devrel-examples icon indicating copy to clipboard operation
devrel-examples copied to clipboard

[Snyk] Security upgrade com.asana:asana from 0.9.0 to 0.10.4

Open snyk-bot opened this issue 5 years ago • 0 comments

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • java/events_slack_notifications/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 584/1000
Why? Has a fix available, CVSS 7.4
Improper Authorization
SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276
com.asana:asana:
0.9.0 -> 0.10.4
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Information Exposure
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-30644
com.asana:asana:
0.9.0 -> 0.10.4
No No Known Exploit
medium severity 484/1000
Why? Has a fix available, CVSS 5.4
Man-in-the-Middle (MitM)
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-30646
com.asana:asana:
0.9.0 -> 0.10.4
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Directory Traversal
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
com.asana:asana:
0.9.0 -> 0.10.4
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Man-in-the-Middle (MitM)
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-451097
com.asana:asana:
0.9.0 -> 0.10.4
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic

snyk-bot avatar Oct 14 '20 02:10 snyk-bot