Skip to content

Conversation

@maximejf42
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade org.eclipse.jetty:jetty-client from 9.2.3.v20140905 to 9.4.54.v20240208.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 154 versions ahead of your current version.
  • The recommended version was released 3 months ago, on 2024-02-08.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Privilege Escalation
SNYK-JAVA-ORGECLIPSEJETTY-1021614
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
Proof of Concept
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-1090340
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
Proof of Concept
Web Cache Poisoning
SNYK-JAVA-ORGECLIPSEJETTY-460763
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Timing Attack
SNYK-JAVA-ORGECLIPSEJETTY-32151
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-30090
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
Mature
Web Cache Poisoning
SNYK-JAVA-ORGECLIPSEJETTY-32383
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-174560
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Cross-site Scripting (XSS)
SNYK-JAVA-ORGECLIPSEJETTY-480557
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
Mature
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-5426159
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-5426160
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-1313686
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Authorization Bypass
SNYK-JAVA-ORGECLIPSEJETTY-32385
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Cross-site Scripting (XSS)
SNYK-JAVA-ORGECLIPSEJETTY-174479
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
Mature
Improper Handling of Length Parameter Inconsistency
SNYK-JAVA-ORGECLIPSEJETTY-5902998
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
Proof of Concept
Improper Input Validation
SNYK-JAVA-ORGECLIPSEJETTY-2945454
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
XML External Entity (XXE) Injection
SNYK-JAVA-ORGECLIPSEJETTY-5769685
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Improper Input Validation
SNYK-JAVA-ORGECLIPSEJETTY-2945452
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-5426161
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Improper Input Validation
SNYK-JAVA-ORGECLIPSEJETTY-2945453
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit
Authorization Bypass
SNYK-JAVA-ORGECLIPSEJETTY-32384
711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
No Known Exploit

(*) Note that the real score may have changed since the PR was raised.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants