Skip to content

Conversation

@alokkusingh
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244
No No Known Exploit
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424
No Proof of Concept
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426
No Proof of Concept
high severity 649/1000
Why? Has a fix available, CVSS 8.7
Improper Verification of Cryptographic Signature
SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
com.google.apis:google-api-services-sheets:
v4-rev3-1.22.0 -> v4-rev460-1.18.0-rc
Yes No Known Exploit
high severity 584/1000
Why? Has a fix available, CVSS 7.4
Improper Authorization
SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276
com.google.apis:google-api-services-sheets:
v4-rev3-1.22.0 -> v4-rev460-1.18.0-rc
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGYAML-2806360
No No Known Exploit
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016888
No Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016889
No No Known Exploit
medium severity 536/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 4.3
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016891
No Proof of Concept
low severity 471/1000
Why? Recently disclosed, Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3113851
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Vulnerabilities that could not be fixed

  • Upgrade:
    • Could not upgrade org.springframework.boot:spring-boot-starter-batch@2.5.7 to org.springframework.boot:spring-boot-starter-batch@2.6.14; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.5.7/spring-boot-dependencies-2.5.7.pom
    • Could not upgrade org.springframework.boot:spring-boot-starter-web@2.5.7 to org.springframework.boot:spring-boot-starter-web@2.6.14; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.5.7/spring-boot-dependencies-2.5.7.pom

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Denial of Service (DoS)
🦉 Denial of Service (DoS)
🦉 Denial of Service (DoS)
🦉 More lessons are available in Snyk Learn

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

3 participants