[Snyk] Fix for 1 vulnerabilities #122
Security Report
You have successfully remediated 139 vulnerabilities, but introduced 9 new vulnerabilities in this branch.
❌ New vulnerabilities:
CVE | Severity | CVSS Score | Vulnerable Library | Suggested Fix | Issue |
---|---|---|---|---|---|
CVE-2022-1471Path to dependency file: /black-shop-service/black-shop-user/black-shop-user-api/pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar,/home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.33/snakeyaml-1.33.jar Dependency Hierarchy: -> spring-boot-starter-data-elasticsearch-3.1.9.jar (Root Library) -> spring-boot-starter-3.1.9.jar -> ❌ snakeyaml-1.33.jar (Vulnerable Library) |
Critical | 9.8 | snakeyaml-1.33.jar | Upgrade to version: org.yaml:snakeyaml:2.0 | None |
CVE-2020-10683Path to dependency file: /black-shop-service/black-shop-thirdparty/black-shop-wechat/black-shop-wechat-service/pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/org/dom4j/dom4j/2.1.1/dom4j-2.1.1.jar Dependency Hierarchy: -> weixin-java-mp-3.4.0.jar (Root Library) -> weixin-java-common-3.4.0.jar -> ❌ dom4j-2.1.1.jar (Vulnerable Library) |
Critical | 9.8 | dom4j-2.1.1.jar | Upgrade to version: org.dom4j:dom4j:2.1.3,org.dom4j:dom4j:2.0.3 | None |
CVE-2023-5072Path to dependency file: /black-shop-portal/black-shop-portal-web/pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/org/json/json/20220320/json-20220320.jar Dependency Hierarchy: -> jedis-4.3.2.jar (Root Library) -> ❌ json-20220320.jar (Vulnerable Library) |
High | 7.5 | json-20220320.jar | Upgrade to version: org.json:json:20231013 | None |
CVE-2023-4043Path to dependency file: /black-shop-basic/black-shop-basic-elasticsearch/pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/parsson/parsson/1.0.0/parsson-1.0.0.jar Dependency Hierarchy: -> spring-boot-starter-data-elasticsearch-3.1.9.jar (Root Library) -> spring-data-elasticsearch-5.1.9.jar -> elasticsearch-java-8.7.1.jar -> ❌ parsson-1.0.0.jar (Vulnerable Library) |
High | 7.5 | parsson-1.0.0.jar | Upgrade to version: org.eclipse.parsson:parsson:1.0.5,1.1.4;org.eclipse.parsson/jakarta.json:1.0.5,1.1.4 | None |
CVE-2023-3635Path to dependency file: /black-shop-auth/pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar,/home/wss-scanner/.m2/repository/com/squareup/okio/okio-jvm/3.0.0/okio-jvm-3.0.0.jar Dependency Hierarchy: -> feign-okhttp-9.7.0.jar (Root Library) -> okhttp-4.10.0.jar -> ❌ okio-jvm-3.0.0.jar (Vulnerable Library) |
High | 7.5 | okio-jvm-3.0.0.jar | Upgrade to version: com.squareup.okio:okio-jvm:3.4.0 | None |
CVE-2022-45688Path to dependency file: /black-shop-portal/black-shop-portal-web/pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/org/json/json/20220320/json-20220320.jar Dependency Hierarchy: -> jedis-4.3.2.jar (Root Library) -> ❌ json-20220320.jar (Vulnerable Library) |
High | 7.5 | json-20220320.jar | Upgrade to version: org.json:json:20230227 | None |
CVE-2022-22946Path to dependency file: /black-shop-gateway/pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/cloud/spring-cloud-gateway-core/2.0.4.RELEASE/spring-cloud-gateway-core-2.0.4.RELEASE.jar Dependency Hierarchy: -> spring-cloud-starter-gateway-2.0.4.RELEASE.jar (Root Library) -> ❌ spring-cloud-gateway-core-2.0.4.RELEASE.jar (Vulnerable Library) |
Medium | 5.5 | spring-cloud-gateway-core-2.0.4.RELEASE.jar | Upgrade to version: org.springframework.cloud:spring-cloud-gateway-server:3.1.1 | None |
CVE-2020-13956Path to dependency file: /black-shop-model/black-shop-model-product/pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar,/home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar Dependency Hierarchy: -> spring-boot-starter-data-elasticsearch-3.1.9.jar (Root Library) -> spring-data-elasticsearch-5.1.9.jar -> elasticsearch-java-8.7.1.jar -> elasticsearch-rest-client-8.7.1.jar -> ❌ httpclient-4.5.6.jar (Vulnerable Library) |
Medium | 5.3 | httpclient-4.5.6.jar | Upgrade to version: org.apache.httpcomponents:httpclient:4.5.13;org.apache.httpcomponents:httpclient-osgi:4.5.13;org.apache.httpcomponents.client5:httpclient5:5.0.3;org.apache.httpcomponents.client5:httpclient5-osgi:5.0.3 | None |
CVE-2021-29425Path to dependency file: /black-shop-model/black-shop-model-product/pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar Dependency Hierarchy: -> black-shop-basic-apolloconfig-1.0.0.jar (Root Library) -> black-shop-common-core-1.0.0.jar -> spring-cloud-starter-openfeign-2.0.4.RELEASE.jar -> spring-cloud-openfeign-core-2.0.4.RELEASE.jar -> feign-form-spring-3.3.0.jar -> commons-fileupload-1.3.3.jar -> ❌ commons-io-2.6.jar (Vulnerable Library) |
Medium | 4.8 | commons-io-2.6.jar | Upgrade to version: commons-io:commons-io:2.7 | None |
✔️ Remediated vulnerabilities:
CVE | Vulnerable Library |
---|---|
CVE-2017-12629 | lucene-queryparser-6.6.1.jar |
CVE-2021-37136 | netty-codec-4.1.34.Final.jar |
CVE-2022-22978 | spring-security-web-5.0.12.RELEASE.jar |
CVE-2019-10212 | undertow-core-1.4.27.Final.jar |
CVE-2020-36183 | jackson-databind-2.9.8.jar |
CVE-2019-14893 | jackson-databind-2.9.8.jar |
CVE-2020-10687 | undertow-core-1.4.27.Final.jar |
CVE-2020-10650 | jackson-databind-2.9.8.jar |
CVE-2020-14062 | jackson-databind-2.9.8.jar |
CVE-2020-24750 | jackson-databind-2.9.8.jar |
CVE-2022-2053 | undertow-core-1.4.27.Final.jar |
CVE-2019-16335 | jackson-databind-2.9.8.jar |
CVE-2023-6481 | logback-core-1.2.3.jar |
CVE-2022-38750 | snakeyaml-1.19.jar |
CVE-2020-24616 | jackson-databind-2.9.8.jar |
WS-2020-0293 | spring-security-web-5.0.12.RELEASE.jar |
CVE-2019-12814 | jackson-databind-2.9.8.jar |
CVE-2020-9548 | jackson-databind-2.9.8.jar |
CVE-2022-38749 | snakeyaml-1.19.jar |
CVE-2019-14439 | jackson-databind-2.9.8.jar |
CVE-2020-36179 | jackson-databind-2.9.8.jar |
CVE-2022-27772 | spring-boot-2.0.9.RELEASE.jar |
CVE-2020-5408 | spring-security-crypto-5.0.12.RELEASE.jar |
CVE-2019-14379 | jackson-databind-2.9.8.jar |
CVE-2023-20861 | spring-expression-5.0.13.RELEASE.jar |
CVE-2022-42003 | jackson-databind-2.9.8.jar |
CVE-2017-18640 | snakeyaml-1.19.jar |
CVE-2020-11620 | jackson-databind-2.9.8.jar |
CVE-2020-25649 | jackson-databind-2.9.8.jar |
CVE-2019-12086 | jackson-databind-2.9.8.jar |
CVE-2019-20444 | netty-codec-http-4.1.34.Final.jar |
CVE-2020-9547 | jackson-databind-2.9.8.jar |
CVE-2020-35491 | jackson-databind-2.9.8.jar |
CVE-2020-13956 | httpclient-4.5.8.jar |
CVE-2020-7020 | elasticsearch-5.6.16.jar |
CVE-2021-21295 | netty-codec-http-4.1.34.Final.jar |
CVE-2020-36182 | jackson-databind-2.9.8.jar |
CVE-2022-41854 | snakeyaml-1.19.jar |
CVE-2019-14540 | jackson-databind-2.9.8.jar |
CVE-2022-42004 | jackson-databind-2.9.8.jar |
CVE-2020-14061 | jackson-databind-2.9.8.jar |
CVE-2019-20445 | netty-codec-http-4.1.34.Final.jar |
CVE-2019-14892 | jackson-databind-2.9.8.jar |
CVE-2020-5421 | spring-web-5.0.13.RELEASE.jar |
CVE-2019-16869 | netty-codec-http-4.1.34.Final.jar |
CVE-2020-11113 | jackson-databind-2.9.8.jar |
CVE-2020-11619 | jackson-databind-2.9.8.jar |
CVE-2022-38751 | snakeyaml-1.19.jar |
WS-2019-0379 | commons-codec-1.11.jar |
CVE-2022-38752 | snakeyaml-1.19.jar |
CVE-2020-36180 | jackson-databind-2.9.8.jar |
CVE-2018-1067 | undertow-core-1.4.27.Final.jar |
CVE-2021-43797 | netty-codec-http-4.1.34.Final.jar |
CVE-2020-36518 | jackson-databind-2.9.8.jar |
CVE-2021-22096 | spring-web-5.0.13.RELEASE.jar |
WS-2016-7107 | spring-security-web-5.0.12.RELEASE.jar |
CVE-2019-14888 | undertow-core-1.4.27.Final.jar |
WS-2017-3767 | spring-security-web-5.0.12.RELEASE.jar |
CVE-2019-3888 | undertow-core-1.4.27.Final.jar |
CVE-2020-10719 | undertow-core-1.4.27.Final.jar |
CVE-2020-14195 | jackson-databind-2.9.8.jar |
CVE-2021-22060 | spring-core-5.0.13.RELEASE.jar |
CVE-2021-22096 | spring-core-5.0.13.RELEASE.jar |
CVE-2020-10705 | undertow-core-1.4.27.Final.jar |
CVE-2023-1108 | undertow-core-1.4.27.Final.jar |
WS-2020-0408 | netty-handler-4.1.34.Final.jar |
CVE-2021-21290 | netty-handler-4.1.34.Final.jar |
CVE-2019-16943 | jackson-databind-2.9.8.jar |
CVE-2020-5408 | spring-security-core-5.0.12.RELEASE.jar |
CVE-2020-36181 | jackson-databind-2.9.8.jar |
CVE-2022-1259 | undertow-core-1.4.27.Final.jar |
CVE-2020-14060 | jackson-databind-2.9.8.jar |
CVE-2023-34055 | spring-boot-2.0.9.RELEASE.jar |
CVE-2021-21290 | netty-codec-http-4.1.34.Final.jar |
CVE-2023-20863 | spring-expression-5.0.13.RELEASE.jar |
CVE-2019-7614 | elasticsearch-5.6.16.jar |
CVE-2018-1048 | undertow-core-1.4.27.Final.jar |
CVE-2020-27782 | undertow-core-1.4.27.Final.jar |
CVE-2023-6378 | logback-classic-1.2.3.jar |
CVE-2020-5404 | reactor-netty-0.7.15.RELEASE.jar |
CVE-2021-42550 | logback-classic-1.2.3.jar |
CVE-2022-22950 | spring-expression-5.0.13.RELEASE.jar |
CVE-2020-35490 | jackson-databind-2.9.8.jar |
CVE-2021-20190 | jackson-databind-2.9.8.jar |
CVE-2021-42550 | logback-core-1.2.3.jar |
CVE-2020-9546 | jackson-databind-2.9.8.jar |
WS-2021-0419 | com-google-gson-RELEASE113.jar |
CVE-2020-36185 | jackson-databind-2.9.8.jar |
CVE-2022-25857 | snakeyaml-1.19.jar |
CVE-2019-17531 | jackson-databind-2.9.8.jar |
CVE-2020-36188 | jackson-databind-2.9.8.jar |
CVE-2020-11612 | netty-codec-4.1.34.Final.jar |
CVE-2020-1757 | undertow-core-1.4.27.Final.jar |
CVE-2019-16942 | jackson-databind-2.9.8.jar |
CVE-2018-14642 | undertow-core-1.4.27.Final.jar |
CVE-2022-1471 | snakeyaml-1.19.jar |
CVE-2021-3597 | undertow-core-1.4.27.Final.jar |
CVE-2021-20220 | undertow-core-1.4.27.Final.jar |
CVE-2021-22112 | spring-security-web-5.0.12.RELEASE.jar |
CVE-2020-5398 | spring-web-5.0.13.RELEASE.jar |
CVE-2023-3635 | okio-1.13.0.jar |
CVE-2020-36184 | jackson-databind-2.9.8.jar |
CVE-2019-17267 | jackson-databind-2.9.8.jar |
CVE-2020-36189 | jackson-databind-2.9.8.jar |
CVE-2016-1000027 | spring-web-5.0.13.RELEASE.jar |
CVE-2021-37137 | netty-codec-4.1.34.Final.jar |
CVE-2021-22096 | spring-webmvc-5.0.13.RELEASE.jar |
CVE-2020-7021 | elasticsearch-5.6.16.jar |
CVE-2020-11112 | jackson-databind-2.9.8.jar |
CVE-2020-7238 | netty-codec-http-4.1.34.Final.jar |
CVE-2021-3629 | undertow-core-1.4.27.Final.jar |
CVE-2020-11111 | jackson-databind-2.9.8.jar |
CVE-2022-25647 | com-google-gson-RELEASE113.jar |
CVE-2016-6311 | undertow-core-1.4.27.Final.jar |
CVE-2019-10202 | jackson-databind-2.9.8.jar |
CVE-2020-10672 | jackson-databind-2.9.8.jar |
CVE-2022-1319 | undertow-core-1.4.27.Final.jar |
CVE-2020-1745 | undertow-core-1.4.27.Final.jar |
CVE-2023-34462 | netty-handler-4.1.34.Final.jar |
WS-2021-0172 | spring-web-5.0.13.RELEASE.jar |
CVE-2022-24823 | netty-common-4.1.34.Final.jar |
CVE-2021-22096 | spring-webflux-5.0.13.RELEASE.jar |
CVE-2019-10184 | undertow-servlet-1.4.27.Final.jar |
CVE-2021-29425 | org-apache-commons-io-RELEASE113.jar |
CVE-2022-4492 | undertow-core-1.4.27.Final.jar |
CVE-2020-28491 | jackson-dataformat-cbor-2.9.8.jar |
CVE-2020-36186 | jackson-databind-2.9.8.jar |
CVE-2020-8840 | jackson-databind-2.9.8.jar |
CVE-2020-36187 | jackson-databind-2.9.8.jar |
CVE-2020-10673 | jackson-databind-2.9.8.jar |
CVE-2019-20330 | jackson-databind-2.9.8.jar |
CVE-2020-10969 | jackson-databind-2.9.8.jar |
CVE-2022-22970 | spring-core-5.0.13.RELEASE.jar |
CVE-2020-10968 | jackson-databind-2.9.8.jar |
CVE-2019-12384 | jackson-databind-2.9.8.jar |
CVE-2022-22970 | spring-beans-5.0.13.RELEASE.jar |
CVE-2021-3859 | undertow-core-1.4.27.Final.jar |
CVE-2020-35728 | jackson-databind-2.9.8.jar |
CVE-2022-22965 | spring-beans-5.0.13.RELEASE.jar |
Base branch total remaining vulnerabilities: 209
Base branch commit: null
Total libraries scanned: 263
Scan token: d8cfcc30f76947e49b688145681a60d5