Skip to content

Conversation

@amgir
Copy link
Owner

@amgir amgir commented Sep 13, 2025

snyk-top-banner

Snyk has created this PR to fix 22 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • spring-cloud-dataflow-dependencies/pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
high severity Open Redirect
SNYK-JAVA-ORGSPRINGFRAMEWORK-6261586
  676   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
Proof of Concept
medium severity Arbitrary Code Execution
SNYK-JAVA-ORGYAML-3152153
  651   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
Proof of Concept
high severity Relative Path Traversal
SNYK-JAVA-ORGSPRINGFRAMEWORK-12008931
  624   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
medium severity Open Redirect
SNYK-JAVA-ORGSPRINGFRAMEWORK-6597980
  591   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-ORGYAML-2806360
  589   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGYAML-6056527
  589   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-CHQOSLOGBACK-6094942
  569   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-CHQOSLOGBACK-6094943
  569   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
high severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JAVA-CHQOSLOGBACK-6097492
  569   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
high severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JAVA-CHQOSLOGBACK-6097493
  569   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
high severity Open Redirect
SNYK-JAVA-ORGSPRINGFRAMEWORK-6444790
  569   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-7687447
  559   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
medium severity Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016891
  536   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
Proof of Concept
medium severity Improper Neutralization of Special Elements
SNYK-JAVA-CHQOSLOGBACK-8539866
  509   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
medium severity Improper Neutralization of Special Elements
SNYK-JAVA-CHQOSLOGBACK-8539867
  509   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
low severity Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016888
  506   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
Proof of Concept
low severity Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016889
  399   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
low severity Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3113851
  399   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
low severity Server-side Request Forgery (SSRF)
SNYK-JAVA-CHQOSLOGBACK-8539865
  334   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
low severity Improper Handling of Case Sensitivity
SNYK-JAVA-ORGSPRINGFRAMEWORK-8230364
  329   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
low severity Improper Handling of Case Sensitivity
SNYK-JAVA-ORGSPRINGFRAMEWORK-8230365
  329   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit
low severity Improper Handling of Case Sensitivity
SNYK-JAVA-ORGSPRINGFRAMEWORK-8230366
  329   org.springframework.cloud:spring-cloud-dataflow-shell-core:
1.1.0.BUILD-SNAPSHOT -> 2.1.2.RELEASE
No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Denial of Service (DoS)
🦉 Server-side Request Forgery (SSRF)
🦉 Open Redirect
🦉 More lessons are available in Snyk Learn

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants