Skip to content

[Snyk] Fix for 12 vulnerabilities#41

Open
afjimene wants to merge 1 commit intomasterfrom
snyk-fix-f381471c5c7bca17bce01cd1a9954fc8
Open

[Snyk] Fix for 12 vulnerabilities#41
afjimene wants to merge 1 commit intomasterfrom
snyk-fix-f381471c5c7bca17bce01cd1a9954fc8

Conversation

@afjimene
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
medium severity 454/1000
Why? Has a fix available, CVSS 4.8
Insufficient Hostname Verification
SNYK-JAVA-CHQOSLOGBACK-1726923
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No No Known Exploit
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736
org.apache.camel:camel-jackson:
2.24.0 -> 2.24.2
No Proof of Concept
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Output Neutralization for Logs
SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Input Validation
SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No No Known Exploit
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Improper Handling of Case Sensitivity
SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No Proof of Concept
high severity 604/1000
Why? Has a fix available, CVSS 7.8
Insecure Temporary File
SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-2438287
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGYAML-2806360
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No No Known Exploit
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016888
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016889
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No No Known Exploit
medium severity 536/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 4.3
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016891
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3113851
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No No Known Exploit
medium severity 591/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.4
Denial of Service (DoS)
SNYK-JAVA-ORGYAML-537645
org.apache.camel:camel-spring-boot-starter:
2.24.0 -> 2.25.4
No Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Insufficient Hostname Verification
🦉 Deserialization of Untrusted Data
🦉 Insecure Temporary File
🦉 More lessons are available in Snyk Learn

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants