Skip to content

[Snyk] Upgrade com.sparkjava:spark-core from 2.7.2 to 2.9.4 #10

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

snyk-bot
Copy link

Snyk has created this PR to upgrade com.sparkjava:spark-core from 2.7.2 to 2.9.4.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 6 versions ahead of your current version.
  • The recommended version was released a month ago, on 2022-07-10.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-461008
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Authorization Bypass
SNYK-JAVA-ORGECLIPSEJETTY-32384
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Web Cache Poisoning
SNYK-JAVA-ORGECLIPSEJETTY-32383
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-1090340
415/1000
Why? Has a fix available, CVSS 5.3
Proof of Concept
Web Cache Poisoning
SNYK-JAVA-ORGECLIPSEJETTY-460763
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Session Hijacking
SNYK-JAVA-ORGECLIPSEJETTY-32381
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Privilege Escalation
SNYK-JAVA-ORGECLIPSEJETTY-1021614
415/1000
Why? Has a fix available, CVSS 5.3
Proof of Concept
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-461009
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-174560
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-1080611
415/1000
Why? Has a fix available, CVSS 5.3
Proof of Concept
HTTP Request Smuggling
SNYK-JAVA-ORGECLIPSEJETTY-1047304
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Improper Input Validation
SNYK-JAVA-ORGECLIPSEJETTY-2945453
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Improper Input Validation
SNYK-JAVA-ORGECLIPSEJETTY-2945452
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Authorization Bypass
SNYK-JAVA-ORGECLIPSEJETTY-32385
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-1313686
415/1000
Why? Has a fix available, CVSS 5.3
No Known Exploit

(*) Note that the real score may have changed since the PR was raised.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant