[Snyk] Upgrade com.thoughtworks.xstream:xstream from 1.4.5 to 1.4.20#20
[Snyk] Upgrade com.thoughtworks.xstream:xstream from 1.4.5 to 1.4.20#20
Conversation
Snyk has created this PR to upgrade com.thoughtworks.xstream:xstream from 1.4.5 to 1.4.20. See this package in maven: com.thoughtworks.xstream:xstream See this project in Snyk: https://app.snyk.io/org/intrapus/project/58f96adb-afa5-4e57-b092-aff17f79f4b6?utm_source=github&utm_medium=referral&page=upgrade-pr
Micro-Learning Topic: Denial of service (Detected by phrase)Matched on "Denial of Service"The Denial of Service (DoS) attack is focused on making a resource (site, application, server) unavailable for the purpose it was designed. There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical, or resources handling vulnerabilities, among others. Source: https://www.owasp.org/index.php/Denial_of_Service Try a challenge in Secure Code WarriorMicro-Learning Topic: Deserialization of untrusted data (Detected by phrase)Matched on "Deserialization of Untrusted Data"It is often convenient to serialize objects for communication or to save them for later use. However, serialized data or code can be modified. This malformed data or unexpected data could be used to abuse application logic, deny service, or execute arbitrary code when deserialized. This is usually done with "gadget chains Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Server-side request forgery (Detected by phrase)Matched on "Server-Side Request Forgery"Server-Side Request Forgery (SSRF) vulnerabilities are caused when an attacker can supply or modify a URL that reads or sends data to the server. The attacker can create a malicious request with a manipulated URL, when this request reaches the server, the server-side code executes the exploit URL causing the attacker to be able to read data from services that shouldn't be exposed. Try a challenge in Secure Code WarriorMicro-Learning Topic: External entity injection (Detected by phrase)Matched on "XXE"An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server-side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts. Try a challenge in Secure Code WarriorHelpful references
|
This PR was automatically created by Snyk using the credentials of a real user.

Snyk has created this PR to upgrade com.thoughtworks.xstream:xstream from 1.4.5 to 1.4.20.
ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
The recommended version is 22 versions ahead of your current version.
The recommended version was released on 2 years ago.
Issues fixed by the recommended upgrade:
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569187
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569190
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569176
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569177
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569178
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569179
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569180
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569181
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569182
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569183
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569185
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569186
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569191
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-2388977
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-30385
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-31394
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088337
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1040458
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569189
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088330
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088331
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088332
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088333
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088334
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088335
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-460764
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088336
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088338
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1294540
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051966
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051967
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088328
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088329
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.
For more information: