Skip to content

[Snyk] Fix for 20 vulnerabilities

Ghost User requested to merge snyk-fix-72befbe994c52dc03b222926a9801b60 into master

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this Merge Request

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml
    • engine/scenarioloader/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 624/1000
Why? Has a fix available, CVSS 8.2
XML External Entity (XXE) Injection
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302
com.fasterxml.jackson.module:jackson-module-kotlin:
2.10.3 -> 2.14.0
No No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698
com.fasterxml.jackson.module:jackson-module-kotlin:
2.10.3 -> 2.14.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244
com.fasterxml.jackson.module:jackson-module-kotlin:
2.10.3 -> 2.14.0
No No Known Exploit
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424
com.fasterxml.jackson.module:jackson-module-kotlin:
2.10.3 -> 2.14.0
No Proof of Concept
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426
com.fasterxml.jackson.module:jackson-module-kotlin:
2.10.3 -> 2.14.0
No Proof of Concept
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLECODEGSON-1730327
jp.vmi:selenese-runner-java:
3.30.0 -> 4.0.0
Yes No Known Exploit
low severity 486/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.3
Information Disclosure
SNYK-JAVA-COMGOOGLEGUAVA-1015415
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No Proof of Concept
high severity 731/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.2
Information Exposure
SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No Proof of Concept
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Denial of Service (DoS)
SNYK-JAVA-IONETTY-1020439
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1070799
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082234
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082235
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082236
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082238
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 724/1000
Why? Mature exploit, Has a fix available, CVSS 5.9
HTTP Request Smuggling
SNYK-JAVA-IONETTY-1317097
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No Mature
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584063
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584064
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
HTTP Request Smuggling
SNYK-JAVA-IONETTY-2314893
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 489/1000
Why? Has a fix available, CVSS 5.5
Information Exposure
SNYK-JAVA-IONETTY-2812456
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Locking
SNYK-JAVA-ORGJETBRAINSKOTLIN-2628385
org.jetbrains.kotlin:kotlin-stdlib:
1.5.32 -> 1.6.0
org.jetbrains.kotlin:kotlin-reflect:
1.5.32 -> 1.6.0
org.jetbrains.kotlin:kotlin-stdlib-jdk8:
1.5.32 -> 1.6.0
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this Merge Request to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 XML External Entity (XXE) Injection 🦉 Denial of Service (DoS) 🦉 Denial of Service (DoS) 🦉 More lessons are available in Snyk Learn

Merge request reports