mirror of
https://github.com/axllent/mailpit.git
synced 2024-12-26 22:56:43 +02:00
a078c318e8
This closes a security hole whereby a bad actor with SMTP access can bypass the CSP headers with a series of specially crafted HTML messages. A special thanks to @bmodotdev for responsibly disclosing the vulnerability and proving information and an initial fix.
38 lines
1.0 KiB
JSON
38 lines
1.0 KiB
JSON
{
|
|
"name": "mailpit",
|
|
"version": "0.0.0",
|
|
"private": true,
|
|
"scripts": {
|
|
"build": "MINIFY=true node esbuild.config.mjs",
|
|
"watch": "WATCH=true node esbuild.config.mjs",
|
|
"package": "MINIFY=true node esbuild.config.mjs",
|
|
"update-caniemail": "wget -O utils/html-check/caniemail-data.json https://www.caniemail.com/api/data.json"
|
|
},
|
|
"dependencies": {
|
|
"axios": "^1.2.1",
|
|
"bootstrap": "^5.2.0",
|
|
"bootstrap-icons": "^1.9.1",
|
|
"bootstrap5-tags": "^1.6.1",
|
|
"color-hash": "^2.0.2",
|
|
"dayjs": "^1.11.10",
|
|
"dompurify": "^3.1.6",
|
|
"ical.js": "^2.0.1",
|
|
"modern-screenshot": "^4.4.30",
|
|
"prismjs": "^1.29.0",
|
|
"rapidoc": "^9.3.4",
|
|
"timezones-list": "^3.0.3",
|
|
"vue": "^3.2.13",
|
|
"vue-css-donut-chart": "^2.0.0",
|
|
"vue-router": "^4.2.4"
|
|
},
|
|
"devDependencies": {
|
|
"@popperjs/core": "^2.11.5",
|
|
"@types/bootstrap": "^5.2.7",
|
|
"@types/tinycon": "^0.6.3",
|
|
"@vue/compiler-sfc": "^3.2.37",
|
|
"esbuild": "^0.23.0",
|
|
"esbuild-plugin-vue-next": "^0.1.4",
|
|
"esbuild-sass-plugin": "^3.0.0"
|
|
}
|
|
}
|