Skip to content

[Snyk] Security upgrade com.amazonaws:aws-java-sdk-dynamodb from 1.9.40 to 1.12.153#48

Open
snyk-bot wants to merge 1 commit intomasterfrom
snyk-fix-dbe7714ffc9c90425cd35e262b9c0e39
Open

[Snyk] Security upgrade com.amazonaws:aws-java-sdk-dynamodb from 1.9.40 to 1.12.153#48
snyk-bot wants to merge 1 commit intomasterfrom
snyk-fix-dbe7714ffc9c90425cd35e262b9c0e39

Conversation

@snyk-bot
Copy link
Copy Markdown

@snyk-bot snyk-bot commented Feb 5, 2022

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • savvyconsumer/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity Reachability
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Proof of Concept No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Proof of Concept No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 563/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Proof of Concept No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Proof of Concept No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31519
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31520
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-32043
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Proof of Concept No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-32044
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-32111
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 630/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Proof of Concept No Path Found
high severity 705/1000
Why? Mature exploit, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No Mature No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found
high severity 555/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500
com.amazonaws:aws-java-sdk-dynamodb:
1.9.40 -> 1.12.153
No No Known Exploit No Path Found

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31519
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31520
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-32043
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-32044
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-32111
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant