HumanCellAtlas / data-consumer-vignettes

Simple walk-throughs of interacting with the DCP as a downstream data consumer.
MIT License
17 stars 5 forks source link

[Snyk] Fix for 12 vulnerabilities #117

Open snyk-bot opened 3 years ago

snyk-bot commented 3 years ago

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No Proof of Concept
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit
high severity 876/1000
Why? Mature exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No Mature
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit
high severity 704/1000
Why? Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72445
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72446
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72447
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72882
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72883
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit
high severity 630/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72884
org.apache.spark:spark-core_2.11:
2.4.4 -> 2.4.5
org.apache.spark:spark-sql_2.11:
2.4.4 -> 2.4.5
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: šŸ§ View latest project report

šŸ›  Adjust project settings

šŸ“š Read more about Snyk's upgrade and patch logic