Skip to content

Comments

[Snyk] Fix for 9 vulnerabilities#23

Open
baby636 wants to merge 1 commit intomasterfrom
snyk-fix-e773f423aa12620b886b321cdeb9aa5f
Open

[Snyk] Fix for 9 vulnerabilities#23
baby636 wants to merge 1 commit intomasterfrom
snyk-fix-e773f423aa12620b886b321cdeb9aa5f

Conversation

@baby636
Copy link
Owner

@baby636 baby636 commented Oct 18, 2024

Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • app/package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 828/1000
Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 8.7
Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-8187303
Yes Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Input Validation
SNYK-JS-URLPARSE-1078283
Yes No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Open Redirect
SNYK-JS-URLPARSE-1533425
Yes Proof of Concept
medium severity 641/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.4
Access Restriction Bypass
SNYK-JS-URLPARSE-2401205
Yes Proof of Concept
medium severity 641/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.4
Authorization Bypass
SNYK-JS-URLPARSE-2407759
Yes Proof of Concept
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Improper Input Validation
SNYK-JS-URLPARSE-2407770
Yes Proof of Concept
medium severity 631/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.2
Authorization Bypass Through User-Controlled Key
SNYK-JS-URLPARSE-2412697
Yes Proof of Concept
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Improper Input Validation
SNYK-JS-URLPARSE-543307
Yes Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Prototype Pollution
SNYK-JS-WEB3UTILS-6229337
Yes Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: ethereumjs-wallet The new version differs by 60 commits.

See the full diff

Package name: web3 The new version differs by 250 commits.
  • 5b5bf87 changelog updates
  • 45d55c3 version update
  • 4358140 Release/4.0.1 rc.2 (#6152)
  • cdc2835 fix canary auth (#6151)
  • 55a4de1 add util polyfill (#6150)
  • 45edf3d Canary releases (#6143)
  • 01ce365 Proposal for rearranging docs (#6141)
  • 86082bc skip '### Breaking Changes' section from unreleasedSection array (#6138)
  • d60c285 Fix plugin example tests with `4.0.1-rc.1` (#6134)
  • 88ac791 Correct and enhance documentation for subscribing to events (#6129)
  • daaaff7 Autotype for contract methods (#6137)
  • ab80131 support ESM builds (#6131)
  • 6202d1e min build whitelisting (#6132)
  • 7a924db migration guide update (#6130)
  • 4f423fc Fix validation of nested tuples (#6125)
  • 408332d fix!: remove non read-only ens methods (#6084)
  • 8c5ea34 Providers Tutorial (#6095)
  • f2abd6a Eth turorial (#6120)
  • 210455a transaction integration tests (#6071)
  • fe959a1 Contract options fix (#6118)
  • bf1311f update docs so web is imported by default (#6112)
  • 3b95b5e fix estimateGas to accept hex data without 0x prefix (#6103)
  • 8c3a17b Add a tutorial for smart contract basic interaction (#6089)
  • edc7a84 `defaultTransactionTypeParser` Refactor (#6102)

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Improper Input Validation
🦉 Open Redirect
🦉 Prototype Pollution

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants