kafka-webview
kafka-webview copied to clipboard
[Snyk] Fix for 3 vulnerabilities
Snyk has created this PR to fix 3 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
kafka-webview-ui/pom.xml
Vulnerabilities that will be fixed with an upgrade:
| Issue | Score | Upgrade | |
|---|---|---|---|
| Stack-based Buffer Overflow SNYK-JAVA-COMGOOGLEPROTOBUF-8055227 |
649 | com.hubspot.jackson:jackson-datatype-protobuf: 0.9.13 -> 0.9.17 No Known Exploit |
|
| Stack-based Buffer Overflow SNYK-JAVA-COMGOOGLEPROTOBUF-8055228 |
649 | com.hubspot.jackson:jackson-datatype-protobuf: 0.9.13 -> 0.9.17 No Known Exploit |
|
| Denial of Service (DoS) SNYK-JAVA-ORGSPRINGFRAMEWORK-8384234 |
631 | Major version upgrade No Known Exploit |
Vulnerabilities that could not be fixed
- Upgrade:
- Could not upgrade
org.springframework.boot:[email protected]toorg.springframework.boot:[email protected]; Reasoncould not apply upgrade, dependency is managed externally; Location:https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.6.13/spring-boot-dependencies-2.6.13.pom
- Could not upgrade
[!IMPORTANT]
- Check the changes in this PR to ensure they won't cause issues with your project.
- Max score is 1000. Note that the real score may have changed since the PR was raised.
- This PR was automatically created by Snyk using the credentials of a real user.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons: