Skip to content

Conversation

@HeliosZig
Copy link
Owner

snyk-top-banner

Snyk has created this PR to fix 194 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
low severity HTTP Request Smuggling
SNYK-JAVA-ORGAPACHETOMCATEMBED-3097829
  ****   Major version upgrade `` No Known Exploit
critical severity Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-31401
  ****   `` No Known Exploit
critical severity Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-31420
  ****   `` No Known Exploit
high severity Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-31432
  ****   `` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-31435
  ****   `` No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-3326459
  ****   Major version upgrade `` No Known Exploit
medium severity Unprotected Transport of Credentials
SNYK-JAVA-ORGAPACHETOMCATEMBED-3369687
  ****   Major version upgrade `` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451342
  ****   `` No Known Exploit
high severity Remote Code Execution
SNYK-JAVA-ORGAPACHETOMCATEMBED-451343
  ****   `` Mature
low severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451458
  ****   `` Mature
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451459
  ****   `` No Known Exploit
medium severity Open Redirect
SNYK-JAVA-ORGAPACHETOMCATEMBED-451503
  ****   `` Mature
medium severity Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-451504
  ****   `` No Known Exploit
critical severity Insecure Defaults
SNYK-JAVA-ORGAPACHETOMCATEMBED-451505
  ****   `` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451508
  ****   `` No Known Exploit
medium severity Directory Traversal
SNYK-JAVA-ORGAPACHETOMCATEMBED-451510
  ****   `` No Known Exploit
medium severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHETOMCATEMBED-451511
  ****   `` No Known Exploit
high severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHETOMCATEMBED-451515
  ****   `` Mature
high severity Directory Traversal
SNYK-JAVA-ORGAPACHETOMCATEMBED-451518
  ****   `` No Known Exploit
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHETOMCATEMBED-451519
  ****   `` No Known Exploit
low severity Session Fixation
SNYK-JAVA-ORGAPACHETOMCATEMBED-538488
  ****   Major version upgrade `` No Known Exploit
high severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHETOMCATEMBED-570072
  ****   Major version upgrade `` Mature
medium severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-584427
  ****   Major version upgrade `` No Known Exploit
medium severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHETOMCATEMBED-5862028
  ****   Major version upgrade `` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-5953331
  ****   Major version upgrade `` Mature
medium severity Improper Input Validation
SNYK-JAVA-ORGAPACHETOMCATEMBED-5959654
  ****   Major version upgrade `` No Known Exploit
medium severity Incomplete Cleanup
SNYK-JAVA-ORGAPACHETOMCATEMBED-5959972
  ****   Major version upgrade `` No Known Exploit
high severity Improper Input Validation
SNYK-JAVA-ORGAPACHETOMCATEMBED-6092281
  ****   Major version upgrade `` No Known Exploit
medium severity Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-6183062
  ****   Major version upgrade `` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-6435948
  ****   Major version upgrade `` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-6435950
  ****   Major version upgrade `` No Known Exploit
high severity Insufficient Session Expiration
SNYK-JAVA-ORGAPACHETOMCATEMBED-7430175
  ****   Major version upgrade `` No Known Exploit
high severity XML External Entity (XXE) Injection
SNYK-JAVA-ORGAPACHEXMLBEANS-1060048
  ****   org.apache.poi:poi-ooxml:
3.9 -> 4.1.0
Major version upgrade `` No Known Exploit
high severity Information Exposure
SNYK-JAVA-ORGBOUNCYCASTLE-1035561
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
medium severity Timing Attack
SNYK-JAVA-ORGBOUNCYCASTLE-1296075
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
low severity Information Exposure
SNYK-JAVA-ORGBOUNCYCASTLE-173771
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Insufficient Validation
SNYK-JAVA-ORGBOUNCYCASTLE-32340
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32361
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32362
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
medium severity Timing Attack
SNYK-JAVA-ORGBOUNCYCASTLE-32363
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Signature Validation Bypass
SNYK-JAVA-ORGBOUNCYCASTLE-32364
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
low severity Insufficient Validation
SNYK-JAVA-ORGBOUNCYCASTLE-32365
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32366
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
medium severity Cryptographic Issues
SNYK-JAVA-ORGBOUNCYCASTLE-32367
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32368
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32369
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Information Disclosure
SNYK-JAVA-ORGCODEHAUSGROOVY-1048694
  ****   Major version upgrade `` No Known Exploit
medium severity Stack-based Buffer Overflow
SNYK-JAVA-ORGCODEHAUSJETTISON-3033152
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-ORGCODEHAUSJETTISON-3037311
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGCODEHAUSJETTISON-3168084
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGCODEHAUSJETTISON-3168085
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-ORGCODEHAUSJETTISON-3367610
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` Proof of Concept
high severity XML External Entity (XXE) Injection
SNYK-JAVA-ORGDOM4J-32474
  ****   org.dom4j:dom4j:
2.1.0 -> 2.1.3
`` Proof of Concept
high severity XML External Entity (XXE) Injection
SNYK-JAVA-ORGDOM4J-565810
  ****   org.dom4j:dom4j:
2.1.0 -> 2.1.3
`` No Known Exploit
high severity XML External Entity (XXE) Injection
SNYK-JAVA-ORGJDOM-1309669
  ****   org.jdom:jdom2:
2.0.6 -> 2.0.6.1
`` Proof of Concept
high severity Cross-Site Request Forgery (CSRF)
SNYK-JAVA-ORGJOLOKIA-540501
  ****   org.jolokia:jolokia-core:
1.6.0 -> 1.6.1
`` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGJSOUP-1567345
  ****   org.jsoup:jsoup:
1.10.2 -> 1.15.3
`` No Known Exploit
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGJSOUP-2989728
  ****   org.jsoup:jsoup:
1.10.2 -> 1.15.3
`` No Known Exploit
medium severity Remote Code Execution (RCE)
SNYK-JAVA-ORGMYBATIS-1017032
  ****   org.mybatis.spring.boot:mybatis-spring-boot-starter:
1.3.2 -> 2.3.1
Major version upgrade `` No Known Exploit
high severity Improper Input Validation
SNYK-JAVA-ORGSPRINGFRAMEWORK-1009832
  ****   org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
medium severity Improper Output Neutralization for Logs
SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
  ****   org.mybatis.spring.boot:mybatis-spring-boot-starter:
1.3.2 -> 2.3.1
org.springframework.security:spring-security-config:
4.2.12.RELEASE -> 5.7.12
org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
medium severity Improper Input Validation
SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
  ****   org.mybatis.spring.boot:mybatis-spring-boot-starter:
1.3.2 -> 2.3.1
org.springframework.security:spring-security-config:
4.2.12.RELEASE -> 5.7.12
org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
  ****   org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
medium severity Multipart Content Pollution
SNYK-JAVA-ORGSPRINGFRAMEWORK-32199
  ****   `` No Known Exploit
medium severity Directory Traversal
SNYK-JAVA-ORGSPRINGFRAMEWORK-32202
  ****   `` Proof of Concept
medium severity Allocation of Resources Without Limits or Throttling
SNYK-JAVA-ORGSPRINGFRAMEWORK-3369749
  ****   org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
medium severity Information Exposure
SNYK-JAVA-ORGSPRINGFRAMEWORK-467268
  ****   `` No Known Exploit
medium severity Allocation of Resources Without Limits or Throttling
SNYK-JAVA-ORGSPRINGFRAMEWORK-5422217
  ****   org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
high severity Open Redirect
SNYK-JAVA-ORGSPRINGFRAMEWORK-6261586
  ****   org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
high severity Open Redirect
SNYK-JAVA-ORGSPRINGFRAMEWORK-6444790
  ****   org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
medium severity Open Redirect
SNYK-JAVA-ORGSPRINGFRAMEWORK-6597980
  ****   org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-7687447
  ****   org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
high severity Path Traversal
SNYK-JAVA-ORGSPRINGFRAMEWORK-7945490
  ****   Major version upgrade `` No Known Exploit
high severity Insecure Temporary File
SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-2438287
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-5564390
  ****   org.mybatis.spring.boot:mybatis-spring-boot-starter:
1.3.2 -> 2.3.1
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862
  ****   Major version upgrade `` No Known Exploit
medium severity Privilege Escalation
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-1078232
  ****   org.springframework.security:spring-security-config:
4.2.12.RELEASE -> 5.7.12
org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
low severity Timing Attack
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-1290497
  ****   org.springframework.boot:spring-boot-starter-security:
2.1.5.RELEASE -> 2.5.14
org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
high severity Authorization Bypass
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-2833359
  ****   org.springframework.boot:spring-boot-starter-security:
2.1.5.RELEASE -> 2.5.14
org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` Proof of Concept
medium severity Integer Overflow or Wraparound
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-2833360
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` Proof of Concept
high severity Improper Authentication
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-450242
  ****   org.springframework.security:spring-security-config:
4.2.12.RELEASE -> 5.7.12
org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
`` No Known Exploit
medium severity Cryptographic Weakness
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-570203
  ****   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade `` No Known Exploit
medium severity Cryptographic Weakness
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-570204
  ****   org.springframework.security:spring-security-config:
4.2.12.RELEASE -> 5.7.12
org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
`` No Known Exploit
medium severity Integer Overflow or Wraparound
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5950401
  ****   org.springframework.security:spring-security-config:
4.2.12.RELEASE -> 5.7.12
org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` Proof of Concept
high severity Improper Access Control
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-6457293
  ****   org.springframework.security:spring-security-config:
4.2.12.RELEASE -> 5.7.12
org.springframework.security:spring-security-web:
4.2.12.RELEASE -> 5.8.14
Major version upgrade `` No Known Exploit
critical severity Sandbox Bypass
SNYK-JAVA-ORGTHYMELEAF-5811866
  ****   Major version upgrade `` Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-ORGYAML-2806360
  ****   org.yaml:snakeyaml:
1.21 -> 2.0
Major version upgrade `` No Known Exploit
low severity Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016888
  ****   org.yaml:snakeyaml:
1.21 -> 2.0
Major version upgrade `` Proof of Concept
low severity Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016889
  ****   org.yaml:snakeyaml:
1.21 -> 2.0
Major version upgrade `` No Known Exploit
medium severity Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016891
  ****   org.yaml:snakeyaml:
1.21 -> 2.0
Major version upgrade `` Proof of Concept
low severity Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3113851
  ****   org.yaml:snakeyaml:
1.21 -> 2.0
Major version upgrade `` No Known Exploit
medium severity Arbitrary Code Execution
SNYK-JAVA-ORGYAML-3152153
  ****   org.yaml:snakeyaml:
1.21 -> 2.0
Major version upgrade `` Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JAVA-ORGYAML-537645
  ****   org.yaml:snakeyaml:
1.21 -> 2.0
Major version upgrade `` Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-ORGYAML-6056527
  ****   org.yaml:snakeyaml:
1.21 -> 2.0
Major version upgrade `` No Known Exploit
high severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1040458
  805   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Reachable Proof of Concept
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720
  800   org.apache.logging.log4j:log4j-core:
2.9.1 -> 2.13.2
No Path Found Mature
critical severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-456705
  790   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Reachable No Known Exploit
high severity Deserialization of Untrusted Data
SNYK-JAVA-COMALIBABA-2859222
  780   com.alibaba:fastjson:
1.2.24 -> 1.2.83
Reachable Proof of Concept
critical severity Remote Code Execution
SNYK-JAVA-COMALIBABA-73578
  750   com.alibaba:fastjson:
1.2.24 -> 1.2.83
No Path Found Mature
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2320014
  750   org.apache.logging.log4j:log4j-core:
2.9.1 -> 2.13.2
No Path Found Mature
medium severity Server-Side Request Forgery (SSRF)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051967
  745   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Reachable Mature
high severity Remote Code Execution (RCE)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569183
  725   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Mature
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1294540
  685   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Reachable Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-2388977
  675   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Reachable No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897
  670   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Reachable Proof of Concept
high severity XML External Entity (XXE) Injection
SNYK-JAVA-DOM4J-2812975
  670   org.apache.poi:poi-ooxml:
3.9 -> 4.1.0
Reachable No Known Exploit
medium severity Insecure XML deserialization
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-460764
  660   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Reachable Mature
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569176
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569177
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569178
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569179
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569180
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569181
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569182
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569185
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569186
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569187
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569190
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Server-Side Request Forgery (SSRF)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569191
  650   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
critical severity Arbitrary Code Execution
SNYK-JAVA-CHQOSLOGBACK-30208
  640   No Path Found No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-CHQOSLOGBACK-31407
  640   Major version upgrade No Path Found No Known Exploit
critical severity XML External Entity (XXE) Injection
SNYK-JAVA-COMMONITORJBL-2414470
  640   com.monitorjbl:xlsx-streamer:
2.0.0 -> 2.2.0
No Path Found No Known Exploit
medium severity Arbitrary File Deletion
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051966
  640   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Reachable Proof of Concept
high severity Stack-based Buffer Overflow
SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
  635   mysql:mysql-connector-java:
8.0.12 -> 8.0.31
No Path Found No Known Exploit
high severity Arbitrary Code Execution
SNYK-JAVA-CNHUTOOL-3322192
  630   cn.hutool:hutool-all:
5.8.10 -> 5.8.12
No Path Found Proof of Concept
high severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088337
  600   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity XML External Entity (XXE) Injection
SNYK-JAVA-DOM4J-174153
  600   org.apache.poi:poi-ooxml:
3.9 -> 4.1.0
No Path Found Proof of Concept
high severity HTTP Request Smuggling
SNYK-JAVA-IONETTY-543490
  600   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity HTTP Request Smuggling
SNYK-JAVA-IONETTY-543669
  600   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity HTTP Request Smuggling
SNYK-JAVA-IONETTY-6056419
  600   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2321524
  600   org.apache.logging.log4j:log4j-core:
2.9.1 -> 2.13.2
No Path Found Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-1728268
  600   Major version upgrade No Path Found Proof of Concept
medium severity SSL Certificate Bypass
SNYK-JAVA-COMSQUAREUPOKHTTP-30380
  595   com.squareup.okhttp:okhttp:
2.5.0 -> 2.7.4
Reachable No Known Exploit
medium severity HTTP Request Smuggling
SNYK-JAVA-IONETTY-1317097
  595   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Mature
high severity Integer Overflow
SNYK-JAVA-COMGOOGLEPROTOBUF-173761
  590   mysql:mysql-connector-java:
8.0.12 -> 8.0.31
No Path Found No Known Exploit
high severity Access Control Bypass
SNYK-JAVA-MYSQL-451464
  590   mysql:mysql-connector-java:
8.0.12 -> 8.0.31
No Path Found No Known Exploit
high severity Deserialization of Untrusted Data
SNYK-JAVA-COMALIBABA-570967
  555   com.alibaba:fastjson:
1.2.24 -> 1.2.83
No Path Found No Known Exploit
medium severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339
  555   org.apache.logging.log4j:log4j-core:
2.9.1 -> 2.13.2
No Path Found Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569189
  550   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
medium severity HTTP Request Smuggling
SNYK-JAVA-IONETTY-469234
  550   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
medium severity Relative Path Overwrite (RPO)
SNYK-JAVA-IOSPRINGFOX-1075064
  550   io.springfox:springfox-swagger-ui:
2.9.2 -> 2.10.0
No Path Found Proof of Concept
medium severity Directory Traversal
SNYK-JAVA-COMMONSIO-1277109
  535   commons-io:commons-io:
2.5 -> 2.7
No Path Found Mature
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088332
  530   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088334
  530   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088336
  530   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-COMGOOGLEPROTOBUF-2331703
  525   mysql:mysql-connector-java:
8.0.12 -> 8.0.31
No Path Found No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
  525   mysql:mysql-connector-java:
8.0.12 -> 8.0.31
No Path Found No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584063
  525   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584064
  525   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-IONETTY-2342128
  525   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-IONETTY-30433
  525   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found No Known Exploit
high severity Information Exposure
SNYK-JAVA-IONETTY-575112
  525   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-1728264
  525   Major version upgrade No Path Found No Known Exploit
medium severity XML External Entity (XXE) Injection
SNYK-JAVA-MYSQL-1766958
  520   mysql:mysql-connector-java:
8.0.12 -> 8.0.31
No Path Found Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088328
  515   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-CHQOSLOGBACK-6094942
  505   Major version upgrade No Path Found No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-CHQOSLOGBACK-6094943
  505   Major version upgrade No Path Found No Known Exploit
high severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JAVA-CHQOSLOGBACK-6097492
  505   Major version upgrade No Path Found No Known Exploit
high severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JAVA-CHQOSLOGBACK-6097493
  505   Major version upgrade No Path Found No Known Exploit
high severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHETOMCATEMBED-1080637
  500   Major version upgrade No Path Found No Known Exploit
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088331
  495   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088329
  490   com.thoughtworks.xstream:xstream:
1.4.10 -> 1.4.20
org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Path Found Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088330
  490   com.thoughtworks.xstream:xstrea...

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-3097829
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-31401
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-31420
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-31432
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-31435
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-3326459
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-3369687
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451342
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451343
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451458
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451459
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451503
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451504
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451505
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451508
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451510
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451511
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451515
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451518
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-451519
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-538488
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-570072
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-584427
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-5862028
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-5953331
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-5959654
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-5959972
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-6092281
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-6183062
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-6435948
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-6435950
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-7430175
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLBEANS-1060048
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-1035561
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-1296075
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-173771
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32340
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32361
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32362
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32363
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32364
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32365
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32366
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32367
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32368
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32369
- https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSGROOVY-1048694
- https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJETTISON-3033152
- https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJETTISON-3037311
- https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJETTISON-3168084
- https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJETTISON-3168085
- https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJETTISON-3367610
- https://snyk.io/vuln/SNYK-JAVA-ORGDOM4J-32474
- https://snyk.io/vuln/SNYK-JAVA-ORGDOM4J-565810
- https://snyk.io/vuln/SNYK-JAVA-ORGJDOM-1309669
- https://snyk.io/vuln/SNYK-JAVA-ORGJOLOKIA-540501
- https://snyk.io/vuln/SNYK-JAVA-ORGJSOUP-1567345
- https://snyk.io/vuln/SNYK-JAVA-ORGJSOUP-2989728
- https://snyk.io/vuln/SNYK-JAVA-ORGMYBATIS-1017032
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-1009832
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-32199
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-32202
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-3369749
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-467268
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-5422217
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-6261586
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-6444790
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-6597980
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-7687447
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-7945490
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-2438287
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-5564390
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-1078232
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-1290497
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-2833359
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-2833360
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-450242
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-570203
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-570204
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5950401
- https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-6457293
- https://snyk.io/vuln/SNYK-JAVA-ORGTHYMELEAF-5811866
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3016888
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3016889
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3016891
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3113851
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-537645
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-6056527
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1040458
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-456705
- https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222
- https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-73578
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2320014
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051967
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569183
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1294540
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-2388977
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897
- https://snyk.io/vuln/SNYK-JAVA-DOM4J-2812975
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-460764
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569176
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569177
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569178
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569179
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569180
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569181
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569182
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569185
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569186
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569187
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569190
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569191
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-30208
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-31407
- https://snyk.io/vuln/SNYK-JAVA-COMMONITORJBL-2414470
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051966
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-CNHUTOOL-3322192
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088337
- https://snyk.io/vuln/SNYK-JAVA-DOM4J-174153
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-543490
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-543669
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6056419
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2321524
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-1728268
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP-30380
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-1317097
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-173761
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-451464
- https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-570967
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569189
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-469234
- https://snyk.io/vuln/SNYK-JAVA-IOSPRINGFOX-1075064
- https://snyk.io/vuln/SNYK-JAVA-COMMONSIO-1277109
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088332
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088334
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088336
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-2331703
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-1584063
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-1584064
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-2342128
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-30433
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-575112
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-1728264
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-1766958
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088328
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-6094942
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-6094943
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-6097492
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-6097493
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-1080637
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088331
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088329
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088330
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088333
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088335
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088338
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-1048292
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-2386864
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-1020439
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-2314893
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-31515
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-5725787
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-1070799
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-1082234
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-1082235
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-1082236
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-1082238
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-1080638
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-1017119
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-2812456
- https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180
- https://snyk.io/vuln/SNYK-JAVA-OGNL-30474
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-1061939
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-1728266
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEPOI-548686
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-1726923
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-1728265
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047
- https://snyk.io/vuln/SNYK-JAVA-COMMONSNET-3153503
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHELOGGINGLOG4J-567761
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-3035793
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants