Closed BewareMyPower closed 6 months ago
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.
@BewareMyPower:Thanks for your contribution. For this PR, do we need to update docs? (The PR template contains info about doc, which helps others know more about the changes. Can you provide doc-related info in this and future PR descriptions? Thanks)
Merging #2021 (5e92f77) into master (db4a9ad) will not change coverage. The diff coverage is
n/a
.
@@ Coverage Diff @@
## master #2021 +/- ##
=========================================
Coverage 16.98% 16.98%
Complexity 730 730
=========================================
Files 191 191
Lines 14309 14309
Branches 1339 1339
=========================================
Hits 2430 2430
Misses 11703 11703
Partials 176 176
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.
#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - pom.xml #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000****Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Improper Handling of Length Parameter Inconsistency
[SNYK-JAVA-ORGECLIPSEJETTY-5902998](https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-5902998) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.0.1.5`
| No | Proof of Concept ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **496/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 3.5 | Arbitrary Code Execution
[SNYK-JAVA-ORGECLIPSEJETTY-5903003](https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-5903003) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.0.1.5`
| No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **661/1000**
**Why?** Recently disclosed, Has a fix available, CVSS 7.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGECLIPSEJETTY-5958847](https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-5958847) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.0.1.5`
| No | No Known Exploit (*) Note that the real score may have changed since the PR was raised. Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/bewaremypower/project/745a6ec8-e389-42d3-b151-42e0855cc54d?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/bewaremypower/project/745a6ec8-e389-42d3-b151-42e0855cc54d?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"2cee3abd-ff07-477a-9690-18ffc96e9d80","prPublicId":"2cee3abd-ff07-477a-9690-18ffc96e9d80","dependencies":[{"name":"io.streamnative:pulsar-broker","from":"3.0.0.1","to":"3.0.1.5"}],"packageManager":"maven","projectPublicId":"745a6ec8-e389-42d3-b151-42e0855cc54d","projectUrl":"https://app.snyk.io/org/bewaremypower/project/745a6ec8-e389-42d3-b151-42e0855cc54d?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JAVA-ORGECLIPSEJETTY-5902998","SNYK-JAVA-ORGECLIPSEJETTY-5958847","SNYK-JAVA-ORGECLIPSEJETTY-5903003"],"upgrade":["SNYK-JAVA-ORGECLIPSEJETTY-5902998","SNYK-JAVA-ORGECLIPSEJETTY-5903003","SNYK-JAVA-ORGECLIPSEJETTY-5958847"],"isBreakingChange":false,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[586,661,496],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Denial of Service (DoS)](https://learn.snyk.io/lesson/redos/?loc=fix-pr)