Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 25 vulnerabilities #478

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

zjffdu
Copy link
Owner

@zjffdu zjffdu commented Jan 31, 2025

snyk-top-banner

Snyk has created this PR to fix 25 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
high severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHECOMMONS-3043138
  726   Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JAVA-IONETTY-8367012
  661   Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JAVA-IOATOMIX-2321404
  646   Proof of Concept
medium severity Improper Validation of Syntactic Correctness of Input
SNYK-JAVA-ORGECLIPSEJETTY-8186141
  636   org.eclipse.jetty.websocket:javax-websocket-server-impl:
9.4.31.v20200723 -> 9.4.57.v20241219
org.eclipse.jetty:jetty-webapp:
9.4.31.v20200723 -> 9.4.57.v20241219
Proof of Concept
medium severity Improper Validation of Syntactic Correctness of Input
SNYK-JAVA-ORGECLIPSEJETTY-8186158
  636   org.eclipse.jetty:jetty-webapp:
9.4.31.v20200723 -> 9.4.57.v20241219
Proof of Concept
high severity Uncontrolled Memory Allocation
SNYK-JAVA-IONETTY-564897
  624   No Known Exploit
medium severity Improper Access Control
SNYK-JAVA-IOATOMIX-2321417
  596   Proof of Concept
high severity Access Restriction Bypass
SNYK-JAVA-IOATOMIX-2321422
  589   No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584063
  589   No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584064
  589   No Known Exploit
high severity Out-of-Bounds Write
SNYK-JAVA-ORGAPACHECOMMONS-6475528
  589   No Known Exploit
high severity Out-of-Bounds Write
SNYK-JAVA-ORGAPACHECOMMONS-6475534
  589   No Known Exploit
medium severity Access Restriction Bypass
SNYK-JAVA-IOATOMIX-2321419
  551   Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JAVA-IONETTY-5725787
  539   No Known Exploit
medium severity Information Disclosure
SNYK-JAVA-IONETTY-1082234
  524   No Known Exploit
medium severity Information Disclosure
SNYK-JAVA-IONETTY-1082235
  524   No Known Exploit
medium severity Information Disclosure
SNYK-JAVA-IONETTY-1082236
  524   No Known Exploit
medium severity Information Disclosure
SNYK-JAVA-IONETTY-1082238
  524   No Known Exploit
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLEGUAVA-32236
  509   No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-IOATOMIX-2321421
  499   No Known Exploit
low severity Information Exposure
SNYK-JAVA-IOATOMIX-2321416
  496   Proof of Concept
medium severity Information Exposure
SNYK-JAVA-IONETTY-2812456
  489   No Known Exploit
low severity Information Disclosure
SNYK-JAVA-COMGOOGLEGUAVA-1015415
  486   Proof of Concept
low severity Denial of Service (DoS)
SNYK-JAVA-IOATOMIX-2321418
  389   No Known Exploit
low severity Creation of Temporary File in Directory with Insecure Permissions
SNYK-JAVA-COMGOOGLEGUAVA-5710356
  379   No Known Exploit

Vulnerabilities that could not be fixed

  • Upgrade:
    • Could not upgrade org.apache.zeppelin:[email protected] to org.apache.zeppelin:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: provenance does not contain location

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Creation of Temporary File in Directory with Insecure Permissions
🦉 Denial of Service (DoS)
🦉 Improper Access Control
🦉 More lessons are available in Snyk Learn

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants