This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to upgrade org.apache.maven:maven-model from 3.5.4 to 3.9.6.
:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
- The recommended version is **19 versions** ahead of your current version.
- The recommended version was released **22 days ago**, on 2023-11-28.
The recommended version fixes:
Severity | Issue | PriorityScore (*) | Exploit Maturity |
:-------------------------:|:-------------------------|-------------------------|:-------------------------
| Deserialization of Untrusted Data [SNYK-JAVA-COMGOOGLEGUAVA-32236](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-32236) | **509/1000** **Why?** Has a fix available, CVSS 5.9 | No Known Exploit
| Directory Traversal [SNYK-JAVA-COMMONSIO-1277109](https://snyk.io/vuln/SNYK-JAVA-COMMONSIO-1277109) | **509/1000** **Why?** Has a fix available, CVSS 5.9 | Mature
| Information Disclosure [SNYK-JAVA-COMGOOGLEGUAVA-1015415](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415) | **509/1000** **Why?** Has a fix available, CVSS 5.9 | Proof of Concept
| Creation of Temporary File in Directory with Insecure Permissions [SNYK-JAVA-COMGOOGLEGUAVA-5710356](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356) | **509/1000** **Why?** Has a fix available, CVSS 5.9 | No Known Exploit
| Command Injection [SNYK-JAVA-ORGAPACHEMAVENSHARED-570592](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMAVENSHARED-570592) | **509/1000** **Why?** Has a fix available, CVSS 5.9 | No Known Exploit
(*) Note that the real score may have changed since the PR was raised.
**Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.*
For more information:
🧐 [View latest project report](https://app.snyk.io/org/chonton/project/54303b1e-b8f1-43f3-a380-b6df4d0b41e5?utm_source=github&utm_medium=referral&page=upgrade-pr)
🛠 [Adjust upgrade PR settings](https://app.snyk.io/org/chonton/project/54303b1e-b8f1-43f3-a380-b6df4d0b41e5/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr)
🔕 [Ignore this dependency or unsubscribe from future upgrade PRs](https://app.snyk.io/org/chonton/project/54303b1e-b8f1-43f3-a380-b6df4d0b41e5/settings/integration?pkg=org.apache.maven:maven-model&utm_source=github&utm_medium=referral&page=upgrade-pr#auto-dep-upgrades)
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to upgrade org.apache.maven:maven-model from 3.5.4 to 3.9.6.
:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.- The recommended version is **19 versions** ahead of your current version. - The recommended version was released **22 days ago**, on 2023-11-28. The recommended version fixes: Severity | Issue | PriorityScore (*) | Exploit Maturity | :-------------------------:|:-------------------------|-------------------------|:------------------------- | Deserialization of Untrusted Data
[SNYK-JAVA-COMGOOGLEGUAVA-32236](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-32236) | **509/1000**
**Why?** Has a fix available, CVSS 5.9 | No Known Exploit | Directory Traversal
[SNYK-JAVA-COMMONSIO-1277109](https://snyk.io/vuln/SNYK-JAVA-COMMONSIO-1277109) | **509/1000**
**Why?** Has a fix available, CVSS 5.9 | Mature | Information Disclosure
[SNYK-JAVA-COMGOOGLEGUAVA-1015415](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415) | **509/1000**
**Why?** Has a fix available, CVSS 5.9 | Proof of Concept | Creation of Temporary File in Directory with Insecure Permissions
[SNYK-JAVA-COMGOOGLEGUAVA-5710356](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356) | **509/1000**
**Why?** Has a fix available, CVSS 5.9 | No Known Exploit | Command Injection
[SNYK-JAVA-ORGAPACHEMAVENSHARED-570592](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMAVENSHARED-570592) | **509/1000**
**Why?** Has a fix available, CVSS 5.9 | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
**Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/chonton/project/54303b1e-b8f1-43f3-a380-b6df4d0b41e5?utm_source=github&utm_medium=referral&page=upgrade-pr) 🛠 [Adjust upgrade PR settings](https://app.snyk.io/org/chonton/project/54303b1e-b8f1-43f3-a380-b6df4d0b41e5/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr) 🔕 [Ignore this dependency or unsubscribe from future upgrade PRs](https://app.snyk.io/org/chonton/project/54303b1e-b8f1-43f3-a380-b6df4d0b41e5/settings/integration?pkg=org.apache.maven:maven-model&utm_source=github&utm_medium=referral&page=upgrade-pr#auto-dep-upgrades)