Richkware-Manager-Server
Richkware-Manager-Server copied to clipboard
[Snyk] Fix for 10 vulnerabilities
Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.
Changes included in this PR
- Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
- pom.xml
Vulnerabilities that will be fixed
With an upgrade:
Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity |
---|---|---|---|---|---|
![]() |
791/1000 Why? Mature exploit, Has a fix available, CVSS 8.1 |
Remote Code Execution (RCE) SNYK-JAVA-ORGAPACHETOMCATEMBED-570072 |
No | Mature | |
![]() |
479/1000 Why? Has a fix available, CVSS 5.3 |
Denial of Service (DoS) SNYK-JAVA-ORGAPACHETOMCATEMBED-584427 |
No | No Known Exploit | |
![]() |
584/1000 Why? Has a fix available, CVSS 7.4 |
XML External Entity (XXE) Injection SNYK-JAVA-ORGDOM4J-565810 |
No | No Known Exploit | |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
SQL Injection SNYK-JAVA-ORGHIBERNATE-584563 |
No | No Known Exploit | |
![]() |
479/1000 Why? Has a fix available, CVSS 5.3 |
Improper Input Validation SNYK-JAVA-ORGHIBERNATEVALIDATOR-568163 |
No | No Known Exploit | |
![]() |
539/1000 Why? Has a fix available, CVSS 6.5 |
Cryptographic Weakness SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-570204 |
No | No Known Exploit | |
![]() |
494/1000 Why? Has a fix available, CVSS 5.6 |
Prototype Pollution SNYK-JAVA-ORGWEBJARS-479774 |
org.webjars:bootstrap: 4.0.0 -> 4.5.0 |
No | No Known Exploit |
![]() |
540/1000 Why? Has a fix available, CVSS 6.3 |
Cross-site Scripting (XSS) SNYK-JAVA-ORGWEBJARS-565171 |
org.webjars:bootstrap: 4.0.0 -> 4.5.0 org.webjars:jquery: 3.3.1 -> 3.5.0 |
No | No Known Exploit |
![]() |
550/1000 Why? Has a fix available, CVSS 6.5 |
Cross-site Scripting (XSS) SNYK-JAVA-ORGWEBJARS-567882 |
org.webjars:bootstrap: 4.0.0 -> 4.5.0 org.webjars:jquery: 3.3.1 -> 3.5.0 |
No | No Known Exploit |
![]() |
440/1000 Why? Has a fix available, CVSS 4.3 |
Denial of Service (DoS) SNYK-JAVA-ORGYAML-537645 |
No | No Known Exploit |
(*) Note that the real score may have changed since the PR was raised.
Vulnerabilities that could not be fixed
- Upgrade:
- Could not upgrade
org.springframework.boot:[email protected]
toorg.springframework.boot:[email protected]
; Reasoncould not apply upgrade, dependency is managed externally
; Location:https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.6.RELEASE/spring-boot-dependencies-2.2.6.RELEASE.pom
- Could not upgrade
org.springframework.boot:[email protected]
toorg.springframework.boot:[email protected]
; Reasoncould not apply upgrade, dependency is managed externally
; Location:https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.6.RELEASE/spring-boot-dependencies-2.2.6.RELEASE.pom
- Could not upgrade
org.springframework.boot:[email protected]
toorg.springframework.boot:[email protected]
; Reasoncould not apply upgrade, dependency is managed externally
; Location:https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.6.RELEASE/spring-boot-dependencies-2.2.6.RELEASE.pom
- Could not upgrade
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report