Skip to content
This repository has been archived by the owner on Oct 23, 2023. It is now read-only.

[Snyk] Upgrade com.amazonaws:aws-java-sdk-s3 from 1.11.23 to 1.11.891 #25

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

snyk-bot
Copy link

Snyk has created this PR to upgrade com.amazonaws:aws-java-sdk-s3 from 1.11.23 to 1.11.891.

✨ Snyk has automatically assigned this pull request, set who gets assigned.
ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 867 versions ahead of your current version.
  • The recommended version was released 22 days ago, on 2020-10-29.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72884
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72883
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72882
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72451
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72450
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72449
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72448
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72447
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72446
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-72445
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106
630/1000
Why? Has a fix available, CVSS 8.1
Proof of Concept
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015
630/1000
Why? Has a fix available, CVSS 8.1
Mature
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31573
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736
630/1000
Why? Has a fix available, CVSS 8.1
Proof of Concept
Directory Traversal
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
630/1000
Why? Has a fix available, CVSS 8.1
No Known Exploit

(*) Note that the real score may have changed since the PR was raised.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

👩‍💻 Set who automatically gets assigned

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant