Skip to content

Conversation

@bwappsec
Copy link

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • samples/client/echo_api/java/resttemplate/pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
high severity Relative Path Traversal
SNYK-JAVA-ORGSPRINGFRAMEWORK-12008931
  110   org.springframework:spring-context:
5.3.33 -> 6.2.10
org.springframework:spring-web:
5.3.33 -> 6.2.10
Major version upgrade No Path Found No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Relative Path Traversal

@bwappsec bwappsec changed the title [Snyk] Fix for 1 vulnerabilities SWI-3723 [Snyk] Fix for 1 vulnerabilities Aug 21, 2025
@bwappsec
Copy link
Author

bwappsec commented Aug 21, 2025

🎉 Snyk checks have passed. No issues have been found so far.

security/snyk check is complete. No issues have been found. (View Details)

license/snyk check is complete. No issues have been found. (View Details)

code/snyk check is complete. No issues have been found. (View Details)

@jgutierrezglez jgutierrezglez deleted the snyk-fix-12df4d6fc37569cc3328d1489634ca63 branch October 1, 2025 14:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants