New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Snyk] Security upgrade org.kie:kie-spring from 7.55.0.Final to 7.68.0.Final #47
Conversation
Release 6.0.4
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828 - https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
This PR has Quantification details
Why proper sizing of changes matters
Optimal pull request sizes drive a better predictable PR flow as they strike a
What can I do to optimize my changes
How to interpret the change counts in git diff output
Was this comment helpful? 馃憤 聽:ok_hand: 聽:thumbsdown: (Email) |
Kudos, SonarCloud Quality Gate passed!聽 聽 0 Bugs No Coverage information |
Vulnerabilities fix is on PR #48 |
DONE in #48 |
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.
Changes included in this PR
Vulnerabilities that will be fixed
With an upgrade:
Why? Recently disclosed, Has a fix available, CVSS 5.3
SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
org.kie:kie-spring:
7.55.0.Final -> 7.68.0.Final
Why? Currently trending on Twitter, Mature exploit, Recently disclosed, Has a fix available, CVSS 9.8
SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
org.kie:kie-spring:
7.55.0.Final -> 7.68.0.Final
(*) Note that the real score may have changed since the PR was raised.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
馃 View latest project report
馃洜 Adjust project settings
馃摎 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
馃 Remote Code Execution