AbsaOSS / spline-spark-agent

Spline agent for Apache Spark
https://absaoss.github.io/spline/
Apache License 2.0
176 stars 90 forks source link

[Snyk] Fix for 37 vulnerabilities #749

Closed wajda closed 9 months ago

wajda commented 9 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - pom.xml #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity | Reachability :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **390/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 3.3 | Information Disclosure
[SNYK-JAVA-COMGOOGLEGUAVA-1015415](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | Proof of Concept | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **445/1000**
**Why?** Has a fix available, CVSS 5.9 | Deserialization of Untrusted Data
[SNYK-JAVA-COMGOOGLEGUAVA-32236](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-32236) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **315/1000**
**Why?** Has a fix available, CVSS 3.3 | Creation of Temporary File in Directory with Insecure Permissions
[SNYK-JAVA-COMGOOGLEGUAVA-5710356](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **590/1000**
**Why?** Has a fix available, CVSS 8.8 | Integer Overflow
[SNYK-JAVA-COMGOOGLEPROTOBUF-173761](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-173761) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **525/1000**
**Why?** Has a fix available, CVSS 7.5 | Denial of Service (DoS)
[SNYK-JAVA-COMGOOGLEPROTOBUF-2331703](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-2331703) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-sql_2.12:`
`2.4.8 -> 3.5.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **435/1000**
**Why?** Has a fix available, CVSS 5.7 | Denial of Service (DoS)
[SNYK-JAVA-COMGOOGLEPROTOBUF-3040284](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-sql_2.12:`
`2.4.8 -> 3.5.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **525/1000**
**Why?** Has a fix available, CVSS 7.5 | Denial of Service (DoS)
[SNYK-JAVA-COMGOOGLEPROTOBUF-3167772](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-sql_2.12:`
`2.4.8 -> 3.5.0`
| Yes | No Known Exploit | No Path Found ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **335/1000**
**Why?** Has a fix available, CVSS 3.7 | Information Exposure
[SNYK-JAVA-COMMONSCODEC-561518](https://snyk.io/vuln/SNYK-JAVA-COMMONSCODEC-561518) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
`org.apache.spark:spark-sql_2.12:`
`2.4.8 -> 3.5.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **420/1000**
**Why?** Has a fix available, CVSS 5.4 | Improper Certificate Validation
[SNYK-JAVA-COMMONSHTTPCLIENT-30083](https://snyk.io/vuln/SNYK-JAVA-COMMONSHTTPCLIENT-30083) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **365/1000**
**Why?** Has a fix available, CVSS 4.3 | Man-in-the-Middle (MitM)
[SNYK-JAVA-COMMONSHTTPCLIENT-31660](https://snyk.io/vuln/SNYK-JAVA-COMMONSHTTPCLIENT-31660) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **550/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 6.5 | HTTP Request Smuggling
[SNYK-JAVA-IONETTY-473694](https://snyk.io/vuln/SNYK-JAVA-IONETTY-473694) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | Proof of Concept | No Path Found ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **335/1000**
**Why?** Has a fix available, CVSS 3.7 | Man-in-the-Middle (MitM)
[SNYK-JAVA-LOG4J-1300176](https://snyk.io/vuln/SNYK-JAVA-LOG4J-1300176) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **555/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 6.6 | Arbitrary Code Execution
[SNYK-JAVA-LOG4J-2316893](https://snyk.io/vuln/SNYK-JAVA-LOG4J-2316893) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | Proof of Concept | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **555/1000**
**Why?** Has a fix available, CVSS 8.1 | SQL Injection
[SNYK-JAVA-LOG4J-2342645](https://snyk.io/vuln/SNYK-JAVA-LOG4J-2342645) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **555/1000**
**Why?** Has a fix available, CVSS 8.1 | Deserialization of Untrusted Data
[SNYK-JAVA-LOG4J-2342646](https://snyk.io/vuln/SNYK-JAVA-LOG4J-2342646) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **555/1000**
**Why?** Has a fix available, CVSS 8.1 | Deserialization of Untrusted Data
[SNYK-JAVA-LOG4J-2342647](https://snyk.io/vuln/SNYK-JAVA-LOG4J-2342647) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **445/1000**
**Why?** Has a fix available, CVSS 5.9 | Denial of Service (DoS)
[SNYK-JAVA-LOG4J-3358774](https://snyk.io/vuln/SNYK-JAVA-LOG4J-3358774) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![critical severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png "critical severity") | **715/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 9.8 | Deserialization of Untrusted Data
[SNYK-JAVA-LOG4J-572732](https://snyk.io/vuln/SNYK-JAVA-LOG4J-572732) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | Proof of Concept | No Path Found ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **385/1000**
**Why?** Recently disclosed, Has a fix available, CVSS 3.7 | Improper Input Validation
[SNYK-JAVA-ORGAPACHEAVRO-5926693](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEAVRO-5926693) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **475/1000**
**Why?** Has a fix available, CVSS 6.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGAPACHECOMMONS-1316638](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-1316638) | `org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **475/1000**
**Why?** Has a fix available, CVSS 6.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGAPACHECOMMONS-1316639](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-1316639) | `org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **475/1000**
**Why?** Has a fix available, CVSS 6.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGAPACHECOMMONS-1316640](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-1316640) | `org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **525/1000**
**Why?** Has a fix available, CVSS 7.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGAPACHECOMMONS-1316641](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-1316641) | `org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **415/1000**
**Why?** Has a fix available, CVSS 5.3 | Security Bypass
[SNYK-JAVA-ORGAPACHEDERBY-32274](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEDERBY-32274) | `org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **483/1000**
**Why?** Has a fix available, CVSS 6.5 | Cryptographic Issues
[SNYK-JAVA-ORGAPACHEDIRECTORYSERVER-1063040](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEDIRECTORYSERVER-1063040) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **505/1000**
**Why?** Has a fix available, CVSS 7.1 | Directory Traversal
[SNYK-JAVA-ORGAPACHEIVY-3106014](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEIVY-3106014) | `org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **525/1000**
**Why?** Has a fix available, CVSS 7.5 | Directory Traversal
[SNYK-JAVA-ORGAPACHEIVY-3106929](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEIVY-3106929) | `org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **560/1000**
**Why?** Has a fix available, CVSS 8.2 | XML External Entity (XXE) Injection
[SNYK-JAVA-ORGAPACHEIVY-5847858](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEIVY-5847858) | `org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **440/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 4.3 | Access Control Bypass
[SNYK-JAVA-ORGAPACHEZOOKEEPER-174781](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEZOOKEEPER-174781) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | Proof of Concept | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **350/1000**
**Why?** Has a fix available, CVSS 4 | Insufficiently Protected Credentials
[SNYK-JAVA-ORGAPACHEZOOKEEPER-31035](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEZOOKEEPER-31035) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **525/1000**
**Why?** Has a fix available, CVSS 7.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGAPACHEZOOKEEPER-31428](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEZOOKEEPER-31428) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **525/1000**
**Why?** Has a fix available, CVSS 7.5 | Authentication Bypass
[SNYK-JAVA-ORGAPACHEZOOKEEPER-32301](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEZOOKEEPER-32301) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **520/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.9 | Denial of Service (DoS)
[SNYK-JAVA-ORGCODEHAUSJACKSON-3038425](https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJACKSON-3038425) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
`org.apache.spark:spark-sql_2.12:`
`2.4.8 -> 3.5.0`
| Yes | Proof of Concept | No Path Found ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **520/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.9 | Denial of Service (DoS)
[SNYK-JAVA-ORGCODEHAUSJACKSON-3038427](https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJACKSON-3038427) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
`org.apache.spark:spark-sql_2.12:`
`2.4.8 -> 3.5.0`
| Yes | Proof of Concept | No Path Found ![critical severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png "critical severity") | **640/1000**
**Why?** Has a fix available, CVSS 9.8 | Improper Input Validation
[SNYK-JAVA-ORGCODEHAUSJACKSON-3326362](https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJACKSON-3326362) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
`org.apache.spark:spark-sql_2.12:`
`2.4.8 -> 3.5.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **525/1000**
**Why?** Has a fix available, CVSS 7.5 | XML External Entity (XXE) Injection
[SNYK-JAVA-ORGCODEHAUSJACKSON-534878](https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJACKSON-534878) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
`org.apache.spark:spark-hive_2.12:`
`2.4.8 -> 3.2.0`
`org.apache.spark:spark-sql_2.12:`
`2.4.8 -> 3.5.0`
| Yes | No Known Exploit | No Path Found ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **525/1000**
**Why?** Has a fix available, CVSS 7.5 | XML Entity Expansion
[SNYK-JAVA-ORGGLASSFISHJERSEYMEDIA-595972](https://snyk.io/vuln/SNYK-JAVA-ORGGLASSFISHJERSEYMEDIA-595972) | `org.apache.spark:spark-core_2.12:`
`2.4.8 -> 3.3.0`
| Yes | No Known Exploit | No Path Found (*) Note that the real score may have changed since the PR was raised. Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: šŸ§ [View latest project report](https://app.snyk.io/org/wajda/project/1f1d180b-08db-45d0-bc58-4394bc71392b?utm_source=github&utm_medium=referral&page=fix-pr) šŸ›  [Adjust project settings](https://app.snyk.io/org/wajda/project/1f1d180b-08db-45d0-bc58-4394bc71392b?utm_source=github&utm_medium=referral&page=fix-pr/settings) šŸ“š [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"95102a5e-3443-4890-92be-31e5c03ec2de","prPublicId":"95102a5e-3443-4890-92be-31e5c03ec2de","dependencies":[{"name":"org.apache.spark:spark-core_2.12","from":"2.4.8","to":"3.3.0"},{"name":"org.apache.spark:spark-hive_2.12","from":"2.4.8","to":"3.2.0"},{"name":"org.apache.spark:spark-sql_2.12","from":"2.4.8","to":"3.5.0"}],"packageManager":"maven","projectPublicId":"1f1d180b-08db-45d0-bc58-4394bc71392b","projectUrl":"https://app.snyk.io/org/wajda/project/1f1d180b-08db-45d0-bc58-4394bc71392b?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JAVA-COMGOOGLEGUAVA-1015415","SNYK-JAVA-COMGOOGLEGUAVA-32236","SNYK-JAVA-COMGOOGLEGUAVA-5710356","SNYK-JAVA-COMGOOGLEPROTOBUF-2331703","SNYK-JAVA-COMGOOGLEPROTOBUF-3040284","SNYK-JAVA-COMGOOGLEPROTOBUF-3167772","SNYK-JAVA-COMGOOGLEPROTOBUF-173761","SNYK-JAVA-COMMONSCODEC-561518","SNYK-JAVA-COMMONSHTTPCLIENT-30083","SNYK-JAVA-COMMONSHTTPCLIENT-31660","SNYK-JAVA-IONETTY-473694","SNYK-JAVA-LOG4J-1300176","SNYK-JAVA-LOG4J-2316893","SNYK-JAVA-LOG4J-2342645","SNYK-JAVA-LOG4J-2342646","SNYK-JAVA-LOG4J-2342647","SNYK-JAVA-LOG4J-3358774","SNYK-JAVA-LOG4J-572732","SNYK-JAVA-ORGAPACHEAVRO-5926693","SNYK-JAVA-ORGAPACHECOMMONS-1316638","SNYK-JAVA-ORGAPACHECOMMONS-1316639","SNYK-JAVA-ORGAPACHECOMMONS-1316640","SNYK-JAVA-ORGAPACHECOMMONS-1316641","SNYK-JAVA-ORGAPACHEDERBY-32274","SNYK-JAVA-ORGAPACHEDIRECTORYSERVER-1063040","SNYK-JAVA-ORGAPACHEIVY-3106014","SNYK-JAVA-ORGAPACHEIVY-3106929","SNYK-JAVA-ORGAPACHEIVY-5847858","SNYK-JAVA-ORGAPACHEZOOKEEPER-174781","SNYK-JAVA-ORGAPACHEZOOKEEPER-31035","SNYK-JAVA-ORGAPACHEZOOKEEPER-31428","SNYK-JAVA-ORGAPACHEZOOKEEPER-32301","SNYK-JAVA-ORGCODEHAUSJACKSON-3038425","SNYK-JAVA-ORGCODEHAUSJACKSON-3038427","SNYK-JAVA-ORGCODEHAUSJACKSON-3326362","SNYK-JAVA-ORGCODEHAUSJACKSON-534878","SNYK-JAVA-ORGGLASSFISHJERSEYMEDIA-595972"],"upgrade":["SNYK-JAVA-COMGOOGLEGUAVA-1015415","SNYK-JAVA-COMGOOGLEGUAVA-32236","SNYK-JAVA-COMGOOGLEGUAVA-5710356","SNYK-JAVA-COMGOOGLEPROTOBUF-173761","SNYK-JAVA-COMGOOGLEPROTOBUF-2331703","SNYK-JAVA-COMGOOGLEPROTOBUF-3040284","SNYK-JAVA-COMGOOGLEPROTOBUF-3167772","SNYK-JAVA-COMMONSCODEC-561518","SNYK-JAVA-COMMONSHTTPCLIENT-30083","SNYK-JAVA-COMMONSHTTPCLIENT-31660","SNYK-JAVA-IONETTY-473694","SNYK-JAVA-LOG4J-1300176","SNYK-JAVA-LOG4J-2316893","SNYK-JAVA-LOG4J-2342645","SNYK-JAVA-LOG4J-2342646","SNYK-JAVA-LOG4J-2342647","SNYK-JAVA-LOG4J-3358774","SNYK-JAVA-LOG4J-572732","SNYK-JAVA-ORGAPACHEAVRO-5926693","SNYK-JAVA-ORGAPACHECOMMONS-1316638","SNYK-JAVA-ORGAPACHECOMMONS-1316639","SNYK-JAVA-ORGAPACHECOMMONS-1316640","SNYK-JAVA-ORGAPACHECOMMONS-1316641","SNYK-JAVA-ORGAPACHEDERBY-32274","SNYK-JAVA-ORGAPACHEDIRECTORYSERVER-1063040","SNYK-JAVA-ORGAPACHEIVY-3106014","SNYK-JAVA-ORGAPACHEIVY-3106929","SNYK-JAVA-ORGAPACHEIVY-5847858","SNYK-JAVA-ORGAPACHEZOOKEEPER-174781","SNYK-JAVA-ORGAPACHEZOOKEEPER-31035","SNYK-JAVA-ORGAPACHEZOOKEEPER-31428","SNYK-JAVA-ORGAPACHEZOOKEEPER-32301","SNYK-JAVA-ORGCODEHAUSJACKSON-3038425","SNYK-JAVA-ORGCODEHAUSJACKSON-3038427","SNYK-JAVA-ORGCODEHAUSJACKSON-3326362","SNYK-JAVA-ORGCODEHAUSJACKSON-534878","SNYK-JAVA-ORGGLASSFISHJERSEYMEDIA-595972"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["priorityScore"],"priorityScoreList":[390,445,315,525,435,525,590,335,420,365,550,335,555,555,555,555,445,715,385,475,475,475,525,415,483,505,525,560,440,350,525,525,520,520,640,525,525],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** šŸ¦‰ [Creation of Temporary File in Directory with Insecure Permissions](https://learn.snyk.io/lesson/insecure-temporary-file/?loc=fix-pr) šŸ¦‰ [Denial of Service (DoS)](https://learn.snyk.io/lesson/redos/?loc=fix-pr) šŸ¦‰ [Man-in-the-Middle (MitM)](https://learn.snyk.io/lesson/improper-input-validation/?loc=fix-pr) šŸ¦‰ [More lessons are available in Snyk Learn](https://learn.snyk.io/?loc=fix-pr)
sonarcloud[bot] commented 9 months ago

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication