[Snyk] Upgrade: , web3, chai, , , , ethers, , hardhat, hardhat-gas-reporter #57
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to upgrade multiple dependencies.
👯♂ The following dependencies are linked and will therefore be updated together.ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
@nomiclabs/hardhat-ethers
from 2.0.5 to 2.2.3 | 7 versions ahead of your current version | a year ago
on 2023-04-10
web3
from 1.7.1 to 1.10.4 | 28 versions ahead of your current version | 7 months ago
on 2024-02-05
chai
from 4.3.6 to 4.5.0 | 7 versions ahead of your current version | 2 months ago
on 2024-07-25
@nomiclabs/hardhat-truffle5
from 2.0.5 to 2.0.7 | 3 versions ahead of your current version | 2 years ago
on 2022-09-02
@nomiclabs/hardhat-waffle
from 2.0.3 to 2.0.6 | 3 versions ahead of your current version | a year ago
on 2023-05-16
@openzeppelin/contracts
from 4.5.0 to 4.9.6 | 23 versions ahead of your current version | 6 months ago
on 2024-02-29
ethers
from 5.6.2 to 5.7.2 | 10 versions ahead of your current version | 2 years ago
on 2022-10-19
@openzeppelin/test-helpers
from 0.5.15 to 0.5.16 | 1 version ahead of your current version | 2 years ago
on 2022-09-06
hardhat
from 2.9.3 to 2.22.9 | 77 versions ahead of your current version | 23 days ago
on 2024-08-21
hardhat-gas-reporter
from 1.0.8 to 1.0.10 | 3 versions ahead of your current version | 7 months ago
on 2024-01-31
Issues fixed by the recommended upgrade:
SNYK-JS-DECODEURICOMPONENT-3149970
SNYK-JS-OPENZEPPELINCONTRACTS-2958047
SNYK-JS-OPENZEPPELINCONTRACTS-2958050
SNYK-JS-OPENZEPPELINCONTRACTS-2964946
SNYK-JS-TAR-1579155
SNYK-JS-OPENZEPPELINCONTRACTS-2980279
SNYK-JS-ES5EXT-6095076
SNYK-JS-ES5EXT-6095076
SNYK-JS-UNDICI-3323845
SNYK-JS-MOCHA-2863123
SNYK-JS-FOLLOWREDIRECTS-6141137
SNYK-JS-GETFUNCNAME-5923417
SNYK-JS-MOCHA-2863123
SNYK-JS-NORMALIZEURL-1296539
SNYK-JS-BROWSERIFYSIGN-6037026
SNYK-JS-QS-3153490
SNYK-JS-QS-3153490
SNYK-JS-SIMPLEGET-2361683
SNYK-JS-TAR-1536528
SNYK-JS-TAR-1536531
SNYK-JS-TAR-1579147
SNYK-JS-TAR-1579152
SNYK-JS-JSONSCHEMA-1920922
SNYK-JS-BODYPARSER-7926860
SNYK-JS-BODYPARSER-7926860
SNYK-JS-COOKIEJAR-3149984
SNYK-JS-COOKIEJAR-3149984
SNYK-JS-ELLIPTIC-1064899
SNYK-JS-UNDICI-2928996
SNYK-JS-UNDICI-2953389
SNYK-JS-UNDICI-2980276
SNYK-JS-UNDICI-2980286
SNYK-JS-OPENZEPPELINCONTRACTS-2965798
SNYK-JS-OPENZEPPELINCONTRACTS-5425051
SNYK-JS-OPENZEPPELINCONTRACTS-5838352
SNYK-JS-OPENZEPPELINCONTRACTS-6346765
SNYK-JS-EXPRESS-6474509
SNYK-JS-PATHPARSE-1077067
SNYK-JS-UNDICI-3323844
SNYK-JS-SERIALIZEJAVASCRIPT-6147607
SNYK-JS-MINIMATCH-3050818
SNYK-JS-EXPRESS-7926867
SNYK-JS-EXPRESS-6474509
SNYK-JS-EXPRESS-7926867
SNYK-JS-FOLLOWREDIRECTS-6444610
SNYK-JS-HIGHLIGHTJS-1048676
SNYK-JS-HTTPCACHESEMANTICS-3248783
SNYK-JS-UNDICI-2957529
SNYK-JS-OPENZEPPELINCONTRACTS-5425827
SNYK-JS-OPENZEPPELINCONTRACTS-5672116
SNYK-JS-UNDICI-5962466
SNYK-JS-UNDICI-6252336
SNYK-JS-UNDICI-6564963
SNYK-JS-UNDICI-6564964
SNYK-JS-SEND-7926862
SNYK-JS-MINIMIST-2429795
SNYK-JS-SEND-7926862
SNYK-JS-SERVESTATIC-7926865
SNYK-JS-SERVESTATIC-7926865
SNYK-JS-TAR-1536758
Release notes
Package name: @nomiclabs/hardhat-ethers
Package name: web3
Package name: chai
v4.4.1...v4.5.0
What's Changed
Full Changelog: v4.4.1...v4.5.0
What's Changed
??
for node compat by @ 43081j in #1574Full Changelog: v4.4.0...v4.4.1
What's Changed
Full Changelog: v4.3.10...v4.4.0
Package name: @nomiclabs/hardhat-truffle5
Package name: @nomiclabs/hardhat-waffle
This is the first version of the plugin published in collaboration with the TrueFi team, the maintainers of Waffle 🚀
We moved this plugin to its own repository, cleaned it up in the process, and implemented some small improvements.
Changes
Package name: @openzeppelin/contracts
Base64
: Fix issue where dirty memory located just after the input buffer is affecting the result. (#4929)Multicall
: Make aware of non-canonical context (i.e.msg.sender
is not_msgSender()
), allowing compatibility withERC2771Context
. Patch duplicatedAddress.functionDelegateCall
in v4.9.4 (removed).ERC2771Context
andContext
: Introduce a_contextPrefixLength()
getter, used to trim extra information appended tomsg.data
.Multicall
: Make aware of non-canonical context (i.e.msg.sender
is not_msgSender()
), allowing compatibility withERC2771Context
.ERC2771Context
: Return the forwarder address whenever themsg.data
of a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e.msg.data.length
is less than 20 bytes), as specified by ERC-2771. (#4481)ERC2771Context
: Prevent revert in_msgData()
when a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e.msg.data.length
is less than 20 bytes). Return the full calldata in that case. (#4484)Package name: ethers
Package name: @openzeppelin/test-helpers
snapshot.restore
when used multiple times.Package name: hardhat
This is a small bug fix release remove a warning message against the local Hardhat node when deploying with Hardhat Ignition.
Changes
http_setLedgerOutputEnabled
messages beyond the HTTP Provider to prevent unwanted warnings in the logs of the local hardhat nodeThis is a small bug fix release to resolve a bug with large responses from
debug_traceTransaction
.Changes
debug_traceTransaction
when large responses were generatedPackage name: hardhat-gas-reporter
What's Changed
Full Changelog: v1.0.8...v1.0.9
This pre-release contains a work-around patch to make the gas reporter work with Hardhat's
viem
tooling. It can be installed with:hardhat-viem
plugin inhardhat.config.ts
e.gThere is ongoing work to make this part of the normally published package in #167 but it will not be released until v2.0 (probably end of February at the earliest).
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.
For more information:
[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"","from":"nomiclabs/hardhat-ethers","to":"nomiclabs/hardhat-ethers"},{"name":"web3","from":"1.7.1","to":"1.10.4"},{"name":"chai","from":"4.3.6","to":"4.5.0"},{"name":"","from":"nomiclabs/hardhat-truffle5","to":"nomiclabs/hardhat-truffle5"},{"name":"","from":"nomiclabs/hardhat-waffle","to":"nomiclabs/hardhat-waffle"},{"name":"","from":"openzeppelin/contracts","to":"openzeppelin/contracts"},{"name":"ethers","from":"5.6.2","to":"5.7.2"},{"name":"","from":"openzeppelin/test-helpers","to":"openzeppelin/test-helpers"},{"name":"hardhat","from":"2.9.3","to":"2.22.9"},{"name":"hardhat-gas-reporter","from":"1.0.8","to":"1.0.10"}],"env":"prod","hasFixes":true,"isBreakingChange":false,"isMajorUpgrade":false,"issuesToFix":[{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-DECODEURICOMPONENT-3149970","issue_id":"SNYK-JS-DECODEURICOMPONENT-3149970","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2958047","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2958047","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2958050","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2958050","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2964946","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2964946","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Incorrect Calculation"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579155","issue_id":"SNYK-JS-TAR-1579155","priority_score":425,"priority_score_factors":[{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2980279","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2980279","priority_score":385,"priority_score_factors":[{"type":"cvssScore","label":"7.7","score":385},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Verification of Cryptographic Signature"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ES5EXT-6095076","issue_id":"SNYK-JS-ES5EXT-6095076","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ES5EXT-6095076","issue_id":"SNYK-JS-ES5EXT-6095076","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-3323845","issue_id":"SNYK-JS-UNDICI-3323845","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MOCHA-2863123","issue_id":"SNYK-JS-MOCHA-2863123","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-FOLLOWREDIRECTS-6141137","issue_id":"SNYK-JS-FOLLOWREDIRECTS-6141137","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Input Validation"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-GETFUNCNAME-5923417","issue_id":"SNYK-JS-GETFUNCNAME-5923417","priority_score":537,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MOCHA-2863123","issue_id":"SNYK-JS-MOCHA-2863123","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-NORMALIZEURL-1296539","issue_id":"SNYK-JS-NORMALIZEURL-1296539","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-BROWSERIFYSIGN-6037026","issue_id":"SNYK-JS-BROWSERIFYSIGN-6037026","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Verification of Cryptographic Signature"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-QS-3153490","issue_id":"SNYK-JS-QS-3153490","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Poisoning"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-QS-3153490","issue_id":"SNYK-JS-QS-3153490","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Poisoning"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SIMPLEGET-2361683","issue_id":"SNYK-JS-SIMPLEGET-2361683","priority_score":547,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1536528","issue_id":"SNYK-JS-TAR-1536528","priority_score":410,"priority_score_factors":[{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Overwrite"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1536531","issue_id":"SNYK-JS-TAR-1536531","priority_score":410,"priority_score_factors":[{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Overwrite"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579147","issue_id":"SNYK-JS-TAR-1579147","priority_score":425,"priority_score_factors":[{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579152","issue_id":"SNYK-JS-TAR-1579152","priority_score":425,"priority_score_factors":[{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-JSONSCHEMA-1920922","issue_id":"SNYK-JS-JSONSCHEMA-1920922","priority_score":430,"priority_score_factors":[{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-BODYPARSER-7926860","issue_id":"SNYK-JS-BODYPARSER-7926860","priority_score":481,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Asymmetric Resource Consumption (Amplification)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-BODYPARSER-7926860","issue_id":"SNYK-JS-BODYPARSER-7926860","priority_score":481,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Asymmetric Resource Consumption (Amplification)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-COOKIEJAR-3149984","issue_id":"SNYK-JS-COOKIEJAR-3149984","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-COOKIEJAR-3149984","issue_id":"SNYK-JS-COOKIEJAR-3149984","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-ELLIPTIC-1064899","issue_id":"SNYK-JS-ELLIPTIC-1064899","priority_score":340,"priority_score_factors":[{"type":"cvssScore","label":"6.8","score":340},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cryptographic Issues"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-2928996","issue_id":"SNYK-JS-UNDICI-2928996","priority_score":377,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.4","score":270},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Certificate Validation"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-2953389","issue_id":"SNYK-JS-UNDICI-2953389","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"CRLF Injection"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-2980276","issue_id":"SNYK-JS-UNDICI-2980276","priority_score":270,"priority_score_factors":[{"type":"cvssScore","label":"5.4","score":270},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"CRLF Injection"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-2980286","issue_id":"SNYK-JS-UNDICI-2980286","priority_score":320,"priority_score_factors":[{"type":"cvssScore","label":"6.4","score":320},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-2965798","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-2965798","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-5425051","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-5425051","priority_score":340,"priority_score_factors":[{"type":"cvssScore","label":"6.8","score":340},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Input Validation"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-5838352","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-5838352","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Encoding or Escaping of Output"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-6346765","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-6346765","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Out-of-bounds Read"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-EXPRESS-6474509","issue_id":"SNYK-JS-EXPRESS-6474509","priority_score":305,"priority_score_factors":[{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Open Redirect"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-PATHPARSE-1077067","issue_id":"SNYK-JS-PATHPARSE-1077067","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-3323844","issue_id":"SNYK-JS-UNDICI-3323844","priority_score":337,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"4.6","score":230},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"CRLF Injection"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SERIALIZEJAVASCRIPT-6147607","issue_id":"SNYK-JS-SERIALIZEJAVASCRIPT-6147607","priority_score":412,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Scripting (XSS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MINIMATCH-3050818","issue_id":"SNYK-JS-MINIMATCH-3050818","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-EXPRESS-7926867","issue_id":"SNYK-JS-EXPRESS-7926867","priority_score":326,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"5.1","score":255},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Scripting"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-EXPRESS-6474509","issue_id":"SNYK-JS-EXPRESS-6474509","priority_score":305,"priority_score_factors":[{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Open Redirect"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-EXPRESS-7926867","issue_id":"SNYK-JS-EXPRESS-7926867","priority_score":326,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"5.1","score":255},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Scripting"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-FOLLOWREDIRECTS-6444610","issue_id":"SNYK-JS-FOLLOWREDIRECTS-6444610","priority_score":432,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-HIGHLIGHTJS-1048676","issue_id":"SNYK-JS-HIGHLIGHTJS-1048676","priority_score":265,"priority_score_factors":[{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-HTTPCACHESEMANTICS-3248783","issue_id":"SNYK-JS-HTTPCACHESEMANTICS-3248783","priority_score":372,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-UNDICI-2957529","issue_id":"SNYK-JS-UNDICI-2957529","priority_score":292,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-5425827","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-5425827","priority_score":185,"priority_score_factors":[{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Denial of Service (DoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-OPENZEPPELINCONTRACTS-5672116","issue_id":"SNYK-JS-OPENZEPPELINCONTRACTS-5672116","priority_score":185,"priority_score_factors":[{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Missing Authorization"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-5962466","issue_id":"SNYK-JS-UNDICI-5962466","priority_score":195,"priority_score_factors":[{"type":"cvssScore","label":"3.9","score":195},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-6252336","issue_id":"SNYK-JS-UNDICI-6252336","priority_score":195,"priority_score_factors":[{"type":"cvssScore","label":"3.9","score":195},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Permissive Cross-domain Policy with Untrusted Domains"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-6564963","issue_id":"SNYK-JS-UNDICI-6564963","priority_score":130,"priority_score_factors":[{"type":"cvssScore","label":"2.6","score":130},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Improper Access Control"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-UNDICI-6564964","issue_id":"SNYK-JS-UNDICI-6564964","priority_score":195,"priority_score_factors":[{"type":"cvssScore","label":"3.9","score":195},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Improper Authorization"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SEND-7926862","issue_id":"SNYK-JS-SEND-7926862","priority_score":176,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"2.1","score":105},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Cross-site Scripting"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-MINIMIST-2429795","issue_id":"SNYK-JS-MINIMIST-2429795","priority_score":292,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SEND-7926862","issue_id":"SNYK-JS-SEND-7926862","priority_score":176,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"2.1","score":105},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Cross-site Scripting"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SERVESTATIC-7926865","issue_id":"SNYK-JS-SERVESTATIC-7926865","priority_score":176,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"2.1","score":105},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Cross-site Scripting"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SERVESTATIC-7926865","issue_id":"SNYK-JS-SERVESTATIC-7926865","priority_score":176,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"cvssScore","label":"2.1","score":105},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Cross-site Scripting"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1536758","issue_id":"SNYK-JS-TAR-1536758","priority_score":196,"priority_score_factors":[{"type":"exploit","label":"Unproven","score":11},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Regular Expression Denial of Service (ReDoS)"}],"prId":"997f211d-6883-40b4-934d-df7183128ccd","prPublicId":"997f211d-6883-40b4-934d-df7183128ccd","packageManager":"npm","priorityScoreList":[482,375,375,375,425,385,482,482,375,472,537,375,375,482,547,410,410,425,425,430,481,372,340,377,372,270,320,265,340,265,265,305,372,337,412,265,326,432,265,372,292,185,185,195,195,130,195,176,292,176,196],"projectPublicId":"55e049aa-e546-4941-a805-ef9113babeed","projectUrl":"https://app.snyk.io/org/debuggineffect/project/55e049aa-e546-4941-a805-ef9113babeed?utm_source=github&utm_medium=referral&page=upgrade-pr","prType":"upgrade","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"defau...