Conversation
…ilities The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JAVA-IOUNDERTOW-14908846 - https://snyk.io/vuln/SNYK-JAVA-IOUNDERTOW-15053841 - https://snyk.io/vuln/SNYK-JAVA-IOUNDERTOW-7433721
|
The upgrade of
Recommendation: A direct upgrade is not feasible. This requires a complete migration effort, treating it as an adoption of a new framework. Developers must consult the
|
|
| Status | Scanner | Total (0) | ||||
|---|---|---|---|---|---|---|
| Open Source Security | 0 | 0 | 0 | 0 | See details | |
| Licenses | 0 | 0 | 0 | 0 | See details | |
| ✅ | Code Security | 0 | 0 | 0 | 0 | 0 issues |
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.
Snyk has created this PR to fix 3 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
samples/server/petstore/java-undertow/pom.xmlVulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-IOUNDERTOW-14908846
2.3.17.Final->2.3.21.FinalNo Path FoundNo Known ExploitSNYK-JAVA-IOUNDERTOW-15053841
0.1.1->1.5.26com.networknt:info:
0.1.1->1.5.26com.networknt:security:
0.1.1->1.5.26com.networknt:server:
0.1.1->1.5.26io.undertow:undertow-core:
2.3.17.Final->2.3.21.FinalMajor version upgradeNo Path FoundNo Known ExploitSNYK-JAVA-IOUNDERTOW-7433721
0.1.1->1.5.26com.networknt:info:
0.1.1->1.5.26com.networknt:security:
0.1.1->1.5.26com.networknt:server:
0.1.1->1.5.26io.undertow:undertow-core:
2.3.17.Final->2.3.21.FinalMajor version upgradeNo Path FoundNo Known ExploitImportant
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Allocation of Resources Without Limits or Throttling
🦉 Memory Leak