Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade: , web3, chai, , , , ethers, , hardhat, hardhat-gas-reporter #57

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

BitcoinOutput
Copy link
Owner

snyk-top-banner

Snyk has created this PR to upgrade multiple dependencies.

👯‍♂ The following dependencies are linked and will therefore be updated together.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.

Name Versions Released on

@nomiclabs/hardhat-ethers
from 2.0.5 to 2.2.3 | 7 versions ahead of your current version | a year ago
on 2023-04-10
web3
from 1.7.1 to 1.10.4 | 28 versions ahead of your current version | 7 months ago
on 2024-02-05
chai
from 4.3.6 to 4.5.0 | 7 versions ahead of your current version | 2 months ago
on 2024-07-25
@nomiclabs/hardhat-truffle5
from 2.0.5 to 2.0.7 | 3 versions ahead of your current version | 2 years ago
on 2022-09-02
@nomiclabs/hardhat-waffle
from 2.0.3 to 2.0.6 | 3 versions ahead of your current version | a year ago
on 2023-05-16
@openzeppelin/contracts
from 4.5.0 to 4.9.6 | 23 versions ahead of your current version | 6 months ago
on 2024-02-29
ethers
from 5.6.2 to 5.7.2 | 10 versions ahead of your current version | 2 years ago
on 2022-10-19
@openzeppelin/test-helpers
from 0.5.15 to 0.5.16 | 1 version ahead of your current version | 2 years ago
on 2022-09-06
hardhat
from 2.9.3 to 2.22.9 | 77 versions ahead of your current version | 23 days ago
on 2024-08-21
hardhat-gas-reporter
from 1.0.8 to 1.0.10 | 3 versions ahead of your current version | 7 months ago
on 2024-01-31

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Denial of Service (DoS)
SNYK-JS-DECODEURICOMPONENT-3149970
372 Proof of Concept
high severity Information Exposure
SNYK-JS-OPENZEPPELINCONTRACTS-2958047
372 No Known Exploit
high severity Information Exposure
SNYK-JS-OPENZEPPELINCONTRACTS-2958050
372 No Known Exploit
high severity Incorrect Calculation
SNYK-JS-OPENZEPPELINCONTRACTS-2964946
372 No Known Exploit
high severity Arbitrary File Write
SNYK-JS-TAR-1579155
372 No Known Exploit
high severity Improper Verification of Cryptographic Signature
SNYK-JS-OPENZEPPELINCONTRACTS-2980279
372 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ES5EXT-6095076
372 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ES5EXT-6095076
372 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-UNDICI-3323845
372 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-MOCHA-2863123
372 No Known Exploit
high severity Improper Input Validation
SNYK-JS-FOLLOWREDIRECTS-6141137
372 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-GETFUNCNAME-5923417
372 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-MOCHA-2863123
372 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-NORMALIZEURL-1296539
372 No Known Exploit
high severity Improper Verification of Cryptographic Signature
SNYK-JS-BROWSERIFYSIGN-6037026
372 No Known Exploit
high severity Prototype Poisoning
SNYK-JS-QS-3153490
372 Proof of Concept
high severity Prototype Poisoning
SNYK-JS-QS-3153490
372 Proof of Concept
high severity Information Exposure
SNYK-JS-SIMPLEGET-2361683
372 Proof of Concept
high severity Arbitrary File Overwrite
SNYK-JS-TAR-1536528
372 No Known Exploit
high severity Arbitrary File Overwrite
SNYK-JS-TAR-1536531
372 No Known Exploit
high severity Arbitrary File Write
SNYK-JS-TAR-1579147
372 No Known Exploit
high severity Arbitrary File Write
SNYK-JS-TAR-1579152
372 No Known Exploit
high severity Prototype Pollution
SNYK-JS-JSONSCHEMA-1920922
372 No Known Exploit
high severity Asymmetric Resource Consumption (Amplification)
SNYK-JS-BODYPARSER-7926860
372 No Known Exploit
high severity Asymmetric Resource Consumption (Amplification)
SNYK-JS-BODYPARSER-7926860
372 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-COOKIEJAR-3149984
372 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-COOKIEJAR-3149984
372 Proof of Concept
medium severity Cryptographic Issues
SNYK-JS-ELLIPTIC-1064899
372 No Known Exploit
medium severity Improper Certificate Validation
SNYK-JS-UNDICI-2928996
372 Proof of Concept
medium severity CRLF Injection
SNYK-JS-UNDICI-2953389
372 Proof of Concept
medium severity CRLF Injection
SNYK-JS-UNDICI-2980276
372 No Known Exploit
medium severity Server-side Request Forgery (SSRF)
SNYK-JS-UNDICI-2980286
372 No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JS-OPENZEPPELINCONTRACTS-2965798
372 No Known Exploit
medium severity Improper Input Validation
SNYK-JS-OPENZEPPELINCONTRACTS-5425051
372 No Known Exploit
medium severity Improper Encoding or Escaping of Output
SNYK-JS-OPENZEPPELINCONTRACTS-5838352
372 No Known Exploit
medium severity Out-of-bounds Read
SNYK-JS-OPENZEPPELINCONTRACTS-6346765
372 No Known Exploit
medium severity Open Redirect
SNYK-JS-EXPRESS-6474509
372 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHPARSE-1077067
372 Proof of Concept
medium severity CRLF Injection
SNYK-JS-UNDICI-3323844
372 Proof of Concept
medium severity Cross-site Scripting (XSS)
SNYK-JS-SERIALIZEJAVASCRIPT-6147607
372 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-MINIMATCH-3050818
372 No Known Exploit
medium severity Cross-site Scripting
SNYK-JS-EXPRESS-7926867
372 No Known Exploit
medium severity Open Redirect
SNYK-JS-EXPRESS-6474509
372 No Known Exploit
medium severity Cross-site Scripting
SNYK-JS-EXPRESS-7926867
372 No Known Exploit
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-6444610
372 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-HIGHLIGHTJS-1048676
372 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-HTTPCACHESEMANTICS-3248783
372 Proof of Concept
low severity Information Exposure
SNYK-JS-UNDICI-2957529
372 Proof of Concept
low severity Denial of Service (DoS)
SNYK-JS-OPENZEPPELINCONTRACTS-5425827
372 No Known Exploit
low severity Missing Authorization
SNYK-JS-OPENZEPPELINCONTRACTS-5672116
372 No Known Exploit
low severity Information Exposure
SNYK-JS-UNDICI-5962466
372 No Known Exploit
low severity Permissive Cross-domain Policy with Untrusted Domains
SNYK-JS-UNDICI-6252336
372 No Known Exploit
low severity Improper Access Control
SNYK-JS-UNDICI-6564963
372 No Known Exploit
low severity Improper Authorization
SNYK-JS-UNDICI-6564964
372 No Known Exploit
low severity Cross-site Scripting
SNYK-JS-SEND-7926862
372 No Known Exploit
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
372 Proof of Concept
low severity Cross-site Scripting
SNYK-JS-SEND-7926862
372 No Known Exploit
low severity Cross-site Scripting
SNYK-JS-SERVESTATIC-7926865
372 No Known Exploit
low severity Cross-site Scripting
SNYK-JS-SERVESTATIC-7926865
372 No Known Exploit
low severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TAR-1536758
372 No Known Exploit
Release notes
Package name: @nomiclabs/hardhat-ethers
  • 2.2.3 - 2023-04-10
  • 2.2.2 - 2023-01-11
  • 2.2.1 - 2022-10-27
  • 2.2.0 - 2022-10-10
  • 2.1.1 - 2022-08-16
  • 2.1.0 - 2022-07-07
  • 2.0.6 - 2022-05-11
  • 2.0.5 - 2022-02-10
from @nomiclabs/hardhat-ethers GitHub release notes
Package name: web3
  • 1.10.4 - 2024-02-05
  • 1.10.4-dev.0 - 2024-01-31
  • 1.10.3 - 2023-10-18
  • 1.10.3-dev.0 - 2023-10-16
  • 1.10.2 - 2023-08-28
  • 1.10.1 - 2023-08-14
  • 1.10.1-rc.0 - 2023-08-08
  • 1.10.0 - 2023-05-10
  • 1.10.0-rc.0 - 2023-05-02
  • 1.9.0 - 2023-03-20
  • 1.9.0-rc.0 - 2023-03-07
  • 1.8.2 - 2023-01-30
  • 1.8.2-rc.0 - 2023-01-11
  • 1.8.1 - 2022-11-10
  • 1.8.1-rc.0 - 2022-10-28
  • 1.8.0 - 2022-09-14
  • 1.8.0-rc.0 - 2022-09-08
  • 1.7.5 - 2022-08-01
  • 1.7.5-rc.1 - 2022-07-19
  • 1.7.5-rc.0 - 2022-07-15
  • 1.7.4 - 2022-06-21
  • 1.7.4-rc.2 - 2022-06-16
  • 1.7.4-rc.1 - 2022-06-08
  • 1.7.4-rc.0 - 2022-05-17
  • 1.7.3 - 2022-04-08
  • 1.7.3-rc.0 - 2022-04-07
  • 1.7.2 - 2022-04-07
  • 1.7.2-rc.0 - 2022-03-24
  • 1.7.1 - 2022-03-03
from web3 GitHub release notes
Package name: chai from chai GitHub release notes
Package name: @nomiclabs/hardhat-truffle5
  • 2.0.7 - 2022-09-02
  • 2.0.7-rc.0 - 2022-08-31
  • 2.0.6 - 2022-05-11
  • 2.0.5 - 2022-03-01
from @nomiclabs/hardhat-truffle5 GitHub release notes
Package name: @nomiclabs/hardhat-waffle
  • 2.0.6 - 2023-05-16
  • 2.0.5 - 2023-02-10

    This is the first version of the plugin published in collaboration with the TrueFi team, the maintainers of Waffle 🚀

    We moved this plugin to its own repository, cleaned it up in the process, and implemented some small improvements.

    Changes

    • c5b5c29: Introduce skipEstimateGas and injectCallHistory fields to hardhat config
  • 2.0.4 - 2023-02-09
  • 2.0.3 - 2022-03-01
from @nomiclabs/hardhat-waffle GitHub release notes
Package name: @openzeppelin/contracts
  • 4.9.6 - 2024-02-29
    • Base64: Fix issue where dirty memory located just after the input buffer is affecting the result. (#4929)
  • 4.9.5 - 2023-12-08
    • Multicall: Make aware of non-canonical context (i.e. msg.sender is not _msgSender()), allowing compatibility with ERC2771Context. Patch duplicated Address.functionDelegateCall in v4.9.4 (removed).
  • 4.9.4 - 2023-12-07
    • ERC2771Context and Context: Introduce a _contextPrefixLength() getter, used to trim extra information appended to msg.data.
    • Multicall: Make aware of non-canonical context (i.e. msg.sender is not _msgSender()), allowing compatibility with ERC2771Context.
  • 4.9.3 - 2023-07-28

    Note
    This release contains a fix for GHSA-g4vp-m682-qqmp.

    • ERC2771Context: Return the forwarder address whenever the msg.data of a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e. msg.data.length is less than 20 bytes), as specified by ERC-2771. (#4481)
    • ERC2771Context: Prevent revert in _msgData() when a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e. msg.data.length is less than 20 bytes). Return the full calldata in that case. (#4484)
  • 4.9.2 - 2023-06-16
  • 4.9.1 - 2023-06-07
  • 4.9.0 - 2023-05-23
  • 4.9.0-rc.1 - 2023-05-17
  • 4.9.0-rc.0 - 2023-05-09
  • 4.8.3 - 2023-04-13
  • 4.8.2 - 2023-03-02
  • 4.8.1 - 2023-01-13
  • 4.8.0 - 2022-11-08
  • 4.8.0-rc.2 - 2022-10-17
  • 4.8.0-rc.1 - 2022-09-23
  • 4.8.0-rc.0 - 2022-09-07
  • 4.7.3 - 2022-08-10
  • 4.7.2 - 2022-07-27
  • 4.7.1 - 2022-07-20
  • 4.7.0 - 2022-06-29
  • 4.7.0-rc.0 - 2022-06-07
  • 4.6.0 - 2022-04-26
  • 4.6.0-rc.0 - 2022-03-31
  • 4.5.0 - 2022-02-09
from @openzeppelin/contracts GitHub release notes
Package name: ethers
  • 5.7.2 - 2022-10-19
  • 5.7.1 - 2022-09-14
  • 5.7.0 - 2022-08-19
  • 5.6.9 - 2022-06-18
  • 5.6.8 - 2022-05-24
  • 5.6.7 - 2022-05-21
  • 5.6.6 - 2022-05-14
  • 5.6.5 - 2022-05-03
  • 5.6.4 - 2022-04-14
  • 5.6.3 - 2022-04-13
  • 5.6.2 - 2022-03-26
from ethers GitHub release notes
Package name: @openzeppelin/test-helpers
  • 0.5.16 - 2022-09-06
    • Fix warning under Hardhat 2.11.
  • 0.5.15 - 2021-10-05
    • Fix snapshot.restore when used multiple times.
from @openzeppelin/test-helpers GitHub release notes
Package name: hardhat
  • 2.22.9 - 2024-08-21

    This is a small bug fix release remove a warning message against the local Hardhat node when deploying with Hardhat Ignition.

    Changes

    • 6771f00: Do not send http_setLedgerOutputEnabled messages beyond the HTTP Provider to prevent unwanted warnings in the logs of the local hardhat node

    💡 The Nomic Foundation is hiring! Check our open positions.


  • 2.22.8 - 2024-08-07

    This is a small bug fix release to resolve a bug with large responses from debug_traceTransaction.

    Changes

    • f5d5d15: Fixed an issue with debug_traceTransaction when large responses were generated
    • 31d9d77: Upgraded EDR to v0.5.2

    💡 The Nomic Foundation is hiring! Check our open positions.


  • 2.22.7 - 2024-07-30
  • 2.22.6 - 2024-07-01
  • 2.22.5 - 2024-06-03
  • 2.22.4 - 2024-05-14
  • 2.22.3 - 2024-04-17
  • 2.22.2 - 2024-03-21
  • 2.22.1 - 2024-03-14
  • 2.22.0 - 2024-03-13
  • 2.21.0 - 2024-03-04
  • 2.21.0-dev.1 - 2024-03-02
  • 2.21.0-dev.0 - 2024-02-21
  • 2.20.1 - 2024-02-15
  • 2.20.0 - 2024-02-14
  • 2.19.5 - 2024-01-30
  • 2.19.4 - 2023-12-26
  • 2.19.3 - 2023-12-19
  • 2.19.2 - 2023-12-05
  • 2.19.1 - 2023-11-15
  • 2.19.0 - 2023-11-02
  • 2.18.3 - 2023-10-24
  • 2.18.2 - 2023-10-19
  • 2.18.1 - 2023-10-11
  • 2.18.0 - 2023-10-05
  • 2.17.4 - 2023-09-27
  • 2.17.3 - 2023-09-11
  • 2.17.2 - 2023-08-28
  • 2.17.1 - 2023-08-01
  • 2.17.0 - 2023-07-14
  • 2.16.1 - 2023-06-27
  • 2.16.1-dev.0 - 2023-06-27
  • 2.16.0 - 2023-06-22
  • 2.16.0-dev.0 - 2023-06-21
  • 2.15.0 - 2023-06-08
  • 2.14.1 - 2023-05-31
  • 2.14.0 - 2023-04-15
  • 2.13.1 - 2023-04-10
  • 2.13.0 - 2023-03-02
  • 2.13.0-dev.4 - 2023-03-02
  • 2.13.0-dev.3 - 2023-02-27
  • 2.13.0-dev.2 - 2022-12-30
  • 2.13.0-dev.1 - 2022-11-24
  • 2.13.0-dev.0 - 2022-10-21
  • 2.12.8-viair.0 - 2023-02-14
  • 2.12.7 - 2023-02-09
  • 2.12.6 - 2023-01-11
  • 2.12.5 - 2022-12-29
  • 2.12.4 - 2022-12-08
  • 2.12.3 - 2022-11-30
  • 2.12.2 - 2022-11-01
  • 2.12.1 - 2022-10-27
  • 2.12.1-unknown-txs.0 - 2022-10-24
  • 2.12.1-ir.0 - 2022-10-12
  • 2.12.0 - 2022-10-10
  • 2.12.0-esm.1 - 2022-09-27
  • 2.12.0-esm.0 - 2022-09-23
  • 2.11.3-dev.0 - 2022-09-16
  • 2.11.2 - 2022-09-14
  • 2.11.1 - 2022-09-06
  • 2.11.0 - 2022-09-02
  • 2.11.0-rc.1 - 2022-09-02
  • 2.11.0-rc.0 - 2022-08-31
  • 2.11.0-dev.0 - 2022-08-23
  • 2.10.2 - 2022-08-16
  • 2.10.2-dev.0 - 2022-07-20
  • 2.10.1 - 2022-07-13
  • 2.10.0 - 2022-07-07
  • 2.9.9 - 2022-06-08
  • 2.9.8 - 2022-06-08
  • 2.9.8-dev.0 - 2022-06-03
  • 2.9.7 - 2022-05-30
  • 2.9.6 - 2022-05-19
  • 2.9.6-dev.1 - 2022-05-18
  • 2.9.6-dev.0 - 2022-05-18
  • 2.9.5 - 2022-05-12
  • 2.9.4 - 2022-05-11
  • 2.9.3 - 2022-04-05
from hardhat GitHub release notes
Package name: hardhat-gas-reporter
  • 1.0.10 - 2024-01-31
  • 1.0.9 - 2022-09-05

    What's Changed

    Full Changelog: v1.0.8...v1.0.9

  • 1.0.9-viem.0 - 2024-01-31

    This pre-release contains a work-around patch to make the gas reporter work with Hardhat's viem tooling. It can be installed with:

    npm install --save-dev hardhat-gas-reporter@viem
    

    ⚠️ Important: for the plugin to work correctly, it must be listed before the hardhat-viem plugin in hardhat.config.ts e.g

    import "hardhat-gas-reporter" // <--- first
    import "@ nomicfoundation/hardhat-toolbox-viem"

    There is ongoing work to make this part of the normally published package in #167 but it will not be released until v2.0 (probably end of February at the earliest).

  • 1.0.8 - 2022-02-15
from hardhat-gas-reporter GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"","from":"nomiclabs/hardhat-ethers","to":"nomiclabs/hardhat-ethers"},{"name":"web3","from":"1.7.1","to":"1.10.4"},{"name":"chai","from":"4.3.6","to":"4.5.0"},{"name":"","from":"nomiclabs/hardhat-truffle5","to":"nomiclabs/hardhat-truffle5"},{"name":"","from":"nomiclabs/hardhat-waffle","to":"nomiclabs/hardhat-waffle"},{"name":"","from":"openzeppelin/contracts","to":"openzeppelin/contracts"},{"name":"ethers","from":"5.6.2","to":"5.7.2"},{"name":"","from":"openzeppelin/test-helpers","to":"openzeppelin/test-helpers"},{"name":"hardhat","from":"2.9.3","to":"2.22.9"},{"name":"hardhat-gas-reporter","from":"1.0.8","to":"1.0.10"}],"env":"prod","hasFixes":true,"isBreakingChange":false,"isMajorUpgrade":false,"issuesToFix":[{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-DECODEURICOMPONENT-3149970","issue_id":"SNYK-JS-DECODEURICOMPONENT-3149970","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2958047","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2958047","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2958050","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2958050","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2964946","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2964946","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Incorrect Calculation"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579155","issue_id":"SNYK-JS-TAR-1579155","priority_score":425,"priority_score_factors":[{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2980279","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2980279","priority_score":385,"priority_score_factors":[{"type":"cvssScore","label":"7.7","score":385},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Verification of Cryptographic Signature"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ES5EXT-6095076","issue_id":"SNYK-JS-ES5EXT-6095076","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ES5EXT-6095076","issue_id":"SNYK-JS-ES5EXT-6095076","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-3323845","issue_id":"SNYK-JS-UNDICI-3323845","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MOCHA-2863123","issue_id":"SNYK-JS-MOCHA-2863123","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-FOLLOWREDIRECTS-6141137","issue_id":"SNYK-JS-FOLLOWREDIRECTS-6141137","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Input Validation"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-GETFUNCNAME-5923417","issue_id":"SNYK-JS-GETFUNCNAME-5923417","priority_score":537,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MOCHA-2863123","issue_id":"SNYK-JS-MOCHA-2863123","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-NORMALIZEURL-1296539","issue_id":"SNYK-JS-NORMALIZEURL-1296539","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-BROWSERIFYSIGN-6037026","issue_id":"SNYK-JS-BROWSERIFYSIGN-6037026","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Verification of Cryptographic Signature"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-QS-3153490","issue_id":"SNYK-JS-QS-3153490","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Poisoning"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-QS-3153490","issue_id":"SNYK-JS-QS-3153490","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Poisoning"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SIMPLEGET-2361683","issue_id":"SNYK-JS-SIMPLEGET-2361683","priority_score":547,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1536528","issue_id":"SNYK-JS-TAR-1536528","priority_score":410,"priority_score_factors":[{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Overwrite"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1536531","issue_id":"SNYK-JS-TAR-1536531","priority_score":410,"priority_score_factors":[{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Overwrite"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579147","issue_id":"SNYK-JS-TAR-1579147","priority_score":425,"priority_score_factors":[{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579152","issue_id":"SNYK-JS-TAR-1579152","priority_score":425,"priority_score_factors":[{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-JSONSCHEMA-1920922","issue_id":"SNYK-JS-JSONSCHEMA-1920922","priority_score":430,"priority_score_factors":[{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-BODYPARSER-7926860","issue_id":"SNYK-JS-BODYPARSER-7926860","priority_score":481,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Asymmetric Resource Consumption (Amplification)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-BODYPARSER-7926860","issue_id":"SNYK-JS-BODYPARSER-7926860","priority_score":481,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Asymmetric Resource Consumption (Amplification)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-COOKIEJAR-3149984","issue_id":"SNYK-JS-COOKIEJAR-3149984","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-COOKIEJAR-3149984","issue_id":"SNYK-JS-COOKIEJAR-3149984","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-ELLIPTIC-1064899","issue_id":"SNYK-JS-ELLIPTIC-1064899","priority_score":340,"priority_score_factors":[{"type":"cvssScore","label":"6.8","score":340},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cryptographic Issues"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-2928996","issue_id":"SNYK-JS-UNDICI-2928996","priority_score":377,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.4","score":270},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Certificate Validation"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-2953389","issue_id":"SNYK-JS-UNDICI-2953389","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"CRLF Injection"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-2980276","issue_id":"SNYK-JS-UNDICI-2980276","priority_score":270,"priority_score_factors":[{"type":"cvssScore","label":"5.4","score":270},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"CRLF Injection"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-2980286","issue_id":"SNYK-JS-UNDICI-2980286","priority_score":320,"priority_score_factors":[{"type":"cvssScore","label":"6.4","score":320},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2965798","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2965798","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-5425051","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-5425051","priority_score":340,"priority_score_factors":[{"type":"cvssScore","label":"6.8","score":340},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Input Validation"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-5838352","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-5838352","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Encoding or Escaping of Output"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-6346765","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-6346765","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Out-of-bounds Read"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-EXPRESS-6474509","issue_id":"SNYK-JS-EXPRESS-6474509","priority_score":305,"priority_score_factors":[{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Open Redirect"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-PATHPARSE-1077067","issue_id":"SNYK-JS-PATHPARSE-1077067","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-3323844","issue_id":"SNYK-JS-UNDICI-3323844","priority_score":337,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"4.6","score":230},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"CRLF Injection"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SERIALIZEJAVASCRIPT-6147607","issue_id":"SNYK-JS-SERIALIZEJAVASCRIPT-6147607","priority_score":412,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Scripting (XSS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MINIMATCH-3050818","issue_id":"SNYK-JS-MINIMATCH-3050818","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-EXPRESS-7926867","issue_id":"SNYK-JS-EXPRESS-7926867","priority_score":326,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"5.1","score":255},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Scripting"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-EXPRESS-6474509","issue_id":"SNYK-JS-EXPRESS-6474509","priority_score":305,"priority_score_factors":[{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Open Redirect"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-EXPRESS-7926867","issue_id":"SNYK-JS-EXPRESS-7926867","priority_score":326,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"5.1","score":255},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Scripting"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-FOLLOWREDIRECTS-6444610","issue_id":"SNYK-JS-FOLLOWREDIRECTS-6444610","priority_score":432,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-HIGHLIGHTJS-1048676","issue_id":"SNYK-JS-HIGHLIGHTJS-1048676","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-HTTPCACHESEMANTICS-3248783","issue_id":"SNYK-JS-HTTPCACHESEMANTICS-3248783","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-2957529","issue_id":"SNYK-JS-UNDICI-2957529","priority_score":292,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-5425827","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-5425827","priority_score":185,"priority_score_factors":[{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Denial of Service (DoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-5672116","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-5672116","priority_score":185,"priority_score_factors":[{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Missing Authorization"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-5962466","issue_id":"SNYK-JS-UNDICI-5962466","priority_score":195,"priority_score_factors":[{"type":"cvssScore","label":"3.9","score":195},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-6252336","issue_id":"SNYK-JS-UNDICI-6252336","priority_score":195,"priority_score_factors":[{"type":"cvssScore","label":"3.9","score":195},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Permissive Cross-domain Policy with Untrusted Domains"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-6564963","issue_id":"SNYK-JS-UNDICI-6564963","priority_score":130,"priority_score_factors":[{"type":"cvssScore","label":"2.6","score":130},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Improper Access Control"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-6564964","issue_id":"SNYK-JS-UNDICI-6564964","priority_score":195,"priority_score_factors":[{"type":"cvssScore","label":"3.9","score":195},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Improper Authorization"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SEND-7926862","issue_id":"SNYK-JS-SEND-7926862","priority_score":176,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"2.1","score":105},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Cross-site Scripting"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-MINIMIST-2429795","issue_id":"SNYK-JS-MINIMIST-2429795","priority_score":292,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SEND-7926862","issue_id":"SNYK-JS-SEND-7926862","priority_score":176,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"2.1","score":105},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Cross-site Scripting"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SERVESTATIC-7926865","issue_id":"SNYK-JS-SERVESTATIC-7926865","priority_score":176,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"2.1","score":105},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Cross-site Scripting"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SERVESTATIC-7926865","issue_id":"SNYK-JS-SERVESTATIC-7926865","priority_score":176,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"2.1","score":105},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Cross-site Scripting"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1536758","issue_id":"SNYK-JS-TAR-1536758","priority_score":196,"priority_score_factors":[{"type":"exploit","label":"Unproven","score":11},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Regular Expression Denial of Service (ReDoS)"}],"prId":"997f211d-6883-40b4-934d-df7183128ccd","prPublicId":"997f211d-6883-40b4-934d-df7183128ccd","packageManager":"npm","priorityScoreList":[482,375,375,375,425,385,482,482,375,472,537,375,375,482,547,410,410,425,425,430,481,372,340,377,372,270,320,265,340,265,265,305,372,337,412,265,326,432,265,372,292,185,185,195,195,130,195,176,292,176,196],"projectPublicId":"55e049aa-e546-4941-a805-ef9113babeed","projectUrl":"https://app.snyk.io/org/debuggineffect/project/55e049aa-e546-4941-a805-ef9113babeed?utm_source=github&utm_medium=referral&page=upgrade-pr","prType":"upgrade","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"defau...

Snyk has created this PR to upgrade:
  - @nomiclabs/hardhat-ethers from 2.0.5 to 2.2.3.
    See this package in npm: https://www.npmjs.com/package/@nomiclabs/hardhat-ethers
  - web3 from 1.7.1 to 1.10.4.
    See this package in npm: https://www.npmjs.com/package/web3
  - chai from 4.3.6 to 4.5.0.
    See this package in npm: https://www.npmjs.com/package/chai
  - @nomiclabs/hardhat-truffle5 from 2.0.5 to 2.0.7.
    See this package in npm: https://www.npmjs.com/package/@nomiclabs/hardhat-truffle5
  - @nomiclabs/hardhat-waffle from 2.0.3 to 2.0.6.
    See this package in npm: https://www.npmjs.com/package/@nomiclabs/hardhat-waffle
  - @openzeppelin/contracts from 4.5.0 to 4.9.6.
    See this package in npm: https://www.npmjs.com/package/@openzeppelin/contracts
  - ethers from 5.6.2 to 5.7.2.
    See this package in npm: https://www.npmjs.com/package/ethers
  - @openzeppelin/test-helpers from 0.5.15 to 0.5.16.
    See this package in npm: https://www.npmjs.com/package/@openzeppelin/test-helpers
  - hardhat from 2.9.3 to 2.22.9.
    See this package in npm: https://www.npmjs.com/package/hardhat
  - hardhat-gas-reporter from 1.0.8 to 1.0.10.
    See this package in npm: https://www.npmjs.com/package/hardhat-gas-reporter

See this project in Snyk:
https://app.snyk.io/org/debuggineffect/project/55e049aa-e546-4941-a805-ef9113babeed?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants