Skip to content

[Snyk] Fix for 11 vulnerabilities

Ghost User requested to merge snyk-fix-7c6a758e477696fa1a1c44ca7ae65285 into master

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this Merge Request

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml
    • runner/asqatasun-runner/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
medium severity 529/1000
Why? Has a fix available, CVSS 6.3
Privilege Escalation
SNYK-JAVA-MYSQL-174574
mysql:mysql-connector-java:
5.1.48 -> 8.0.28
Yes No Known Exploit
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
XML External Entity (XXE) Injection
SNYK-JAVA-MYSQL-1766958
mysql:mysql-connector-java:
5.1.48 -> 8.0.28
Yes Proof of Concept
medium severity 544/1000
Why? Has a fix available, CVSS 6.6
Improper Authorization
SNYK-JAVA-MYSQL-2386864
mysql:mysql-connector-java:
5.1.48 -> 8.0.28
Yes No Known Exploit
high severity 654/1000
Why? Has a fix available, CVSS 8.8
Access Control Bypass
SNYK-JAVA-MYSQL-451464
mysql:mysql-connector-java:
5.1.48 -> 8.0.28
Yes No Known Exploit
high severity 614/1000
Why? Has a fix available, CVSS 8
Remote Code Execution (RCE)
SNYK-JAVA-ORGHSQLDB-3040860
org.hsqldb:hsqldb:
2.5.1 -> 2.7.1
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Locking
SNYK-JAVA-ORGJETBRAINSKOTLIN-2628385
org.jetbrains.kotlin:kotlin-stdlib-jdk8:
1.3.61 -> 1.6.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGYAML-2806360
org.yaml:snakeyaml:
1.26 -> 1.32
No No Known Exploit
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016888
org.yaml:snakeyaml:
1.26 -> 1.32
No Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016889
org.yaml:snakeyaml:
1.26 -> 1.32
No No Known Exploit
medium severity 536/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 4.3
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016891
org.yaml:snakeyaml:
1.26 -> 1.32
No Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3113851
org.yaml:snakeyaml:
1.26 -> 1.32
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this Merge Request to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 XML External Entity (XXE) Injection 🦉 Remote Code Execution (RCE) 🦉 Denial of Service (DoS)

Merge request reports