Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Jul 12, 2025

Bumps the maven group with 1 update in the /android directory: com.google.code.gson:gson.
Bumps the maven group with 3 updates in the /kotlin directory: com.google.code.gson:gson, org.apache.commons:commons-lang3 and junit:junit.

Updates com.google.code.gson:gson from 2.6.2 to 2.8.9

Release notes

Sourced from com.google.code.gson:gson's releases.

Gson 2.8.9

  • Make OSGi bundle's dependency on sun.misc optional (#1993).
  • Deprecate Gson.excluder() exposing internal Excluder class (#1986).
  • Prevent Java deserialization of internal classes (#1991).
  • Improve number strategy implementation (#1987).
  • Fix LongSerializationPolicy null handling being inconsistent with Gson (#1990).
  • Support arbitrary Number implementation for Object and Number deserialization (#1290).
  • Bump proguard-maven-plugin from 2.4.0 to 2.5.1 (#1980).
  • Don't exclude static local classes (#1969).
  • Fix RuntimeTypeAdapterFactory depending on internal Streams class (#1959).
  • Improve Maven build (#1964).
  • Make dependency on java.sql optional (#1707).

Gson 2.8.8

  • Fixed issue with recursive types (#1390).
  • Better behaviour with Java 9+ and Unsafe if there is a security manager (#1712).
  • EnumTypeAdapter now works better when ProGuard has obfuscated enum fields (#1495).
Changelog

Sourced from com.google.code.gson:gson's changelog.

Version 2.8.9

Version 2.8.8

  • Fixed issue with recursive types (google/gson#1390).
  • Better behaviour with Java 9+ and Unsafe if there is a security manager (google/gson#1712).
  • EnumTypeAdapter now works better when ProGuard has obfuscated enum fields (google/gson#1495).

Version 2.8.7

Version 2.8.6

2019-10-04 GitHub Diff

  • Added static methods JsonParser.parseString and JsonParser.parseReader and deprecated instance method JsonParser.parse
  • Java 9 module-info support

Version 2.8.5

2018-05-21 GitHub Diff

  • Print Gson version while throwing AssertionError and IllegalArgumentException
  • Moved utils.VersionUtils class to internal.JavaVersion. This is a potential backward incompatible change from 2.8.4
  • Fixed issue google/gson#1310 by supporting Debian Java 9

Version 2.8.4

2018-05-01 GitHub Diff

  • Added a new FieldNamingPolicy, LOWER_CASE_WITH_DOTS that mapps JSON name someFieldName to some.field.name
  • Fixed issue google/gson#1305 by removing compile/runtime dependency on sun.misc.Unsafe

Version 2.8.3

2018-04-27 GitHub Diff

  • Added a new API, GsonBuilder.newBuilder() that clones the current builder
  • Preserving DateFormatter behavior on JDK 9

... (truncated)

Commits
  • 6a368d8 [maven-release-plugin] prepare release gson-parent-2.8.9
  • ba96d53 Fix missing bounds checks for JsonTreeReader.getPath() (#2001)
  • ca1df7f #1981: Optional OSGi bundle's dependency on sun.misc package (#1993)
  • c54caf3 Deprecate Gson.excluder() exposing internal Excluder class (#1986)
  • e6fae59 Prevent Java deserialization of internal classes (#1991)
  • bda2e3d Improve number strategy implementation (#1987)
  • cd748df Fix LongSerializationPolicy null handling being inconsistent with Gson (#1990)
  • fe30b85 Support arbitrary Number implementation for Object and Number deserialization...
  • 1cc1627 Fix incorrect feature request template label (#1982)
  • 7b9a283 Bump bnd-maven-plugin from 5.3.0 to 6.0.0 (#1985)
  • Additional commits viewable in compare view

Updates com.google.code.gson:gson from 2.8.6 to 2.8.9

Release notes

Sourced from com.google.code.gson:gson's releases.

Gson 2.8.9

  • Make OSGi bundle's dependency on sun.misc optional (#1993).
  • Deprecate Gson.excluder() exposing internal Excluder class (#1986).
  • Prevent Java deserialization of internal classes (#1991).
  • Improve number strategy implementation (#1987).
  • Fix LongSerializationPolicy null handling being inconsistent with Gson (#1990).
  • Support arbitrary Number implementation for Object and Number deserialization (#1290).
  • Bump proguard-maven-plugin from 2.4.0 to 2.5.1 (#1980).
  • Don't exclude static local classes (#1969).
  • Fix RuntimeTypeAdapterFactory depending on internal Streams class (#1959).
  • Improve Maven build (#1964).
  • Make dependency on java.sql optional (#1707).

Gson 2.8.8

  • Fixed issue with recursive types (#1390).
  • Better behaviour with Java 9+ and Unsafe if there is a security manager (#1712).
  • EnumTypeAdapter now works better when ProGuard has obfuscated enum fields (#1495).
Changelog

Sourced from com.google.code.gson:gson's changelog.

Version 2.8.9

Version 2.8.8

  • Fixed issue with recursive types (google/gson#1390).
  • Better behaviour with Java 9+ and Unsafe if there is a security manager (google/gson#1712).
  • EnumTypeAdapter now works better when ProGuard has obfuscated enum fields (google/gson#1495).

Version 2.8.7

Version 2.8.6

2019-10-04 GitHub Diff

  • Added static methods JsonParser.parseString and JsonParser.parseReader and deprecated instance method JsonParser.parse
  • Java 9 module-info support

Version 2.8.5

2018-05-21 GitHub Diff

  • Print Gson version while throwing AssertionError and IllegalArgumentException
  • Moved utils.VersionUtils class to internal.JavaVersion. This is a potential backward incompatible change from 2.8.4
  • Fixed issue google/gson#1310 by supporting Debian Java 9

Version 2.8.4

2018-05-01 GitHub Diff

  • Added a new FieldNamingPolicy, LOWER_CASE_WITH_DOTS that mapps JSON name someFieldName to some.field.name
  • Fixed issue google/gson#1305 by removing compile/runtime dependency on sun.misc.Unsafe

Version 2.8.3

2018-04-27 GitHub Diff

  • Added a new API, GsonBuilder.newBuilder() that clones the current builder
  • Preserving DateFormatter behavior on JDK 9

... (truncated)

Commits
  • 6a368d8 [maven-release-plugin] prepare release gson-parent-2.8.9
  • ba96d53 Fix missing bounds checks for JsonTreeReader.getPath() (#2001)
  • ca1df7f #1981: Optional OSGi bundle's dependency on sun.misc package (#1993)
  • c54caf3 Deprecate Gson.excluder() exposing internal Excluder class (#1986)
  • e6fae59 Prevent Java deserialization of internal classes (#1991)
  • bda2e3d Improve number strategy implementation (#1987)
  • cd748df Fix LongSerializationPolicy null handling being inconsistent with Gson (#1990)
  • fe30b85 Support arbitrary Number implementation for Object and Number deserialization...
  • 1cc1627 Fix incorrect feature request template label (#1982)
  • 7b9a283 Bump bnd-maven-plugin from 5.3.0 to 6.0.0 (#1985)
  • Additional commits viewable in compare view

Updates org.apache.commons:commons-lang3 from 3.10 to 3.18.0

Updates junit:junit from 4.13 to 4.13.1

Release notes

Sourced from junit:junit's releases.

JUnit 4.13.1

Please refer to the release notes for details.

Changelog

Sourced from junit:junit's changelog.

Summary of changes in version 4.13.1

Rules

Security fix: TemporaryFolder now limits access to temporary folders on Java 1.7 or later

A local information disclosure vulnerability in TemporaryFolder has been fixed. See the published security advisory for details.

Test Runners

[Pull request #1669:](junit-team/junit#1669) Make FrameworkField constructor public

Prior to this change, custom runners could make FrameworkMethod instances, but not FrameworkField instances. This small change allows for both now, because FrameworkField's constructor has been promoted from package-private to public.

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the maven group with 1 update in the /android directory: [com.google.code.gson:gson](https://github.com/google/gson).
Bumps the maven group with 3 updates in the /kotlin directory: [com.google.code.gson:gson](https://github.com/google/gson), org.apache.commons:commons-lang3 and [junit:junit](https://github.com/junit-team/junit4).


Updates `com.google.code.gson:gson` from 2.6.2 to 2.8.9
- [Release notes](https://github.com/google/gson/releases)
- [Changelog](https://github.com/google/gson/blob/main/CHANGELOG.md)
- [Commits](google/gson@gson-parent-2.6.2...gson-parent-2.8.9)

Updates `com.google.code.gson:gson` from 2.8.6 to 2.8.9
- [Release notes](https://github.com/google/gson/releases)
- [Changelog](https://github.com/google/gson/blob/main/CHANGELOG.md)
- [Commits](google/gson@gson-parent-2.6.2...gson-parent-2.8.9)

Updates `org.apache.commons:commons-lang3` from 3.10 to 3.18.0

Updates `junit:junit` from 4.13 to 4.13.1
- [Release notes](https://github.com/junit-team/junit4/releases)
- [Changelog](https://github.com/junit-team/junit4/blob/main/doc/ReleaseNotes4.13.1.md)
- [Commits](junit-team/junit4@r4.13...r4.13.1)

---
updated-dependencies:
- dependency-name: com.google.code.gson:gson
  dependency-version: 2.8.9
  dependency-type: direct:production
  dependency-group: maven
- dependency-name: com.google.code.gson:gson
  dependency-version: 2.8.9
  dependency-type: direct:production
  dependency-group: maven
- dependency-name: org.apache.commons:commons-lang3
  dependency-version: 3.18.0
  dependency-type: direct:production
  dependency-group: maven
- dependency-name: junit:junit
  dependency-version: 4.13.1
  dependency-type: direct:development
  dependency-group: maven
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file java Pull requests that update Java code labels Jul 12, 2025
@sstephanou-bc
Copy link

