Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-10734078 - https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-15907551 - https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-10500754 - https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16198880 - https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-7569538 - https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16201011 - https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16191649 - https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-15062482 - https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16191022 - https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16200231
|
This release includes several dependency upgrades, with the most significant being the update to the Jackson libraries. The overall risk is assessed as medium due to potential behavioral changes in Jackson that require verification. Top 3 Most Impactful Upgrades:
Other Upgrades:The remaining upgrades are patch versions and are considered low risk, containing bug fixes and minor improvements:
Recommendation: Developers should review their use of Jackson annotations and
|
|



Snyk has created this PR to fix 10 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
pom.xmlVulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-ORGAPACHECOMMONS-10734078
5.4.0->5.5.0No Known ExploitSNYK-JAVA-COMFASTERXMLJACKSONCORE-15907551
No Known ExploitSNYK-JAVA-COMFASTERXMLJACKSONCORE-10500754
No Known ExploitSNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16198880
3.5.0->3.5.14No Known ExploitSNYK-JAVA-COMFASTERXMLJACKSONCORE-7569538
No Known ExploitSNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16201011
3.5.0->3.5.14No Known ExploitSNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16191649
3.5.0->3.5.14No Known ExploitSNYK-JAVA-CHQOSLOGBACK-15062482
1.5.19->1.5.25ch.qos.logback:logback-classic:
1.5.18->1.5.25No Known ExploitSNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16191022
3.5.0->3.5.14No Known ExploitSNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-16200231
3.5.0->3.5.14No Known ExploitBreaking Change Risk
Vulnerabilities that could not be fixed
org.eclipse.rdf4j:rdf4j-repository-sail@5.1.3toorg.eclipse.rdf4j:rdf4j-repository-sail@5.3.0; Reasoncould not apply upgrade, dependency is managed externally; Location:provenance does not contain locationcom.fasterxml.jackson.core:jackson-core@2.13.5tocom.fasterxml.jackson.core:jackson-core@2.21.2; Reasoncould not apply upgrade, dependency is managed externally; Location:https://maven-central.storage-download.googleapis.com/maven2/com/fasterxml/jackson/jackson-bom/2.13.5/jackson-bom-2.13.5.pomcom.fasterxml.jackson.core:jackson-databind@2.13.5tocom.fasterxml.jackson.core:jackson-databind@2.21.2; Reasoncould not apply upgrade, dependency is managed externally; Location:https://maven-central.storage-download.googleapis.com/maven2/com/fasterxml/jackson/jackson-bom/2.13.5/jackson-bom-2.13.5.pomcom.fasterxml.jackson.dataformat:jackson-dataformat-yaml@2.13.5tocom.fasterxml.jackson.dataformat:jackson-dataformat-yaml@2.21.2; Reasoncould not apply upgrade, dependency is managed externally; Location:https://maven-central.storage-download.googleapis.com/maven2/com/fasterxml/jackson/jackson-bom/2.13.5/jackson-bom-2.13.5.pomImportant
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Allocation of Resources Without Limits or Throttling
🦉 Denial of Service (DoS)
🦉 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
🦉 More lessons are available in Snyk Learn