Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade: react, react-dom, jquery, react-router-dom, react-scripts #487

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

felayo
Copy link
Owner

@felayo felayo commented Sep 19, 2024

snyk-top-banner

Snyk has created this PR to upgrade multiple dependencies.

👯 The following dependencies are linked and will therefore be updated together.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.

Name Versions Released on

react
from 16.8.6 to 16.14.0 | 11 versions ahead of your current version | 4 years ago
on 2020-10-14
react-dom
from 16.8.6 to 16.14.0 | 11 versions ahead of your current version | 4 years ago
on 2020-10-14
jquery
from 3.4.1 to 3.7.1 | 9 versions ahead of your current version | a year ago
on 2023-08-28
react-router-dom
from 5.0.0 to 5.3.4 | 11 versions ahead of your current version | 2 years ago
on 2022-10-02
react-scripts
from 3.0.1 to 3.4.4 | 15 versions ahead of your current version | 4 years ago
on 2020-10-20

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Cross-site Scripting (XSS)
SNYK-JS-SERIALIZEJAVASCRIPT-536840
325 No Known Exploit
high severity Arbitrary Code Injection
SNYK-JS-SERIALIZEJAVASCRIPT-570062
325 Proof of Concept
high severity Cross-site Scripting (XSS)
SNYK-JS-SERIALIZEJAVASCRIPT-6056521
325 No Known Exploit
high severity Prototype Pollution
SNYK-JS-SETVALUE-1540541
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-SETVALUE-450213
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-450202
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-567746
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-608086
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-6139239
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-MERGEDEEP-1070277
325 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-UAPARSERJS-1023599
325 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-UAPARSERJS-610226
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-NODEFORGE-598677
325 Proof of Concept
high severity Improper Input Validation
SNYK-JS-FOLLOWREDIRECTS-6141137
325 Proof of Concept
high severity Remote Code Execution (RCE)
SNYK-JS-HANDLEBARS-1056767
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-HANDLEBARS-469063
325 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JS-HANDLEBARS-480388
325 No Known Exploit
high severity Prototype Pollution
SNYK-JS-INI-1048974
325 Proof of Concept
high severity Server-side Request Forgery (SSRF)
SNYK-JS-IP-6240864
325 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JS-HANDLEBARS-534478
325 Proof of Concept
medium severity Information Exposure
SNYK-JS-NODEFETCH-2342118
325 No Known Exploit
medium severity Denial of Service
SNYK-JS-NODEFETCH-674311
325 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PROMPTS-1729737
325 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-MINIMIST-559764
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-UAPARSERJS-1072471
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-UGLIFYJS-1727251
325 No Known Exploit
medium severity Command Injection
SNYK-JS-NODENOTIFIER-1035794
325 No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JS-NWSAPI-2841516
325 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHPARSE-1077067
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHTOREGEXP-7925106
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHTOREGEXP-7925106
325 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-YARGSPARSER-560381
325 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-YARGSPARSER-560381
325 Proof of Concept
medium severity Cross-site Scripting
SNYK-JS-EXPRESS-7926867
325 No Known Exploit
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-2332181
325 Proof of Concept
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-6444610
325 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-HANDLEBARS-1279029
325 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-MINIMIST-559764
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ISSVG-1085627
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ISSVG-1243891
325 Proof of Concept
medium severity Cross-site Scripting (XSS)
SNYK-JS-JQUERY-565129
325 Mature
low severity Cross-site Scripting
SNYK-JS-SEND-7926862
325 No Known Exploit
low severity Cross-site Scripting
SNYK-JS-SERVESTATIC-7926865
325 No Known Exploit
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
325 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
325 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
325 Proof of Concept
low severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-2396346
325 No Known Exploit
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
325 Proof of Concept
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
325 Proof of Concept
critical severity Prototype Pollution
SNYK-JS-HANDLEBARS-534988
325 No Known Exploit
high severity Cryptographic Issues
SNYK-JS-ELLIPTIC-571484
325 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JS-ESLINTUTILS-460220
325 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ACORN-559469
325 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ACORN-559469
325 No Known Exploit
high severity Prototype Pollution
SNYK-JS-AJV-584908
325 No Known Exploit
high severity Asymmetric Resource Consumption (Amplification)
SNYK-JS-BODYPARSER-7926860
325 No Known Exploit
high severity Improper Verification of Cryptographic Signature
SNYK-JS-BROWSERIFYSIGN-6037026
325 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JS-DECODEURICOMPONENT-3149970
325 Proof of Concept
high severity Remote Memory Exposure
SNYK-JS-DNSPACKET-1293563
325 No Known Exploit
high severity Prototype Pollution
SNYK-JS-JSONSCHEMA-1920922
325 No Known Exploit
high severity Code Injection
SNYK-JS-LODASH-1040724
325 Proof of Concept
high severity Improper Input Validation
SNYK-JS-URLPARSE-2407770
325 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-WEBSOCKETEXTENSIONS-570623
325 Proof of Concept
high severity Denial of Service (DoS)
SNYK-JS-WS-7266574
325 Proof of Concept
high severity Denial of Service (DoS)
SNYK-JS-WS-7266574
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-Y18N-1021887
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-MIXINDEEP-450212
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-SETVALUE-1540541
325 Proof of Concept
high severity Prototype Pollution
SNYK-JS-SETVALUE-450213
325 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-HANDLEBARS-567742
325 Proof of Concept
medium severity Cryptographic Issues
SNYK-JS-ELLIPTIC-1064899
325 No Known Exploit
medium severity Timing Attack
SNYK-JS-ELLIPTIC-511941
325 No Known Exploit
critical severity Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-7577916
325 Proof of Concept
critical severity Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-7577917
325 Proof of Concept
critical severity Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-7577918
325 Proof of Concept
critical severity Incomplete List of Disallowed Inputs
SNYK-JS-BABELTRAVERSE-5962462
325 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SSRI-1246392
325 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TMPL-1583443
325 Proof of Concept
medium severity Cross-site Scripting (XSS)
SNYK-JS-JQUERY-567880
325 Mature
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-COLORSTRING-1082939
325 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-DOTPROP-543489
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-1018905
325 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-HAPIHOEK-548452
325 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-HOSTEDGITINFO-1088355
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-HTMLMINIFIER-3091181
325 Proof of Concept
medium severity Information Exposure
SNYK-JS-EVENTSOURCE-2823375
325 Proof of Concept
medium severity Open Redirect
SNYK-JS-EXPRESS-6474509
325 No Known Exploit
medium severity Authorization Bypass Through User-Controlled Key
SNYK-JS-URLPARSE-2412697
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-WS-1296835
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-WS-1296835
325 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-MINIMIST-559764
325 Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JS-SOCKJS-575261
325 Proof of Concept
medium severity Improper Input Validation
SNYK-JS-URLPARSE-1078283
325 No Known Exploit
medium severity Open Redirect
SNYK-JS-URLPARSE-1533425
325 Proof of Concept
medium severity Access Restriction Bypass
SNYK-JS-URLPARSE-2401205
325 Proof of Concept
medium severity Authorization Bypass
SNYK-JS-URLPARSE-2407759
325 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TERSER-2806366
325 No Known Exploit
low severity Validation Bypass
SNYK-JS-KINDOF-537849
325 Proof of Concept
Release notes
Package name: react from react GitHub release notes
Package name: react-dom from react-dom GitHub release notes
Package name: jquery from jquery GitHub release notes
Package name: react-router-dom
  • 5.3.4 - 2022-10-02
  • 5.3.3 - 2022-05-18
  • 5.3.2 - 2022-05-17
  • 5.3.1 - 2022-04-17
  • 5.3.0 - 2021-09-03
  • 5.2.1 - 2021-08-27
  • 5.2.0 - 2020-05-11
  • 5.1.2 - 2019-09-30
  • 5.1.1 - 2019-09-27
  • 5.1.0 - 2019-09-24
  • 5.0.1 - 2019-06-04
  • 5.0.0 - 2019-03-18
from react-router-dom GitHub release notes
Package name: react-scripts
  • 3.4.4 - 2020-10-20
  • 3.4.3 - 2020-08-12
  • 3.4.2 - 2020-08-11
  • 3.4.1 - 2020-03-21
  • 3.4.0 - 2020-02-14
  • 3.3.1 - 2020-01-31
  • 3.3.0 - 2019-12-05
  • 3.3.0-next.80 - 2019-12-04
  • 3.3.0-next.62 - 2019-11-14
  • 3.3.0-next.39 - 2019-10-24
  • 3.3.0-next.38 - 2019-10-24
  • 3.2.0 - 2019-10-03
  • 3.1.2 - 2019-09-19
  • 3.1.1 - 2019-08-13
  • 3.1.0 - 2019-08-09
  • 3.0.1 - 2019-05-08
from react-scripts GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"react","from":"16.8.6","to":"16.14.0"},{"name":"react-dom","from":"16.8.6","to":"16.14.0"},{"name":"jquery","from":"3.4.1","to":"3.7.1"},{"name":"react-router-dom","from":"5.0.0","to":"5.3.4"},{"name":"react-scripts","from":"3.0.1","to":"3.4.4"}],"env":"prod","hasFixes":true,"isBreakingChange":false,"isMajorUpgrade":false,"issuesToFix":[{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SERIALIZEJAVASCRIPT-536840","issue_id":"SNYK-JS-SERIALIZEJAVASCRIPT-536840","priority_score":405,"priority_score_factors":[{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Cross-site Scripting (XSS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SERIALIZEJAVASCRIPT-570062","issue_id":"SNYK-JS-SERIALIZEJAVASCRIPT-570062","priority_score":492,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.7","score":385},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary Code Injection"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SERIALIZEJAVASCRIPT-6056521","issue_id":"SNYK-JS-SERIALIZEJAVASCRIPT-6056521","priority_score":405,"priority_score_factors":[{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Cross-site Scripting (XSS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SETVALUE-1540541","issue_id":"SNYK-JS-SETVALUE-1540541","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SETVALUE-450213","issue_id":"SNYK-JS-SETVALUE-450213","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-450202","issue_id":"SNYK-JS-LODASH-450202","priority_score":686,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-567746","issue_id":"SNYK-JS-LODASH-567746","priority_score":731,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-608086","issue_id":"SNYK-JS-LODASH-608086","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-6139239","issue_id":"SNYK-JS-LODASH-6139239","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MERGEDEEP-1070277","issue_id":"SNYK-JS-MERGEDEEP-1070277","priority_score":376,"priority_score_factors":[{"type":"exploit","label":"Unproven","score":11},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UAPARSERJS-1023599","issue_id":"SNYK-JS-UAPARSERJS-1023599","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UAPARSERJS-610226","issue_id":"SNYK-JS-UAPARSERJS-610226","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-NODEFORGE-598677","issue_id":"SNYK-JS-NODEFORGE-598677","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-FOLLOWREDIRECTS-6141137","issue_id":"SNYK-JS-FOLLOWREDIRECTS-6141137","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Input Validation"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-HANDLEBARS-1056767","issue_id":"SNYK-JS-HANDLEBARS-1056767","priority_score":457,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7","score":350},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-HANDLEBARS-469063","issue_id":"SNYK-JS-HANDLEBARS-469063","priority_score":365,"priority_score_factors":[{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-HANDLEBARS-480388","issue_id":"SNYK-JS-HANDLEBARS-480388","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-INI-1048974","issue_id":"SNYK-JS-INI-1048974","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-IP-6240864","issue_id":"SNYK-JS-IP-6240864","priority_score":537,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-HANDLEBARS-534478","issue_id":"SNYK-JS-HANDLEBARS-534478","priority_score":512,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary Code Execution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-NODEFETCH-2342118","issue_id":"SNYK-JS-NODEFETCH-2342118","priority_score":325,"priority_score_factors":[{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-NODEFETCH-674311","issue_id":"SNYK-JS-NODEFETCH-674311","priority_score":306,"priority_score_factors":[{"type":"exploit",...

Snyk has created this PR to upgrade:
  - react from 16.8.6 to 16.14.0.
    See this package in npm: https://www.npmjs.com/package/react
  - react-dom from 16.8.6 to 16.14.0.
    See this package in npm: https://www.npmjs.com/package/react-dom
  - jquery from 3.4.1 to 3.7.1.
    See this package in npm: https://www.npmjs.com/package/jquery
  - react-router-dom from 5.0.0 to 5.3.4.
    See this package in npm: https://www.npmjs.com/package/react-router-dom
  - react-scripts from 3.0.1 to 3.4.4.
    See this package in npm: https://www.npmjs.com/package/react-scripts

See this project in Snyk:
https://app.snyk.io/org/felayo/project/8c671fc0-8dc0-4ef1-bd23-8bc398e8d5a2?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants