Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

[Snyk] Security upgrade System.IdentityModel.Tokens.Jwt from 7.0.2 to 7.1.2 #197

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

kazimanzurrashid
Copy link
Contributor

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `nuget` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • MovementPass.Public.Api.BackgroundJob/MovementPass.Public.Api.BackgroundJob.csproj

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
medium severity 626/1000
Why? Recently disclosed, Has a fix available, CVSS 6.8
Resource Exhaustion
SNYK-DOTNET-MICROSOFTIDENTITYMODELJSONWEBTOKENS-6148656
No No Known Exploit
medium severity 626/1000
Why? Recently disclosed, Has a fix available, CVSS 6.8
Resource Exhaustion
SNYK-DOTNET-SYSTEMIDENTITYMODELTOKENSJWT-6148655
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Resource Exhaustion

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants