8000 [Snyk] Fix for 86 vulnerabilities by snyk-bot · Pull Request #51 · ibuystuff/github-admin · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

[Snyk] Fix for 86 vulnerabilities #51

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

snyk-bot
Copy link

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • github-admin/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Arbitrary Code Execution
SNYK-JAVA-CHQOSLOGBACK-30208
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Arbitrary Code Execution
SNYK-JAVA-CHQOSLOGBACK-31407
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1047324
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 624/1000
Why? Has a fix available, CVSS 8.2
XML External Entity (XXE) Injection
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
medium severity 651/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.6
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31519
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31520
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31573
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-32043
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-32044
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-32111
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 919/1000
Why? Mature exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Mature
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 876/1000
Why? Mature exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Mature
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-548451
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-559094
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-560762
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-560766
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561362
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561373
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561585
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561586
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561587
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-564887
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-564888
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-608664
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes Proof of Concept
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72445
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72446
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72447
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72448
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72449
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72450
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72451
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72882
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72883
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72884
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Input Validation
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-1048058
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Directory Traversal
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Timing Attack
SNYK-JAVA-ORGAPACHETOMCATEMBED-30988
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 669/1000
Why? Has a fix available, CVSS 9.1
Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-31420
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-31432
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Insecure Defaults
SNYK-JAVA-ORGAPACHETOMCATEMBED-451505
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451508
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Directory Traversal
SNYK-JAVA-ORGAPACHETOMCATEMBED-451510
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Access Restriction Bypass
SNYK-JAVA-ORGAPACHETOMCATEMBED-451511
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit
high severity 834/1000
Why? Mature exploit, Has a fix available, CVSS 8.1
Arbitrary Code Execution
SNYK-JAVA-ORGAPACHETOMCATEMBED-451515
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No Mature
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Access Restriction Bypass
SNYK-JAVA-ORGAPACHETOMCATEMBED-451519
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-451521
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 676/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.1
Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-451526
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Access Restriction Bypass
SNYK-JAVA-ORGAPACHETOMCATEMBED-451527
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-451529
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451531
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
high severity 564/1000
Why? Has a fix available, CVSS 7
Arbitrary Code Execution
SNYK-JAVA-ORGHIBERNATE-451605
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Input Validation
SNYK-JAVA-ORGHIBERNATE-568162
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
medium severity 550/1000
Why? Has a fix available, CVSS 6.5
Cross-site Scripting (XSS)
SNYK-JAVA-ORGHIBERNATE-569100
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
No No Known Exploit
medium severity 495/1000
Why? Has a fix available, CVSS 5.4
Denial of Service (DoS)
SNYK-JAVA-ORGYAML-537645
de.codecentric:spring-boot-admin-server:
1.3.2 -> 2.0.0
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Vulnerabilities that could not be fixed

  • Upgrade:
    • Could not upgrade org.springframework.boot:spring-boot-starter-web@1.3.5.RELEASE to org.springframework.boot:spring-boot-starter-web@2.3.0.RELEASE; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/1.3.5.RELEASE/spring-boot-dependencies-1.3.5.RELEASE.pom

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-30208
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-31407
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1047324
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052
8FA4
449
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31519
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31520
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31573
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-32043
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-32044
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-32111
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-548451
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-559094
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-560762
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-560766
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561362
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561373
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561585
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561586
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561587
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-564887
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-564888
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-608664
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72445
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72446
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72447
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72448
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72449
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72450
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72451
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72882
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72883
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72884
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-1048058
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-30988
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-31420
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-31432
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451505
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451508
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451510
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451511
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451515
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451519
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451521
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451526
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451527
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451529
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451531
- https://snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-451605
- https://snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-568162
- https://snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-569100
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-537645
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant
0