Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to fix 62 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
todolist-goof/todolist-web-struts/pom.xml
todolist-goof/pom.xml
Vulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720
2.7
->2.13.2
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTS-30207
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTS-1049003
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTS-30772
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTS-6102825
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Mature
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-31409
2.7
->2.13.2
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTS-31503
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTS-608097
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Mature
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2320014
2.7
->2.13.2
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTS-30770
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTS-31495
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTS-32477
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Mature
SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611
2.3.20
->6.1.2
No Path Found
Mature
SNYK-JAVA-COMMONSFILEUPLOAD-30401
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-30771
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-30778
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-451610
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-2635340
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Proof of Concept
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2321524
2.7
->2.13.2
No Path Found
Proof of Concept
SNYK-JAVA-ORGAPACHESTRUTS-608098
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
Proof of Concept
SNYK-JAVA-ORGFREEMARKER-1076795
2.3.20
->6.1.2
No Path Found
Proof of Concept
SNYK-JAVA-ORGAPACHESTRUTS-30774
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-609765
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTSXWORK-5811864
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-30163
3.2.6.RELEASE
->5.3.38
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-1009832
3.2.6.RELEASE
->5.3.38
Major version upgrade
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-30165
3.2.6.RELEASE
->5.3.38
No Path Found
No Known Exploit
SNYK-JAVA-ORGZEROTURNAROUND-31681
1.12
->1.13
Reachable
No Known Exploit
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339
2.7
->2.13.2
No Path Found
Proof of Concept
SNYK-JAVA-COMMONSIO-1277109
2.3.20
->6.1.2
Major version upgrade
No Path Found
Mature
SNYK-JAVA-COMMONSFILEUPLOAD-30082
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-30060
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-30775
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-30776
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-31500
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-31501
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-31502
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-6261586
3.2.6.RELEASE
->5.3.38
Major version upgrade
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-6444790
3.2.6.RELEASE
->5.3.38
Major version upgrade
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-7687447
3.2.6.RELEASE
->5.3.38
Major version upgrade
No Path Found
No Known Exploit
SNYK-JAVA-COMMONSFILEUPLOAD-31540
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-COMMONSFILEUPLOAD-3326457
2.3.20
->6.1.2
Major version upgrade
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-5422217
3.2.6.RELEASE
->5.3.38
Major version upgrade
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-31331
3.2.6.RELEASE
->5.3.38
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-30773
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-30164
3.2.6.RELEASE
->5.3.38
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-6597980
3.2.6.RELEASE
->5.3.38
Major version upgrade
No Path Found
No Known Exploit
SNYK-JAVA-OGNL-30474
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-460223
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-6100744
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804
2.3.20
->6.1.2
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
3.2.6.RELEASE
->5.3.38
Major version upgrade
No Path Found
No Known Exploit
SNYK-JAVA-ORGSPRINGFRAMEWORK-3369749
3.2.6.RELEASE
->5.3.38
Major version upgrade
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHESTRUTS-5707101
2.3.20
->6.1.2
org.apache.struts:struts2-spring-plugin:
2.3.20
->2.5.33
No Path Found
No Known Exploit
SNYK-JAVA-ORGAPACHELOGGINGLOG4J-567761
2.7
->2.13.2
No Path Found
No Known Exploit
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Denial of Service (DoS)
🦉 Arbitrary Code Execution
🦉 Denial of Service (DoS)
🦉 More lessons are available in Snyk Learn
[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"org.apache.logging.log4j:log4j-core","from":"2.7","to":"2.13.2"},{"name":"org.apache.struts:struts2-core","from":"2.3.20","to":"6.1.2"},{"name":"org.apache.struts:struts2-spring-plugin","from":"2.3.20","to":"2.5.33"},{"name":"org.springframework:spring-web","from":"3.2.6.RELEASE","to":"5.3.38"},{"name":"org.zeroturnaround:zt-zip","from":"1.12","to":"1.13"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMMONSFILEUPLOAD-30082","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMMONSFILEUPLOAD-30401","priority_score":640,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMMONSFILEUPLOAD-31540","priority_score":475,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMMONSFILEUPLOAD-3326457","priority_score":475,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-COMMONSIO-1277109","priority_score":535,"priority_score_factors":[{"type":"exploit","label":"Functional","score":120},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Directory Traversal"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-COMMONSIO-1277109","priority_score":535,"priority_score_factors":[{"type":"exploit","label":"Functional","score":120},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Directory Traversal"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-OGNL-30474","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-OGNL-30474","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720","priority_score":800,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"10","score":500},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2320014","priority_score":750,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9","score":450},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2321524","priority_score":600,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":75},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339","priority_score":555,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":75},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"6.6","score":330},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Arbitrary Code Execution"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHELOGGINGLOG4J-31409","priority_score":760,"priority_score_factors":[{"type":"exploit","label":"Functional","score":120},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Deserialization of Untrusted Data"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHELOGGINGLOG4J-567761","priority_score":335,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Man-in-the-Middle (MitM)"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-1049003","priority_score":790,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-ORGAPACHESTRUTS-2635340","priority_score":630,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":75},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30060","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Manipulation of Struts' internals"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-30207","priority_score":800,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"10","score":500},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-30770","priority_score":705,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Command Injection"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30771","priority_score":640,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-30772","priority_score":790,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Command Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30773","priority_score":455,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Scripting (XSS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30774","priority_score":590,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Cross-site Request Forgery (CSRF)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30775","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Access Restriction Bypass"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30776","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Access Restriction Bypass"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30778","priority_score":640,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Directory Traversal"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-31495","priority_score":705,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary Command Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-31500","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-31501","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-31502","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-31503","priority_score":760,"priority_score_factors":[{"type":"exploit","label":"Functional","score":120},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-32477","priority_score":705,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Remote Code Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-451610","priority_score":640,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Improper Action Name Cleanup"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-460223","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-5707101","priority_score":365,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"4.3","score":215},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Allocation of Resources Without Limits or Throttling"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-608097","priority_score":760,"priority_score_factors":[{"type":"exploit","label":"Functional","score":120},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-ORGAPACHESTRUTS-608098","priority_score":600,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":75},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-609765","priority_score":590,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Unrestricted Upload of File with Dangerous Type"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-6100744","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-6102825","priority_score":790,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-1049003","priority_score":790,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-ORGAPACHESTRUTS-2635340","priority_score":630,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":75},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30060","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Manipulation of Struts' internals"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-30207","priority_score":800,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"10","score":500},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-30770","priority_score":705,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Command Injection"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30771","priority_score":640,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-30772","priority_score":790,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Command Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30773","priority_score":455,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Scripting (XSS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30774","priority_score":590,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Cross-site Request Forgery (CSRF)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30775","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Access Restriction Bypass"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30776","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Access Restriction Bypass"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-30778","priority_score":640,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Directory Traversal"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-31495","priority_score":705,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary Command Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-31500","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-31501","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-31502","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-31503","priority_score":760,"priority_score_factors":[{"type":"exploit","label":"Functional","score":120},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-32477","priority_score":705,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Remote Code Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-451610","priority_score":640,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Improper Action Name Cleanup"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-460223","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-5707101","priority_score":365,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"4.3","score":215},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Allocation of Resources Without Limits or Throttling"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-608097","priority_score":760,"priority_score_factors":[{"type":"exploit","label":"Functional","score":120},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-ORGAPACHESTRUTS-608098","priority_score":600,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":75},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-609765","priority_score":590,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Unrestricted Upload of File with Dangerous Type"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTS-6100744","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTS-6102825","priority_score":790,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Parameter Alteration"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799","priority_score":590,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Input Validation"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800","priority_score":455,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Scripting (XSS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Input Validation"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802","priority_score":525,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Access Restriction Bypass"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803","priority_score":590,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary Code Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"Mature","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611","priority_score":705,"priority_score_factors":[{"type":"exploit","label":"High","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Command Injection"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418","priority_score":515,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Insecure Defaults"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-5811864","priority_score":590,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Input Validation"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-ORGFREEMARKER-1076795","priority_score":600,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":75},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Server-side Template Injection (SSTI)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-1009832","priority_score":580,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Input Validation"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-30163","priority_score":590,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.8","score":440},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"XML External Entity (XXE) Injection"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-30164","priority_score":425,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.5","score":275},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-30165","priority_score":580,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Reflected File Download"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-31331","priority_score":465,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"6.3","score":315},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Request Forgery (CSRF)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-6261586","priority_score":505,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.1","score":355},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Open Redirect"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-6444790","priority_score":505,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"7.1","score":355},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Open Redirect"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-6597980","priority_score":420,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.4","score":270},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Open Redirect"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-7687447","priority_score":495,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"6.9","score":345},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-3369749","priority_score":415,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Allocation of Resources Without Limits or Throttling"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGSPRINGFRAMEWORK-5422217","priority_score":475,"priority_score_factors":[{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Allocation of Resources Without Limits or Throttling"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-ORGZEROTURNAROUND-31681","priority_score":575,"priority_score_factors":[{"type":"reachabilityBucket","label":"reachable","score":150},{"type":"fixability","label":true,"score":150},{"type":"cvssScore","label":"5.5","score":275},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Arbitrary File Write via Archive Extraction (Zip Slip)"}],"prId":"c7858c6c-9e7f-4bc5-9da3-817533fb7f90","prPublicId":"c7858c6c-9e7f-4bc5-9da3-817533fb7f90","packageManager":"maven","priorityScoreList":[525,640,475,475,535,415,800,750,600,555,760,335,790,630,525,800,705,640,790,455,590,525,525,640,705,525,525,525,760,705,640,415,365,760,600,590,415,790,525,590,455,415,525,590,415,705,515,590,600,580,590,425,580,465,505,505,420,495,415,415,475,575],"projectPublicId":"fe701c34-b264-494d-9aa2-b07289b9de46","projectUrl":"https://app.snyk.io/org/man.private2000/project/fe701c34-b264-494d-9aa2-b07289b9de46?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["priorityScore"],"type":"user-initiated","upgrade":["SNYK-JAVA-COMMONSFILEUPLOAD-30082","SNYK-JAVA-COMMONSFILEUPLOAD-30401","SNYK-JAVA-COMMONSFILEUPLOAD-31540","SNYK-JAVA-COMMONSFILEUPLOAD-3326457","SNYK-JAVA-COMMONSIO-1277109","SNYK-JAVA-OGNL-30474","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2320014","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2321524","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-31409","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-567761","SNYK-JAVA-ORGAPACHESTRUTS-1049003","SNYK-JAVA-ORGAPACHESTRUTS-2635340","SNYK-JAVA-ORGAPACHESTRUTS-30060","SNYK-JAVA-ORGAPACHESTRUTS-30207","SNYK-JAVA-ORGAPACHESTRUTS-30770","SNYK-JAVA-ORGAPACHESTRUTS-30771","SNYK-JAVA-ORGAPACHESTRUTS-30772","SNYK-JAVA-ORGAPACHESTRUTS-30773","SNYK-JAVA-ORGAPACHESTRUTS-30774","SNYK-JAVA-ORGAPACHESTRUTS-30775","SNYK-JAVA-ORGAPACHESTRUTS-30776","SNYK-JAVA-ORGAPACHESTRUTS-30778","SNYK-JAVA-ORGAPACHESTRUTS-31495","SNYK-JAVA-ORGAPACHESTRUTS-31500","SNYK-JAVA-ORGAPACHESTRUTS-31501","SNYK-JAVA-ORGAPACHESTRUTS-31502","SNYK-JAVA-ORGAPACHESTRUTS-31503","SNYK-JAVA-ORGAPACHESTRUTS-32477","SNYK-JAVA-ORGAPACHESTRUTS-451610","SNYK-JAVA-ORGAPACHESTRUTS-460223","SNYK-JAVA-ORGAPACHESTRUTS-5707101","SNYK-JAVA-ORGAPACHESTRUTS-608097","SNYK-JAVA-ORGAPACHESTRUTS-608098","SNYK-JAVA-ORGAPACHESTRUTS-609765","SNYK-JAVA-ORGAPACHESTRUTS-6100744","SNYK-JAVA-ORGAPACHESTRUTS-6102825","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804","SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611","SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418","SNYK-JAVA-ORGAPACHESTRUTSXWORK-5811864","SNYK-JAVA-ORGFREEMARKER-1076795","SNYK-JAVA-ORGSPRINGFRAMEWORK-1009832","SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828","SNYK-JAVA-ORGSPRINGFRAMEWORK-30163","SNYK-JAVA-ORGSPRINGFRAMEWORK-30164","SNYK-JAVA-ORGSPRINGFRAMEWORK-30165","SNYK-JAVA-ORGSPRINGFRAMEWORK-31331","SNYK-JAVA-ORGSPRINGFRAMEWORK-3369749","SNYK-JAVA-ORGSPRINGFRAMEWORK-5422217","SNYK-JAVA-ORGSPRINGFRAMEWORK-6261586","SNYK-JAVA-ORGSPRINGFRAMEWORK-6444790","SNYK-JAVA-ORGSPRINGFRAMEWORK-6597980","SNYK-JAVA-ORGSPRINGFRAMEWORK-7687447","SNYK-JAVA-ORGZEROTURNAROUND-31681"],"vulns":["SNYK-JAVA-COMMONSFILEUPLOAD-30082","SNYK-JAVA-COMMONSFILEUPLOAD-30401","SNYK-JAVA-COMMONSFILEUPLOAD-31540","SNYK-JAVA-COMMONSFILEUPLOAD-3326457","SNYK-JAVA-COMMONSIO-1277109","SNYK-JAVA-OGNL-30474","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2320014","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2321524","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-31409","SNYK-JAVA-ORGAPACHELOGGINGLOG4J-567761","SNYK-JAVA-ORGAPACHESTRUTS-1049003","SNYK-JAVA-ORGAPACHESTRUTS-2635340","SNYK-JAVA-ORGAPACHESTRUTS-30060","SNYK-JAVA-ORGAPACHESTRUTS-30207","SNYK-JAVA-ORGAPACHESTRUTS-30770","SNYK-JAVA-ORGAPACHESTRUTS-30771","SNYK-JAVA-ORGAPACHESTRUTS-30772","SNYK-JAVA-ORGAPACHESTRUTS-30773","SNYK-JAVA-ORGAPACHESTRUTS-30774","SNYK-JAVA-ORGAPACHESTRUTS-30775","SNYK-JAVA-ORGAPACHESTRUTS-30776","SNYK-JAVA-ORGAPACHESTRUTS-30778","SNYK-JAVA-ORGAPACHESTRUTS-31495","SNYK-JAVA-ORGAPACHESTRUTS-31500","SNYK-JAVA-ORGAPACHESTRUTS-31501","SNYK-JAVA-ORGAPACHESTRUTS-31502","SNYK-JAVA-ORGAPACHESTRUTS-31503","SNYK-JAVA-ORGAPACHESTRUTS-32477","SNYK-JAVA-ORGAPACHESTRUTS-451610","SNYK-JAVA-ORGAPACHESTRUTS-460223","SNYK-JAVA-ORGAPACHESTRUTS-5707101","SNYK-JAVA-ORGAPACHESTRUTS-608097","SNYK-JAVA-ORGAPACHESTRUTS-608098","SNYK-JAVA-ORGAPACHESTRUTS-609765","SNYK-JAVA-ORGAPACHESTRUTS-6100744","SNYK-JAVA-ORGAPACHESTRUTS-6102825","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804","SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611","SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418","SNYK-JAVA-ORGAPACHESTRUTSXWORK-5811864","SNYK-JAVA-ORGFREEMARKER-1076795","SNYK-JAVA-ORGSPRINGFRAMEWORK-1009832","SNYK-JAVA-ORGSPRINGFRAMEWORK-30163","SNYK-JAVA-ORGSPRINGFRAMEWORK-30164","SNYK-JAVA-ORGSPRINGFRAMEWORK-30165","SNYK-JAVA-ORGSPRINGFRAMEWORK-31331","SNYK-JAVA-ORGSPRINGFRAMEWORK-6261586","SNYK-JAVA-ORGSPRINGFRAMEWORK-6444790","SNYK-JAVA-ORGSPRINGFRAMEWORK-6597980","SNYK-JAVA-ORGSPRINGFRAMEWORK-7687447","SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828","SNYK-JAVA-ORGSPRINGFRAMEWORK-3369749","SNYK-JAVA-ORGSPRINGFRAMEWORK-5422217","SNYK-JAVA-ORGZEROTURNAROUND-31681"],"patch":[],"isBreakingChange":true,"remediationStrategy":"vuln"}'