searchcode-server icon indicating copy to clipboard operation
searchcode-server copied to clipboard

[Snyk] Fix for 4 vulnerabilities

Open boyter opened this issue 2 years ago • 0 comments

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
critical severity 704/1000
Why? Has a fix available, CVSS 9.8
XML External Entity (XXE) Injection
SNYK-JAVA-C3P0-461017
org.quartz-scheduler:quartz:
2.2.2 -> 2.3.0
No No Known Exploit
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-C3P0-461018
org.quartz-scheduler:quartz:
2.2.2 -> 2.3.0
No Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Information Exposure
SNYK-JAVA-COMMONSCODEC-561518
org.eclipse.jgit:org.eclipse.jgit:
4.5.0.201609210915-r -> 5.1.0.201809111528-r
No No Known Exploit
low severity 409/1000
Why? Has a fix available, CVSS 3.9
XML External Entity (XXE) Injection
SNYK-JAVA-ORGECLIPSEJETTY-5769685
com.sparkjava:spark-core:
2.7.2 -> 2.9.4
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 XML External Entity (XXE) Injection

boyter avatar Oct 02 '23 14:10 boyter