[snyk] SAST 결과 샘플

Code

Testing D:\0_tmp\snyk\webgoat1 ...

 ✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
   Path: JavaSource/org/owasp/webgoat/lessons/WeakSessionID.java, line 208
   Info: Cookie misses a call to setSecure. Set the Secure flag to true to protect the cookie from man-in-the-middle attacks.

 ✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
   Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 171
   Info: Cookie misses a call to setSecure. Set the Secure flag to true to protect the cookie from man-in-the-middle attacks.

 ✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
   Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 192
   Info: Cookie misses a call to setSecure. Set the Secure flag to true to protect the cookie from man-in-the-middle attacks.

 ✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
   Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 144
   Info: Cookie misses a call to setSecure. Set the Secure flag to true to protect the cookie from man-in-the-middle attacks.

 ✗ [Low] Trust Boundary Violation
   Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/ViewProfile.java, line 86
   Info: Unsanitized input from an HTTP parameter flows into setAttribute where it is used to modify the HTTP session object. This could result in mixing trusted and untrusted data in the same data structure, thus increasing the likelihood to mistakenly trust unvalidated data.

 ✗ [Low] Trust Boundary Violation
   Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/Login.java, line 154
   Info: Unsanitized input from an HTTP parameter flows into setAttribute where it is used to modify the HTTP session object. This could result in mixing trusted and untrusted data in the same data structure, thus increasing the likelihood to mistakenly trust unvalidated data.

 ✗ [Low] Trust Boundary Violation
   Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/Login.java, line 196
   Info: Unsanitized input from an HTTP parameter flows into setAttribute where it is used to modify the HTTP session object. This could result in mixing trusted and untrusted data in the same data structure, thus increasing the likelihood to mistakenly trust unvalidated data.

 ✗ [Low] Trust Boundary Violation
   Path: JavaSource/org/owasp/webgoat/lessons/CrossSiteScripting/FindProfile.java, line 84
   Info: Unsanitized input from an HTTP parameter flows into setAttribute where it is used to modify the HTTP session object. This could result in mixing trusted and untrusted data in the same data structure, thus increasing the likelihood to mistakenly trust unvalidated data.

 ✗ [Low] Use of Password Hash With Insufficient Computational Effort
   Path: JavaSource/org/owasp/webgoat/lessons/Encoding.java, line 640
   Info: The MD5 hash (used in java.security.MessageDigest.getInstance) is insecure. Consider changing it to a secure hash algorithm

 ✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
   Path: JavaSource/org/owasp/webgoat/lessons/WeakSessionID.java, line 208
   Info: Cookie misses a call to setHttpOnly. Set the HttpOnly flag to true to protect the cookie from possible malicious code on client side.

 ✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
   Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 171
   Info: Cookie misses a call to setHttpOnly. Set the HttpOnly flag to true to protect the cookie from possible malicious code on client side.

 ✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
   Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 192
   Info: Cookie misses a call to setHttpOnly. Set the HttpOnly flag to true to protect the cookie from possible malicious code on client side.

 ✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
   Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 144
   Info: Cookie misses a call to setHttpOnly. Set the HttpOnly flag to true to protect the cookie from possible malicious code on client side.

 ✗ [Low] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 124
   Info: Do not hardcode credentials in code.

 ✗ [Low] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 93
   Info: Do not hardcode credentials in code.

 ✗ [Low] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 98
   Info: Do not hardcode credentials in code.

 ✗ [Low] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 104
   Info: Do not hardcode credentials in code.

 ✗ [Low] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 133
   Info: Do not hardcode credentials in code.

 ✗ [Low] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 137
   Info: Do not hardcode credentials in code.

 ✗ [Low] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/WSDLScanning.java, line 146
   Info: Do not hardcode credentials in code.

 ✗ [Low] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/HtmlClues.java, line 83
   Info: Do not hardcode credentials in code.

 ✗ [Medium] Cleartext Transmission of Sensitive Information
   Path: JavaSource/org/owasp/webgoat/util/Interceptor.java, line 97
   Info: Writing to an unencrypted socket is insecure - a man-in-the-middle attacker can tamper the messages. Consider using SSL sockets.

 ✗ [Medium] Cleartext Transmission of Sensitive Information
   Path: JavaSource/org/owasp/webgoat/util/Interceptor.java, line 98
   Info: Reading from an unencrypted socket is insecure - a man-in-the-middle attacker can tamper the messages. Consider using SSL sockets.

 ✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
   Path: JavaSource/org/owasp/webgoat/lessons/HttpOnly.java, line 195
   Info: Unsanitized input from cookies flows into setHeader and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.

 ✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
   Path: JavaSource/org/owasp/webgoat/lessons/HttpOnly.java, line 198
   Info: Unsanitized input from cookies flows into setHeader and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.

 ✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
   Path: JavaSource/org/owasp/webgoat/lessons/HttpOnly.java, line 209
   Info: Unsanitized input from cookies flows into setHeader and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.

 ✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
   Path: JavaSource/org/owasp/webgoat/lessons/HttpOnly.java, line 212
   Info: Unsanitized input from cookies flows into setHeader and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.

 ✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
   Path: JavaSource/org/owasp/webgoat/session/WebSession.java, line 335
   Info: Unsanitized input from cookies flows into addCookie and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.

 ✗ [Medium] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 153
   Info: Do not hardcode passwords in code. Found hardcoded password used in equals.

 ✗ [Medium] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/lessons/HtmlClues.java, line 83
   Info: Do not hardcode passwords in code. Found hardcoded password used in equals.

 ✗ [Medium] Use of Hardcoded Credentials
   Path: JavaSource/org/owasp/webgoat/session/CreateDB.java, line 72
   Info: Do not hardcode passwords in code. Found hardcoded password used in here.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 220
   Info: Unsanitized input from cookies flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/CrossSiteScripting/UpdateProfile.java, line 248
   Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/CrossSiteScripting/UpdateProfile.java, line 340
   Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/DOS_Login.java, line 134
   Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/RoleBasedAccessControl/UpdateProfile.java, line 295
   Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/BackDoors.java, line 106
   Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/ViewProfile.java, line 118
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/ViewProfile.java, line 178
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/Login.java, line 149
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/Login.java, line 191
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/SqlNumericInjection.java, line 130
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/DOS_Login.java, line 114
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/RoleBasedAccessControl/Login.java, line 148
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/BlindSqlInjection.java, line 122
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/SqlStringInjection.java, line 112
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/WsSqlInjection.java, line 240
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/admin/ViewDatabase.java, line 89
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/ThreadSafetyProblem.java, line 103
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/RoleBasedAccessControl/UpdateProfile.java, line 176
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] SQL Injection
   Path: JavaSource/org/owasp/webgoat/lessons/BackDoors.java, line 113
   Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.

 ✗ [High] Path Traversal
   Path: JavaSource/org/owasp/webgoat/lessons/admin/SummaryReportCardScreen.java, line 89
   Info: Unsanitized input from an HTTP parameter flows into java.io.FileInputStream, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to read arbitrary files.

 ✗ [High] Path Traversal
   Path: JavaSource/org/owasp/webgoat/lessons/admin/ReportCardScreen.java, line 164
   Info: Unsanitized input from an HTTP parameter flows into java.io.FileInputStream, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to read arbitrary files.

 ✗ [High] Path Traversal
   Path: JavaSource/org/owasp/webgoat/util/Interceptor.java, line 135
   Info: Unsanitized input from the request URL flows into getRequestDispatcher, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to read arbitrary files.

 ✗ [High] Command Injection
   Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 649
   Info: Unsanitized input from an HTTP parameter flows into exec, where it is used as a shell command. This may result in a Command Injection vulnerability.

 ✗ [High] Command Injection
   Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 654
   Info: Unsanitized input from an HTTP parameter flows into exec, where it is used as a shell command. This may result in a Command Injection vulnerability.

 ✗ [High] XML External Entity (XXE) Injection
   Path: JavaSource/org/owasp/webgoat/lessons/WsSAXInjection.java, line 179
   Info: Unsanitized input from an HTTP parameter flows into parse, which allows expansion of external entity references. This may result in a XXE attack leading to the disclosure of confidential data or denial of service.

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/lessons/SQLInjection/SearchStaff.jsp, line 11
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/lessons/CrossSiteScripting/ViewProfile.jsp, line 171
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/lessons/CrossSiteScripting/SearchStaff.jsp, line 11
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/lessons/RoleBasedAccessControl/SearchStaff.jsp, line 11
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/main.jsp, line 114
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/main.jsp, line 119
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/main.jsp, line 124
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/main.jsp, line 130
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/main.jsp, line 135
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/main.jsp, line 163
   Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] Cross-site Scripting (XSS)
   Path: WebContent/main.jsp, line 191
   Info: Unsanitized input from cookies flows into println, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).

 ✗ [High] XPath Injection
   Path: JavaSource/org/owasp/webgoat/lessons/XPATHInjection.java, line 158
   Info: Unsanitized input from an HTTP parameter flows into evaluate, where it is used in an XPath query. This may result in an XPath Injection vulnerability.

 ✗ [High] Hardcoded Secret
   Path: JavaSource/org/owasp/webgoat/lessons/Encoding.java, line 487
   Info: Hardcoded value array {...} is used as a cipher salt. Generate the value with a cryptographically strong random number generator such as java.security.SecureRandom instead.

 ✗ [High] Hardcoded Secret
   Path: JavaSource/org/owasp/webgoat/lessons/Encoding.java, line 531
   Info: Hardcoded value array {...} is used as a cipher salt. Generate the value with a cryptographically strong random number generator such as java.security.SecureRandom instead.


✔ Test completed

Organization:      esecuvali-8y3
Test type:         Static code analysis
Project path:      D:\0_tmp\snyk\webgoat1

Summary:

  71 Code issues found
  40 [High]   10 [Medium]   21 [Low]

Open Source

Testing D:\0_tmp\eCommerceWebsite...

Tested 31 dependencies for known issues, found 13 issues, 13 vulnerable paths.


Issues to fix by upgrading:

  Upgrade com.fasterxml.jackson.core:jackson-databind@2.11.2 to com.fasterxml.jackson.core:jackson-databind@2.12.7.1 to fix
  ✗ Denial of Service (DoS) [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424] in com.fasterxml.jackson.core:jackson-databind@2.11.2
    introduced by com.fasterxml.jackson.core:jackson-databind@2.11.2
  ✗ Denial of Service (DoS) [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426] in com.fasterxml.jackson.core:jackson-databind@2.11.2
    introduced by com.fasterxml.jackson.core:jackson-databind@2.11.2
  ✗ Denial of Service (DoS) [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698] in com.fasterxml.jackson.core:jackson-databind@2.11.2
    introduced by com.fasterxml.jackson.core:jackson-databind@2.11.2
  ✗ Denial of Service (DoS) [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244] in com.fasterxml.jackson.core:jackson-databind@2.11.2
    introduced by com.fasterxml.jackson.core:jackson-databind@2.11.2

  Upgrade com.google.code.gson:gson@2.8.6 to com.google.code.gson:gson@2.8.9 to fix
  ✗ Deserialization of Untrusted Data [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327] in com.google.code.gson:gson@2.8.6
    introduced by com.google.code.gson:gson@2.8.6

  Upgrade mysql:mysql-connector-java@5.1.45 to mysql:mysql-connector-java@8.0.28 to fix
  ✗ Improper Authorization [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-MYSQL-2386864] in mysql:mysql-connector-java@5.1.45
    introduced by mysql:mysql-connector-java@5.1.45
  ✗ XML External Entity (XXE) Injection [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-MYSQL-1766958] in mysql:mysql-connector-java@5.1.45
    introduced by mysql:mysql-connector-java@5.1.45
  ✗ Privilege Escalation [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-MYSQL-174574] in mysql:mysql-connector-java@5.1.45
    introduced by mysql:mysql-connector-java@5.1.45
  ✗ Access Control Bypass [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-MYSQL-451464] in mysql:mysql-connector-java@5.1.45
    introduced by mysql:mysql-connector-java@5.1.45

  Upgrade org.hibernate:hibernate-core@5.4.10.Final to org.hibernate:hibernate-core@5.4.24.Final to fix
  ✗ SQL Injection [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-1041788] in org.hibernate:hibernate-core@5.4.10.Final
    introduced by org.hibernate:hibernate-core@5.4.10.Final
  ✗ SQL Injection [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-584563] in org.hibernate:hibernate-core@5.4.10.Final
    introduced by org.hibernate:hibernate-core@5.4.10.Final
  ✗ XML External Entity (XXE) Injection [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-ORGDOM4J-565810] in org.dom4j:dom4j@2.1.1
    introduced by org.hibernate:hibernate-core@5.4.10.Final > org.dom4j:dom4j@2.1.1


Issues with no direct upgrade or patch:
  ✗ XML External Entity (XXE) Injection [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-JSTL-30453] in jstl:jstl@1.2
    introduced by jstl:jstl@1.2
  No upgrade or patch available



Organization:      esecuvali-8y3
Package manager:   maven
Target file:       pom.xml
Project name:      com.team.hknp:eCommerceWebsite
Open source:       no
Project path:      D:\0_tmp\eCommerceWebsite
Licenses:          enabled
위로 스크롤