[Snyk-dev] Fix for 20 vulnerabilities #19
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.
Changes included in this PR
Vulnerabilities that will be fixed
With an upgrade:
Why? Mature exploit, Has a fix available, CVSS 7.3
SNYK-JAVA-COMMONSBEANUTILS-30077
commons-beanutils:commons-beanutils:
1.9.0 -> 1.9.3
Why? Has a fix available, CVSS 3.7
SNYK-JAVA-COMMONSCODEC-561518
commons-codec:commons-codec:
1.6 -> 1.13
Why? Proof of Concept exploit, Has a fix available, CVSS 5.6
SNYK-JAVA-COMMONSCOLLECTIONS-472711
commons-beanutils:commons-beanutils:
1.9.0 -> 1.9.3
commons-collections:commons-collections:
1.0 -> 3.2.2
Why? Has a fix available, CVSS 4.4
SNYK-JAVA-COMMONSFILEUPLOAD-30079
commons-fileupload:commons-fileupload:
1.2.1 -> 1.3.3
Why? Has a fix available, CVSS 7.3
SNYK-JAVA-COMMONSFILEUPLOAD-30080
commons-fileupload:commons-fileupload:
1.2.1 -> 1.3.3
Why? Mature exploit, Has a fix available, CVSS 7.3
SNYK-JAVA-COMMONSFILEUPLOAD-30081
commons-fileupload:commons-fileupload:
1.2.1 -> 1.3.3
Why? Has a fix available, CVSS 9.8
SNYK-JAVA-COMMONSFILEUPLOAD-30401
commons-fileupload:commons-fileupload:
1.2.1 -> 1.3.3
Why? Has a fix available, CVSS 6.5
SNYK-JAVA-COMMONSFILEUPLOAD-31540
commons-fileupload:commons-fileupload:
1.2.1 -> 1.3.3
Why? Mature exploit, Has a fix available, CVSS 5.3
SNYK-JAVA-COMMONSIO-1277109
commons-io:commons-io:
2.0 -> 2.7
Why? Has a fix available, CVSS 5.3
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-1048058
org.apache.httpcomponents:httpclient:
4.3.5 -> 4.5.13
Why? Has a fix available, CVSS 4.3
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-30647
org.apache.httpcomponents:httpclient:
4.3.5 -> 4.5.13
Why? Has a fix available, CVSS 5.3
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
org.apache.httpcomponents:httpclient:
4.3.5 -> 4.5.13
Why? Has a fix available, CVSS 5.5
SNYK-JAVA-ORGAPACHEPOI-31387
org.apache.poi:poi:
3.6 -> 3.17
Why? Has a fix available, CVSS 7.5
SNYK-JAVA-ORGAPACHEPOI-32049
org.apache.poi:poi:
3.6 -> 3.17
Why? Has a fix available, CVSS 4.3
SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
org.springframework:spring-context:
4.2.5.RELEASE -> 5.2.22.RELEASE
Why? Has a fix available, CVSS 4.3
SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
org.springframework:spring-context:
4.2.5.RELEASE -> 5.2.22.RELEASE
Why? Has a fix available, CVSS 5.3
SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
org.springframework:spring-context:
4.2.5.RELEASE -> 5.2.22.RELEASE
Why? Mature exploit, Has a fix available, CVSS 9.8
SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
org.springframework:spring-context:
4.2.5.RELEASE -> 5.2.22.RELEASE
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634
org.springframework:spring-context:
4.2.5.RELEASE -> 5.2.22.RELEASE
Why? Has a fix available, CVSS 5.3
SNYK-JAVA-ORGSPRINGFRAMEWORK-2823313
org.springframework:spring-context:
4.2.5.RELEASE -> 5.2.22.RELEASE
(*) Note that the real score may have changed since the PR was raised.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
🛠 Adjust project settings
📚 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Deserialization of Untrusted Data
🦉 Arbitrary Code Execution
🦉 Directory Traversal
🦉 More lessons are available in Snyk Learn