Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade zeppelin-solidity from 1.2.0 to 1.8.0 #1

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

AKJUS
Copy link
Owner

@AKJUS AKJUS commented Sep 12, 2024

snyk-top-banner

Snyk has created this PR to upgrade zeppelin-solidity from 1.2.0 to 1.8.0.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 6 versions ahead of your current version.

  • The recommended version was released on 6 years ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Prototype Pollution
SNYK-JS-AJV-584908
619 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ANSIREGEX-1583908
619 Proof of Concept
high severity Prototype Pollution
SNYK-JS-ASYNC-2441827
619 Proof of Concept
critical severity Incomplete List of Disallowed Inputs
SNYK-JS-BABELTRAVERSE-5962463
619 Proof of Concept
critical severity Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-7577917
619 Proof of Concept
critical severity Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-7577918
619 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-HAWK-2808852
619 No Known Exploit
high severity Prototype Pollution
SNYK-JS-LODASH-6139239
619 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-73638
619 Proof of Concept
high severity Code Injection
SNYK-JS-LODASH-1040724
619 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-450202
619 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-567746
619 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-608086
619 Proof of Concept
high severity Prototype Pollution
npm:deep-extend:20180409
619 Proof of Concept
high severity Prototype Pollution
npm:extend:20180424
619 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
npm:sshpk:20180409
619 Proof of Concept
high severity Prototype Poisoning
SNYK-JS-QS-3153490
619 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
619 Proof of Concept
high severity Information Exposure
SNYK-JS-SIMPLEGET-2361683
619 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TRIM-1017038
619 Proof of Concept
high severity Prototype Pollution
SNYK-JS-Y18N-1021887
619 Proof of Concept
high severity Remote Memory Exposure
SNYK-JS-BL-608877
619 Proof of Concept
high severity Use of Weak Hash
SNYK-JS-CRYPTOJS-6028119
619 No Known Exploit
high severity Cryptographic Issues
SNYK-JS-ELLIPTIC-571484
619 Proof of Concept
high severity Prototype Pollution
SNYK-JS-INI-1048974
619 Proof of Concept
high severity Prototype Pollution
SNYK-JS-JSONSCHEMA-1920922
619 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-73639
619 Proof of Concept
medium severity Prototype Pollution
npm:lodash:20180130
619 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-MINIMATCH-3050818
619 No Known Exploit
medium severity Arbitrary File Overwrite
SNYK-JS-TARFS-174556
619 No Known Exploit
medium severity Prototype Pollution
npm:hoek:20180212
619 Proof of Concept
medium severity Uninitialized Memory Exposure
npm:stringstream:20180511
619 Mature
medium severity Prototype Pollution
SNYK-JS-MINIMIST-559764
619 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-MINIMIST-559764
619 Proof of Concept
medium severity Information Exposure
SNYK-JS-NODEFETCH-2342118
619 No Known Exploit
medium severity Denial of Service
SNYK-JS-NODEFETCH-674311
619 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHPARSE-1077067
619 Proof of Concept
medium severity Server-side Request Forgery (SSRF)
SNYK-JS-REQUEST-3361831
619 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-TOUGHCOOKIE-5672873
619 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
npm:tough-cookie:20170905
619 No Known Exploit
medium severity Prototype Pollution
SNYK-JS-YARGSPARSER-560381
619 Proof of Concept
medium severity Time of Check Time of Use (TOCTOU)
npm:chownr:20180731
619 No Known Exploit
medium severity Cryptographic Issues
SNYK-JS-ELLIPTIC-1064899
619 No Known Exploit
medium severity Timing Attack
SNYK-JS-ELLIPTIC-511941
619 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-HOSTEDGITINFO-1088355
619 Proof of Concept
medium severity Missing Release of Resource after Effective Lifetime
SNYK-JS-INFLIGHT-6095116
619 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-JSON5-3182856
619 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-1018905
619 Proof of Concept
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
619 Proof of Concept
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
619 Proof of Concept
low severity Insecure Credential Storage
SNYK-JS-WEB3-174533
619 No Known Exploit
low severity Insecure Credential Storage
SNYK-JS-WEB3-174533
619 No Known Exploit
low severity Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
619 Proof of Concept
critical severity Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-7577916
619 Proof of Concept
critical severity Authentication Bypass
SNYK-JS-HAWK-6969142
619 Proof of Concept
Release notes
Package name: zeppelin-solidity
  • 1.8.0 - 2018-03-26

    This release contains the full implementation of EIP721, following the last details settled in the recently closed EIP. Thanks to all the community for your contributions! 🚀

    Changelog

    v1.7.0...v1.8.0

    • ✨ Final EIP721 implementation (#803)
    • 🔥 Add Transfer event to BurnableToken (#735)
    • 👨‍🏫 ECRecovery recover is now internal (#818)
    • 💅 Documentation and tests enhancements
  • 1.7.0 - 2018-02-20

    This release contains a big refactor of the Crowdsale contract, which allowed us to implement some really cool new crowdsale models. We also have a shiny new documentation site. Thanks to all the community for the awesome contributions! 🚀

    Changelog

    v1.6.0...v1.7.0

    Project updates:

  • 1.6.0 - 2018-01-23

    This time we bring you a new release, which includes the much hyped ERC721 for non-fungible tokens, to create your own digital collectibles and more. 🐈 🌍 🚀 🎉

    During this release cycle the team has been very active improving the development process itself, and we're already seeing great results in the speed with which we respond to new issues and PRs. Take a peek at the status of development at our waffle.io board.

    We'll be waiting for your contributions!

    Changelog

    v1.5.0...v1.6.0

    • 🆕 Added ERC721 non-fungible token implementation (#615) 🐈
    • 🆕 Added ERC827 token implementation provides transfer, transferFrom and approve methods which additionally perform a call to the recipients (#518)
    • 🆕 Added Heritable, an extension of Ownable with a designated heir (#680)
    • Added getTokenAmount for dynamic rate crowdsales (#638)
    • Added the totalSupply function to the ERC20 interface (#666)

    Project changes

    • Enhanced tests and documentation
    • Updated documentation for contributors (#684)
    • Added Issue/PR templates (#641)
    • Added linting configuration and Travis CI step (#673)
  • 1.5.0 - 2017-12-22

    A small release this time to keep the release cycle going! 🚀

    Changelog

    • 🆕 Added RBAC to enable more complex access control patterns. (#580)
    • Several enhancements to project quality. (#581)
    • And a few small changes. 🙂
  • 1.4.0 - 2017-11-23

    Thanks to all members of the community that contributed to this release! 🎉 🚀

    Changelog

    • 🆕 Added TokenVesting which implements vesting of tokens. It replaces the old VestedToken with a more modular approach. (#476)
    • 🆕 Added SplitPayment which implements distributing payments to multiple people proportionally to shares. (#417)
    • 🆕 Added DetailedERC20 which adds to a token state variables with the optional ERC20 metadata. (#477)
    • 🆕 Added CappedToken which is a MintableToken with capped supply. (#515)
    • Made MintableToken's finishMinting executable only once. (#505)
    • Upgraded to Truffle 4.0.1 and Solidity 0.4.18. (#573, #460, #576, #506)
    • Removed deprecated claim() from TokenTimelock. (#469)

    And some additional changes to code style, tests, documentation and continuous integration.

  • 1.3.0 - 2017-09-21

    After a long wait, we're finally releasing version 1.3.0 of OpenZeppelin. This is a big release with a lot of small fixes, exciting new features, and enhancements to the developer experience.

    This release includes commits from 29 contributors! Huge thanks to all of you! 🎉 🎉

    Changelog

    • Removed MultisigWallet in favor of gnosis/MultiSigWallet. (#328)
    • Added a directory with examples. (#333, #342)
    • Migrated the crowdsale contracts to timestamps instead of block numbers. (#350)
    • Removed the call to finishMinting in FinalizableCrowdsale. (#364)
    • Made approve pausable in PausableToken. (#448)
    • Added an OwnershipTransferred event. (#424)
    • Added the BurnableToken contract. (#341)
    • Added the CanReclaimToken contract. (#348)
    • Added the SafeERC20 library for interaction with ERC20 tokens. (#413)
    • Added the MerkleProof library for merkle proof verification. (#260)
    • Fixed some small issues in ERC20 compliance. (#345, #405, #446)
    • Fixed a bug in transferFrom. (#377)
    • Fixed transferOwnership to revert on failure instead of silently failing. (#323)
    • Fixed a bug in TokenTimelock. (#430)
    • Several enhancements to tests and documentation.
    • Parallelized coverage and tests in Travis for faster test results in PRs. (#369)
    • Removed the only production dependency (was actually a dev dependency). Now installing via npm install --only=prod zeppelin-solidity should install zero extra dependencies! (#357)
  • 1.2.0 - 2017-07-18

    Changelog

    • Fix ERC20 interface and implementations to conform to standard.
    • Rename claim to release in TokenTimelock.
    • Bugfixes in VestedToken.
    • Deprecated throw in favor of require(), assert() and revert().
    • Small improvements on crowdsale contracts.
    • Added ECRecovery library.
from zeppelin-solidity GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"zeppelin-solidity","from":"1.2.0","to":"1.8.0"}],"env":"prod","hasFixes":true,"isBreakingChange":false,"isMajorUpgrade":false,"issuesToFix":[{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-AJV-584908","issue_id":"SNYK-JS-AJV-584908","priority_score":619,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ANSIREGEX-1583908","issue_id":"SNYK-JS-ANSIREGEX-1583908","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ASYNC-2441827","issue_id":"SNYK-JS-ASYNC-2441827","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-BABELTRAVERSE-5962463","issue_id":"SNYK-JS-BABELTRAVERSE-5962463","priority_score":786,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.3","score":465},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Incomplete List of Disallowed Inputs"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ELLIPTIC-7577917","issue_id":"SNYK-JS-ELLIPTIC-7577917","priority_score":776,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.1","score":455},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Improper Verification of Cryptographic Signature"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ELLIPTIC-7577918","issue_id":"SNYK-JS-ELLIPTIC-7577918","priority_score":776,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.1","score":455},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Improper Verification of Cryptographic Signature"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-HAWK-2808852","issue_id":"SNYK-JS-HAWK-2808852","priority_score":584,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.4","score":370},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-6139239","issue_id":"SNYK-JS-LODASH-6139239","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-73638","issue_id":"SNYK-JS-LODASH-73638","priority_score":686,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-1040724","issue_id":"SNYK-JS-LODASH-1040724","priority_score":681,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.2","score":360},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Code Injection"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-450202","issue_id":"SNYK-JS-LODASH-450202","priority_score":686,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-567746","issue_id":"SNYK-JS-LODASH-567746","priority_score":731,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-608086","issue_id":"SNYK-JS-LODASH-608086","priority_score":686,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"npm:deep-extend:20180409","issue_id":"npm:deep-extend:20180409","priority_score":686,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"npm:extend:20180424","issue_id":"npm:extend:20180424","priority_score":579,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"npm:sshpk:20180409","issue_id":"npm:sshpk:20180409","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-QS-3153490","issue_id":"SNYK-JS-QS-3153490","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Poisoning"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SEMVER-3247795","issue_id":"SNYK-JS-SEMVER-3247795","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SIMPLEGET-2361683","issue_id":"SNYK-JS-SIMPLEGET-2361683","priority_score":761,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Information Exposure"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-TRIM-1017038","issue_id":"SNYK-JS-TRIM-1017038","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-Y18N-1021887","issue_id":"SNYK-JS-Y18N-1021887","priority_score":686,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-BL-608877","issue_id":"SNYK-JS-BL-608877","priority_score":706,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.7","score":385},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Remote Memory Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-CRYPTOJS-6028119","issue_id":"SNYK-JS-CRYPTOJS-6028119","priority_score":574,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.2","score":360},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Use of Weak Hash"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ELLIPTIC-571484","issue_id":"SNYK-JS-ELLIPTIC-571484","priority_score":706,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.7","score":385},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Cryptographic Issues"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-INI-1048974","issue_id":"SNYK-JS-INI-1048974","priority_score":686,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-JSONSCHEMA-1920922","issue_id":"SNYK-JS-JSONSCHEMA-1920922","priority_score":644,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-73639","issue_id":"SNYK-JS-LODASH-73639","priority_score":541,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"4.4","score":220},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"npm:lodash:20180130","issue_id":"npm:lodash:20180130","priority_score":636,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.3","score":315},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MINIMATCH-3050818","issue_id":"SNYK-JS-MINIMATCH-3050818","priority_score":479,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TARFS-174556","issue_id":"SNYK-JS-TARFS-174556","priority_score":454,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"4.8","score":240},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Arbitrary File Overwrite"},{"exploit_maturity":"proof-of-concept","id":"npm:hoek:20180212","issue_id":"npm:hoek:20180212","priority_score":636,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.3","score":315},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Prototype Pollution"},{"exploit_maturity":"mature","id":"npm:stringstream:20180511","issue_id":"npm:stringstream:20180511","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Functional","score":171},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.2","score":260},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Uninitialized Memory Exposure"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-MINIMIST-559764","issue_id":"SNYK-JS-MINIMIST-559764","priority_score":601,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.6","score":280},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-MINIMIST-559764","issue_id":"SNYK-JS-MINIMIST-559764","priority_score":601,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.6","score":280},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-NODEFETCH-2342118","issue_id":"SNYK-JS-NODEFETCH-2342118","priority_score":539,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-NODEFETCH-674311","issue_id":"SNYK-JS-NODEFETCH-674311","priority_score":520,"priority_score_factors":[{"type":"exploit","label":"Unproven","score":11},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.9","score":295},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-PATHPARSE-1077067","issue_id":"SNYK-JS-PATHPARSE-1077067","priority_score":586,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-REQUEST-3361831","issue_id":"SNYK-JS-REQUEST-3361831","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-TOUGHCOOKIE-5672873","issue_id":"SNYK-JS-TOUGHCOOKIE-5672873","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"npm:tough-cookie:20170905","issue_id":"npm:tough-cookie:20170905","priority_score":509,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.9","score":295},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-YARGSPARSER-560381","issue_id":"SNYK-JS-YARGSPARSER-560381","priority_score":601,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.6","score":280},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"npm:chownr:20180731","issue_id":"npm:chownr:20180731","priority_score":434,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"4.4","score":220},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Time of Check Time of Use (TOCTOU)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-ELLIPTIC-1064899","issue_id":"SNYK-JS-ELLIPTIC-1064899","priority_score":554,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.8","score":340},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cryptographic Issues"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-ELLIPTIC-511941","issue_id":"SNYK-JS-ELLIPTIC-511941","priority_score":509,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.9","score":295},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Timing Attack"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-HOSTEDGITINFO-1088355","issue_id":"SNYK-JS-HOSTEDGITINFO-1088355","priority_score":586,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-IN...

Snyk has created this PR to upgrade zeppelin-solidity from 1.2.0 to 1.8.0.

See this package in npm:
zeppelin-solidity

See this project in Snyk:
https://app.snyk.io/org/akjus/project/dbef3e19-345e-4127-bfa2-dfc479fca357?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants