Richkware-Manager-Server
Richkware-Manager-Server copied to clipboard
[Snyk] Fix for 8 vulnerabilities
Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.
Changes included in this PR
- Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
- pom.xml
Vulnerabilities that will be fixed
With an upgrade:
Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity |
---|---|---|---|---|---|
![]() |
454/1000 Why? Has a fix available, CVSS 4.8 |
Insufficient Hostname Verification SNYK-JAVA-CHQOSLOGBACK-1726923 |
No | No Known Exploit | |
![]() |
624/1000 Why? Has a fix available, CVSS 8.2 |
XML External Entity (XXE) Injection SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302 |
No | No Known Exploit | |
![]() |
581/1000 Why? Recently disclosed, Has a fix available, CVSS 5.9 |
Denial of Service (DoS) SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698 |
No | No Known Exploit | |
![]() |
429/1000 Why? Has a fix available, CVSS 4.3 |
Improper Output Neutralization for Logs SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097 |
No | No Known Exploit | |
![]() |
501/1000 Why? Recently disclosed, Has a fix available, CVSS 4.3 |
Improper Input Validation SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878 |
No | No Known Exploit | |
![]() |
601/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 5.6 |
Prototype Pollution SNYK-JAVA-ORGWEBJARS-479774 |
org.webjars:bootstrap: 4.0.0 -> 4.5.0 org.webjars:jquery: 3.3.1 -> 3.5.0 |
No | Proof of Concept |
![]() |
636/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 6.3 |
Cross-site Scripting (XSS) SNYK-JAVA-ORGWEBJARS-565171 |
org.webjars:bootstrap: 4.0.0 -> 4.5.0 org.webjars:jquery: 3.3.1 -> 3.5.0 |
No | Proof of Concept |
![]() |
646/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 6.5 |
Cross-site Scripting (XSS) SNYK-JAVA-ORGWEBJARS-567882 |
org.webjars:bootstrap: 4.0.0 -> 4.5.0 org.webjars:jquery: 3.3.1 -> 3.5.0 |
No | Proof of Concept |
(*) Note that the real score may have changed since the PR was raised.
Vulnerabilities that could not be fixed
- Upgrade:
- Could not upgrade
com.fasterxml.jackson.core:[email protected]
tocom.fasterxml.jackson.core:[email protected]
; Reasoncould not apply upgrade, dependency is managed externally
; Location:https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-starter-json/2.2.6.RELEASE/spring-boot-starter-json-2.2.6.RELEASE.pom
- Could not upgrade
org.springframework.boot:[email protected]
toorg.springframework.boot:[email protected]
; Reasoncould not apply upgrade, dependency is managed externally
; Location:https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.6.RELEASE/spring-boot-dependencies-2.2.6.RELEASE.pom
- Could not upgrade
org.springframework.boot:[email protected]
toorg.springframework.boot:[email protected]
; Reasoncould not apply upgrade, dependency is managed externally
; Location:https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.6.RELEASE/spring-boot-dependencies-2.2.6.RELEASE.pom
- Could not upgrade
org.springframework.boot:[email protected]
toorg.springframework.boot:[email protected]
; Reasoncould not apply upgrade, dependency is managed externally
; Location:https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.6.RELEASE/spring-boot-dependencies-2.2.6.RELEASE.pom
- Could not upgrade
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
Kudos, SonarCloud Quality Gate passed!
0 Bugs
0 Vulnerabilities
0 Security Hotspots
0 Code Smells
No Coverage information
0.0% Duplication