Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Endor Labs detected 2 policy violations associated with this pull request.
Please review all findings to address these issues.
🚩 Policy Violation: Critical or High Reachable Vulnerabilities
Package: com.endor.webapp:[email protected]
Dependency: com.endor.example:[email protected]
🚫 GHSA-mjmj-j48q-9wg2: SnakeYaml Constructor Deserialization Remote Code Execution
Transitive Dependency
Test Dependency
Reachable Function
Reachable Dependency
🚫 GHSA-mjmj-j48q-9wg2: SnakeYaml Constructor Deserialization Remote Code Execution
Transitive Dependency
Test Dependency
Reachable Function
Reachable Dependency
Dependency: com.endor.example:[email protected]
🚫 GHSA-mjmj-j48q-9wg2: SnakeYaml Constructor Deserialization Remote Code Execution
- **Tags**: `Transitive Dependency` `Test Dependency` `Reachable Function` `Reachable Dependency` - **Summary**: org.hsqldb:[email protected] has a critical vulnerability identified by GHSA-77xx-rxvh-q682: HyperSQL DataBase vulnerable to remote code execution when processing untrusted input. A vulnerable function is potentially reachable. This vulnerability was fixed in version 2.7.1 org.hsqldb:[email protected] is a direct dependency of org.owasp:[email protected]. - **Remediation**: Update org.owasp:[email protected] to use org.hsqldb:hsqldb version 2.7.1 (current: 2.3.6, latest: 2.7.1).🚫 GHSA-mjmj-j48q-9wg2: SnakeYaml Constructor Deserialization Remote Code Execution
Transitive Dependency
Test Dependency
Reachable Function
Reachable Dependency
🚫 GHSA-x873-6rgc-94jc: Spring Security logout not clearing security context input
- Summary: org.hsqldb:[email protected] has a critical vulnerability identified by GHSA-77xx-rxvh-q682: HyperSQL DataBase vulnerable to remote code execution when processing untrusted input. A vulnerable function is potentially reachable. This vulnerability was fixed in version 2.7.1 org.hsqldb:[email protected] is a direct dependency of org.owasp:[email protected]. - Remediation: Update org.owasp:[email protected] to use org.hsqldb:hsqldb version 2.7.1 (current: 2.3.6, latest: 2.7.1).