Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

[Snyk] Fix for 6 vulnerabilities #58

Open
wants to merge 1 commit into
base: develop
Choose a base branch
from

Conversation

tfr42
Copy link
Member

@tfr42 tfr42 commented Jun 28, 2023

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Output Neutralization for Logs
SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
org.springframework:spring-context:
3.2.3.RELEASE -> 5.2.24.RELEASE
Yes No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Input Validation
SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
org.springframework:spring-context:
3.2.3.RELEASE -> 5.2.24.RELEASE
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
org.springframework.security:spring-security-core:
5.3.10.RELEASE -> 5.6.11
org.springframework.security:spring-security-web:
5.3.10.RELEASE -> 5.6.11
org.springframework:spring-context:
3.2.3.RELEASE -> 5.2.24.RELEASE
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Directory Traversal
SNYK-JAVA-ORGSPRINGFRAMEWORK-31325
org.springframework:spring-context:
3.2.3.RELEASE -> 5.2.24.RELEASE
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Allocation of Resources Without Limits or Throttling
SNYK-JAVA-ORGSPRINGFRAMEWORK-3369749
org.springframework.security:spring-security-core:
5.3.10.RELEASE -> 5.6.11
org.springframework.security:spring-security-web:
5.3.10.RELEASE -> 5.6.11
org.springframework:spring-context:
3.2.3.RELEASE -> 5.2.24.RELEASE
Yes No Known Exploit
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Allocation of Resources Without Limits or Throttling
SNYK-JAVA-ORGSPRINGFRAMEWORK-5422217
org.springframework.security:spring-security-core:
5.3.10.RELEASE -> 5.6.11
org.springframework.security:spring-security-web:
5.3.10.RELEASE -> 5.6.11
org.springframework:spring-context:
3.2.3.RELEASE -> 5.2.24.RELEASE
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Directory Traversal
🦉 Denial of Service (DoS)
🦉 Allocation of Resources Without Limits or Throttling

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants