Skip to content

Conversation

@tyleragypt
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123)

Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGOWASPANTISAMY-6227504
  455   org.owasp.esapi:esapi:
2.2.3.1 -> 2.5.4.0
No Path Found No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Cross-site Scripting (XSS)

@tyleragypt
Copy link
Owner Author

Logo
Checkmarx One – Scan Summary & Details4a7c7451-54b7-48bc-ad73-bb77eb2bfe93

Policy Management Violations

Policy Name Rule(s) Break Build
No highs or mediums No Highs or Mediums false

New Issues

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2016-10707 Npm-jquery-2.1.4 Vulnerable Package
HIGH CVE-2022-41853 Maven-org.hsqldb:hsqldb-2.3.6 Vulnerable Package
HIGH CVE-2024-22243 Maven-org.springframework:spring-web-4.3.30.RELEASE Vulnerable Package
HIGH CVE-2024-22259 Maven-org.springframework:spring-web-4.3.30.RELEASE Vulnerable Package
HIGH CVE-2024-22262 Maven-org.springframework:spring-web-4.3.30.RELEASE Vulnerable Package
MEDIUM CVE-2015-9251 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2019-11358 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2020-11022 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2020-11023 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2023-20861 Maven-org.springframework:spring-expression-4.3.30.RELEASE Vulnerable Package
MEDIUM CVE-2023-20863 Maven-org.springframework:spring-expression-4.3.30.RELEASE Vulnerable Package
MEDIUM CVE-2023-33201 Maven-org.bouncycastle:bcprov-jdk15on-1.70 Vulnerable Package
MEDIUM CVE-2023-33202 Maven-org.bouncycastle:bcprov-jdk15on-1.70 Vulnerable Package
MEDIUM CVE-2024-29857 Maven-org.bouncycastle:bcprov-jdk15on-1.70 Vulnerable Package
MEDIUM CVE-2024-30171 Maven-org.bouncycastle:bcprov-jdk15on-1.70 Vulnerable Package
MEDIUM CVE-2024-30172 Maven-org.bouncycastle:bcprov-jdk15on-1.70 Vulnerable Package
MEDIUM Cxf0b588a3-5c6f Npm-jquery-2.1.4 Vulnerable Package
LOW Unpinned Actions Full Length Commit SHA /codeql-analysis.yml: [47](https://github.com/tyleragypt/BenchmarkJava/blob/snyk-fix-0d93eab6fb7d4ceed6c37c47f979571e//.github/workflows/codeql-analysis.yml# L47) Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps...
LOW Unpinned Actions Full Length Commit SHA /codeql-analysis.yml: [35](https://github.com/tyleragypt/BenchmarkJava/blob/snyk-fix-0d93eab6fb7d4ceed6c37c47f979571e//.github/workflows/codeql-analysis.yml# L35) Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps...
LOW Update Instruction Alone /Dockerfile: [7](https://github.com/tyleragypt/BenchmarkJava/blob/snyk-fix-0d93eab6fb7d4ceed6c37c47f979571e//VMs/Dockerfile# L7) Instruction 'RUN update' should always be followed by ' install' in the same RUN statement

Fixed Issues

Severity Issue Source File / Package
HIGH CVE-2016-1000031 Maven-commons-fileupload:commons-fileupload-1.3.3
HIGH CVE-2019-17571 Maven-log4j:log4j-1.2.17
HIGH CVE-2021-4104 Maven-log4j:log4j-1.2.17
HIGH CVE-2022-23302 Maven-log4j:log4j-1.2.17
HIGH CVE-2022-23305 Maven-log4j:log4j-1.2.17
HIGH CVE-2022-23307 Maven-log4j:log4j-1.2.17
HIGH CVE-2022-23457 Maven-org.owasp.esapi:esapi-2.2.3.1
HIGH CVE-2022-24839 Maven-net.sourceforge.nekohtml:nekohtml-1.9.22
MEDIUM CVE-2020-14338 Maven-xerces:xercesImpl-2.12.1
MEDIUM CVE-2021-29425 Maven-commons-io:commons-io-2.6
MEDIUM CVE-2021-35043 Maven-org.owasp.antisamy:antisamy-1.6.3
MEDIUM CVE-2022-23437 Maven-xerces:xercesImpl-2.12.1
MEDIUM CVE-2022-24891 Maven-org.owasp.esapi:esapi-2.2.3.1
MEDIUM CVE-2022-28367 Maven-org.owasp.antisamy:antisamy-1.6.3
MEDIUM Update Instruction Alone /Dockerfile: [5](https://github.com/tyleragypt/BenchmarkJava/blob/snyk-fix-0d93eab6fb7d4ceed6c37c47f979571e//VMs/Dockerfile# L5)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants