• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

gnosis / dex-js / 1026 / 1
77%
develop: 100%

Build:
Build:
LAST BUILD BRANCH: master
DEFAULT BRANCH: develop
Ran 05 Feb 2021 02:52AM UTC
Files 16
Run time 1s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

05 Feb 2021 02:31AM UTC coverage: 76.909%. Remained the same
1026.1

push

travis-ci

web-flow
[Security] Bump lodash from 4.17.15 to 4.17.20 (#176)

Bumps [lodash](https://github.com/lodash/lodash) from 4.17.15 to 4.17.20. **This update includes security fixes.**
<details>
<summary>Vulnerabilities fixed</summary>
<p><em>Sourced from <a href="https://github.com/nodejs/security-wg/blob/master/vuln/npm/516.json">The Node Security Working Group</a>.</em></p>
<blockquote>
<p><strong>Allocation of Resources Without Limits or Throttling</strong>
Prototype pollution attack (lodash)</p>
<p>Affected versions: &gt;=4.17.15 &lt;4.17.19</p>
</blockquote>
<p><em>Sourced from <a href="https://github.com/advisories/GHSA-p6mc-m468-83gw">The GitHub Security Advisory Database</a>.</em></p>
<blockquote>
<p><strong>Prototype Pollution in lodash</strong>
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays.</p>
<p>This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.</p>
<p>Affected versions: &lt; 4.17.19</p>
</blockquote>
<p><em>Sourced from <a href="https://github.com/advisories/GHSA-p6mc-m468-83gw">The GitHub Security Advisory Database</a>.</em></p>
<blockquote>
<p><strong>Prototype Pollution in lodash</strong>
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays.</p>
<p>This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specif... (continued)

136 of 191 branches covered (71.2%)

Branch coverage included in aggregate %.

297 of 372 relevant lines covered (79.84%)

13.56 hits per line

Source Files on job 1026.1
  • Tree
  • List 0
  • Changed 0
  • Source Changed 0
  • Coverage Changed 0
Coverage ∆ File Lines Relevant Covered Missed Hits/Line Branch Hits Branch Misses
  • Back to Build 818
  • Travis Job 1026.1
  • b6ecdb96 on github
  • Prev Job for on master (#1017.1)
  • Next Job for on master (#1031.1)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc