CVE-2020-15522 5.9 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability pending CVSS allocation
Cxa9261daf-3755 9.8 Vulnerability with high severity found
Update log4j to address:
CVE-2019-17571 9.8 Deserialization of Untrusted Data vulnerability pending CVSS allocation
CVE-2021-4104 7.5 Deserialization of Untrusted Data vulnerability with medium severity found
CVE-2022-23302 8.8 Deserialization of Untrusted Data vulnerability pending CVSS allocation
CVE-2022-23305 9.8 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability pending CVSS allocation
CVE-2022-23307 8.8 Deserialization of Untrusted Data vulnerability pending CVSS allocation
Description
Update IBM MQ
allclient
to address:CVE-2020-15522 5.9 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability pending CVSS allocation Cxa9261daf-3755 9.8 Vulnerability with high severity found
Update
log4j
to address:CVE-2019-17571 9.8 Deserialization of Untrusted Data vulnerability pending CVSS allocation CVE-2021-4104 7.5 Deserialization of Untrusted Data vulnerability with medium severity found CVE-2022-23302 8.8 Deserialization of Untrusted Data vulnerability pending CVSS allocation CVE-2022-23305 9.8 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability pending CVSS allocation CVE-2022-23307 8.8 Deserialization of Untrusted Data vulnerability pending CVSS allocation
Update
testcontainers
andjunit
to be in the same version as https://github.com/ibm-messaging/kafka-connect-mq-source connectorFixes #61
Type of change
Please delete options that are not relevant.
How Has This Been Tested?
Checklist