Skip to content

Conversation

@jswheeler
Copy link

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

As this is a private repository, Snyk-bot does not have access. Therefore, this PR has been created automatically, but appears to have been created by a real user.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • service/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity Reachability
medium severity 390/1000
Why? Has a fix available, CVSS 4.8
Insufficient Hostname Verification
SNYK-JAVA-CHQOSLOGBACK-1726923
ch.qos.logback:logback-classic:
1.1.7 -> 1.2.7
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
critical severity 640/1000
Why? Has a fix available, CVSS 9.8
Arbitrary Code Execution
SNYK-JAVA-CHQOSLOGBACK-173711
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
critical severity 640/1000
Why? Has a fix available, CVSS 9.8
Arbitrary Code Execution
SNYK-JAVA-CHQOSLOGBACK-30208
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1047324
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31573
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-32043
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-32044
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-32111
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 705/1000
Why? Mature exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Mature No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 675/1000
Why? Mature exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Mature No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-548451
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-559094
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-560762
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-560766
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561362
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561373
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561585
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561586
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561587
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-564887
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-564888
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-608664
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72445
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72446
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72447
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72448
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72449
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72450
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72451
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72882
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72883
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72884
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 525/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
No No Known Exploit No Path Found
high severity 525/1000
Why? Has a fix available, CVSS 7.5
Improper Input Validation
SNYK-JAVA-COMFASTERXMLJACKSONDATATYPE-173759
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Improper Input Validation
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-1048058
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
No No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Directory Traversal
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
com.amazonaws:aws-java-sdk:
1.10.77 -> 1.12.129
No No Known Exploit No Path Found
high severity 615/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
Privilege Escalation
SNYK-JAVA-ORGECLIPSEJETTY-1021614
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 600/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-1090340
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-1300835
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
low severity 295/1000
Why? Has a fix available, CVSS 2.9
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-1313686
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
medium severity 505/1000
Why? Mature exploit, Has a fix available, CVSS 4.7
Cross-site Scripting (XSS)
SNYK-JAVA-ORGECLIPSEJETTY-174479
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Mature No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-174560
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 525/1000
Why? Has a fix available, CVSS 7.5
Timing Attack
SNYK-JAVA-ORGECLIPSEJETTY-32151
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 525/1000
Why? Has a fix available, CVSS 7.5
Web Cache Poisoning
SNYK-JAVA-ORGECLIPSEJETTY-32383
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
critical severity 640/1000
Why? Has a fix available, CVSS 9.8
Authorization Bypass
SNYK-JAVA-ORGECLIPSEJETTY-32385
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 525/1000
Why? Has a fix available, CVSS 7.5
Web Cache Poisoning
SNYK-JAVA-ORGECLIPSEJETTY-460763
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-461008
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-461009
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
medium severity 505/1000
Why? Mature exploit, Has a fix available, CVSS 4.7
Cross-site Scripting (XSS)
SNYK-JAVA-ORGECLIPSEJETTY-480557
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Mature No Path Found
medium severity 485/1000
Why? Mature exploit, Has a fix available, CVSS 4.3
Directory Traversal
SNYK-JAVA-ORGELASTICSEARCH-31128
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Mature No Path Found
high severity 525/1000
Why? Has a fix available, CVSS 7.5
Arbitrary Code Execution
SNYK-JAVA-ORGELASTICSEARCH-31129
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
critical severity 760/1000
Why? Mature exploit, Has a fix available, CVSS 9.8
Arbitrary Code Execution
SNYK-JAVA-ORGELASTICSEARCH-31130
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Mature No Path Found
medium severity 490/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Directory Traversal
SNYK-JAVA-ORGELASTICSEARCH-31131
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No Proof of Concept No Path Found
high severity 525/1000
Why? Has a fix available, CVSS 7.5
XML Entity Expansion
SNYK-JAVA-ORGGLASSFISHJERSEYMEDIA-595972
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
high severity 500/1000
Why? Has a fix available, CVSS 7
Arbitrary Code Execution
SNYK-JAVA-ORGHIBERNATE-451605
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Improper Input Validation
SNYK-JAVA-ORGHIBERNATE-568162
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found
medium severity 483/1000
Why? Has a fix available, CVSS 6.5
Cross-site Scripting (XSS)
SNYK-JAVA-ORGHIBERNATE-569100
io.dropwizard.modules:dropwizard-elasticsearch:
0.8.0-1 -> 0.9.0-1
No No Known Exploit No Path Found

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-1726923
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-173711
- https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-30208
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1047324
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31573
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-32043
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-32044
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-32111
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-548451
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-559094
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-560762
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-560766
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561362
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561373
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561585
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561586
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561587
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-564887
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-564888
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-608664
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72445
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72446
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72447
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72448
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72449
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72450
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72451
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72882
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72883
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-72884
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATATYPE-173759
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-1048058
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-1021614
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-1090340
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-1300835
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-1313686
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-174479
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-174560
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-32151
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-32383
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-32385
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-460763
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-461008
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-461009
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-480557
- https://snyk.io/vuln/SNYK-JAVA-ORGELASTICSEARCH-31128
- https://snyk.io/vuln/SNYK-JAVA-ORGELASTICSEARCH-31129
- https://snyk.io/vuln/SNYK-JAVA-ORGELASTICSEARCH-31130
- https://snyk.io/vuln/SNYK-JAVA-ORGELASTICSEARCH-31131
- https://snyk.io/vuln/SNYK-JAVA-ORGGLASSFISHJERSEYMEDIA-595972
- https://snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-451605
- https://snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-568162
- https://snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-569100
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants