restrictions",
|
|
90
|
+
"mitigation": "Duplicate of https://github.com/advisories/GHSA-4w4v-5hc9-xrr2"
|
|
91
|
+
}
|
|
92
|
+
},
|
|
93
|
+
{
|
|
94
|
+
"https://github.com/advisories/GHSA-mqm9-c95h-x2p6": {
|
|
95
|
+
"description": "AngularJS allows attackers to bypass common image source restrictions",
|
|
96
|
+
"mitigation": "Another duplicate of https://github.com/advisories/GHSA-4w4v-5hc9-xrr2"
|
|
97
|
+
}
|
|
98
|
+
},
|
|
99
|
+
{
|
|
100
|
+
"https://github.com/advisories/GHSA-2vrf-hf26-jrp5": {
|
|
101
|
+
"description": "angular vulnerable to regular expression denial of service via the angular.copy() utility",
|
|
102
|
+
"mitigation": "Should not be a problem as we restrict access behind a login."
|
|
103
|
+
}
|
|
104
|
+
},
|
|
105
|
+
{
|
|
106
|
+
"https://github.com/advisories/GHSA-2qqx-w9hr-q5gx": {
|
|
107
|
+
"description": "angular vulnerable to regular expression denial of service via the $resource service",
|
|
108
|
+
"mitigation": "Should not be a problem as we restrict access behind a login."
|
|
109
|
+
}
|
|
110
|
+
},
|
|
111
|
+
{
|
|
112
|
+
"https://github.com/advisories/GHSA-qwqh-hm9m-p5hr": {
|
|
113
|
+
"description": "angular vulnerable to regular expression denial of service via the <input type='url'> element",
|
|
114
|
+
"mitigation": "Should not be a problem as we restrict access behind a login."
|
|
115
|
+
}
|
|
116
|
+
}
|
|
117
|
+
],
|
|
118
|
+
"angular-sanitize": [
|
|
119
|
+
{
|
|
120
|
+
"https://github.com/advisories/GHSA-4p4w-6hg8-63wx": {
|
|
121
|
+
"description": "Lack of sanitization for SVG images",
|
|
122
|
+
"mitigation": "Danger of a bad actor introducing large SVG through sigs or similar, but as we son't sanitize any image types (as it would limit use of the system) this is no additional problem for us"
|
|
123
|
+
}
|
|
124
|
+
}
|
|
125
|
+
]
|
|
58
126
|
},
|
|
59
127
|
"peerDependencies": {
|
|
60
128
|
"express": "^4",
|
|
@@ -66,36 +134,36 @@
|
|
|
66
134
|
"@types/mocha": "^10.0.7",
|
|
67
135
|
"@types/node": "=20.0.0",
|
|
68
136
|
"@types/vinyl": "^2.0.12",
|
|
69
|
-
"angular-mocks":"^1.8.3",
|
|
70
|
-
"body-parser":"^1.20.2",
|
|
137
|
+
"angular-mocks": "^1.8.3",
|
|
138
|
+
"body-parser": "^1.20.2",
|
|
71
139
|
"bower": "^1.8.14",
|
|
72
140
|
"del": "=6.1.1",
|
|
73
|
-
"express":"^4.19.2",
|
|
141
|
+
"express": "^4.19.2",
|
|
74
142
|
"gulp": "^4.0.2",
|
|
75
|
-
"gulp-angular-templatecache":"^3.0.1",
|
|
76
|
-
"gulp-clean-css":"^4.3.0",
|
|
77
|
-
"gulp-concat":"^2.6.1",
|
|
78
|
-
"gulp-less":"^5.0.0",
|
|
143
|
+
"gulp-angular-templatecache": "^3.0.1",
|
|
144
|
+
"gulp-clean-css": "^4.3.0",
|
|
145
|
+
"gulp-concat": "^2.6.1",
|
|
146
|
+
"gulp-less": "^5.0.0",
|
|
79
147
|
"gulp-mocha": "=9.0.0",
|
|
80
|
-
"gulp-ng-annotate":"^2.1.0",
|
|
81
|
-
"gulp-rename":"^2.0.0",
|
|
148
|
+
"gulp-ng-annotate": "^2.1.0",
|
|
149
|
+
"gulp-rename": "^2.0.0",
|
|
82
150
|
"gulp-replace": "^1.1.4",
|
|
83
151
|
"gulp-typescript": "6.0.0-alpha.1",
|
|
84
|
-
"gulp-uglify":"^3.0.2",
|
|
85
|
-
"gulp-umd":"^2.0.0",
|
|
86
|
-
"jasmine-core":"^5.1.2",
|
|
152
|
+
"gulp-uglify": "^3.0.2",
|
|
153
|
+
"gulp-umd": "^2.0.0",
|
|
154
|
+
"jasmine-core": "^5.1.2",
|
|
87
155
|
"karma": "^6.4.3",
|
|
88
156
|
"karma-chrome-launcher": "^3.2.0",
|
|
89
157
|
"karma-firefox-launcher": "^2.1.3",
|
|
90
|
-
"karma-jasmine":"^5.1.0",
|
|
91
|
-
"karma-junit-reporter":"^2.0.1",
|
|
92
|
-
"karma-ng-html2js-preprocessor":"^1.0.0",
|
|
93
|
-
"matchdep":"^2.0.0",
|
|
158
|
+
"karma-jasmine": "^5.1.0",
|
|
159
|
+
"karma-junit-reporter": "^2.0.1",
|
|
160
|
+
"karma-ng-html2js-preprocessor": "^1.0.0",
|
|
161
|
+
"matchdep": "^2.0.0",
|
|
94
162
|
"mocha": "^10.4.0",
|
|
95
163
|
"mongodb": "=5.9.1",
|
|
96
164
|
"mongoose": "=7.6.8",
|
|
97
|
-
"prettier":"^3.3.2",
|
|
98
|
-
"pump":"^3.0.0",
|
|
165
|
+
"prettier": "^3.3.2",
|
|
166
|
+
"pump": "^3.0.0",
|
|
99
167
|
"typescript": "=4.9.5"
|
|
100
168
|
},
|
|
101
169
|
"overrides": {
|