Logo
Checkmarx One – Scan Summary & Details5c41703d-c46c-46cc-9b42-6fda94c53d32

New Issues (15)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2021-0341 Maven-com.squareup.okhttp3:okhttp-3.14.7
detailsRecommended version: 4.9.2
Description: In "verifyHostName" method of "OkHostnameVerifier.java", there is a possible way to accept a certificate for the wrong domain due to improperly use...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: hD%2BLotocnGifxDaAZSxIFsgbXo9400B54pZMlttAxW0%3D
Vulnerable Package
HIGH CVE-2021-0341 Maven-com.squareup.okhttp3:okhttp-4.2.2
detailsRecommended version: 4.9.2
Description: In "verifyHostName" method of "OkHostnameVerifier.java", there is a possible way to accept a certificate for the wrong domain due to improperly use...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: n198y0iwCX31C84tilYlIY0Y3wIGPpbjHrGNuAvpdTQ%3D
Vulnerable Package
HIGH CVE-2023-2976 Maven-com.google.guava:guava-20.0
detailsRecommended version: 32.0.0.jre-redhat-00001
Description: Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 through 31.1-jre on Unix syste...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: YwF3hoz8zlDp7UZixvdQPPDEKAFHProBWG%2BAr24Xhr8%3D
Vulnerable Package
HIGH CVE-2024-45338 Go-golang.org/x/net-v0.0.0-20190108225652-1e06a53dbb7e
detailsRecommended version: v0.38.0
Description: An attacker can craft an input to the "Parse" function, that will be processed non-linearly with respect to its length, resulting in extremely slow...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: tJ0HfIh2JbgUQ7seFe%2BAzexs5oYo9k4nwBa232MAZjg%3D
Vulnerable Package
HIGH CVE-2025-22868 Go-golang.org/x/oauth2-v0.0.0-20190604053449-0f29369cfe45
detailsRecommended version: v0.7.1-0.20230508170826-0690208dba57
Description: An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. This issue affects golang.org/x/oaut...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: SIH%2B4fo3Q1vbQg%2F1%2BOqyF6qDrjXQPfP8bWIA4ysH1uQ%3D
Vulnerable Package
HIGH Cxdfe95b9f-ea87 Maven-org.jetbrains.kotlin:kotlin-compiler-embeddable-1.3.61
detailsRecommended version: 1.7.0
Description: Kotlin is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: NOqTpLMIhlOGyI6lMEFlLhzDSN7iw2kRa7wgCHUbDKY%3D
Vulnerable Package
MEDIUM CVE-2018-10237 Maven-com.google.guava:guava-20.0
detailsRecommended version: 32.0.0.jre-redhat-00001
Description: Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against se...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: 6Csaq7NkDc5JsEWVhLcVO%2B4YhlNFVyB9k83%2FazVYKxU%3D
Vulnerable Package
MEDIUM CVE-2019-11404 Maven-io.arrow-kt:arrow-core-0.7.1
detailsRecommended version: 0.10.0
Description: arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of thes...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: o3w0hipgrU89c2%2FfGmXoOfTPUOgh0c5ORGSVfvR%2Bn3w%3D
Vulnerable Package
MEDIUM CVE-2020-29582 Maven-org.jetbrains.kotlin:kotlin-compiler-embeddable-1.3.61
detailsRecommended version: 1.7.0
Description: In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from su...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: MzOaaPKu5v8S9vaK5EBRzlor5FV3biW9fDcRn9%2BlCjU%3D
Vulnerable Package
MEDIUM CVE-2020-29582 Maven-org.jetbrains.kotlin:kotlin-scripting-jvm-1.3.61
detailsRecommended version: 1.4.21
Description: In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from su...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: oagJvyhtcuUdI5X6JVUadui6giZ4NHATkF4whG%2FNCmQ%3D
Vulnerable Package
MEDIUM CVE-2022-24329 Maven-org.jetbrains.kotlin:kotlin-stdlib-1.3.61
detailsRecommended version: 1.6.0
Description: In JetBrains Kotlin before 1.6.0, it was not possible to lock dependencies for Multiplatform Gradle Projects.
Attack Vector: NETWORK
Attack Complexity: LOW

ID: LKgCqqtfv8V%2BccuRvKJUtMCvZb0r4kElC0txD0Mbmhk%3D
Vulnerable Package
MEDIUM CVE-2025-22872 Go-golang.org/x/net-v0.0.0-20190108225652-1e06a53dbb7e
detailsRecommended version: v0.38.0
Description: The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (`/`) as self-closing. When directly usi...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 53Q1idK8Ik40JJdqDWasoYzZnLxDQyaoRttItXtQUdE%3D
Vulnerable Package
MEDIUM Missing_HSTS_Header /php/lib/ApiException.php: 75
detailsThe web-application does not define an HSTS header, leaving it vulnerable to attack.
ID: GFMsNdo3MoQUJmsmNMyj7c4Nio4%3D
Attack Vector
LOW CVE-2020-8908 Maven-com.google.guava:guava-20.0
detailsRecommended version: 32.0.0.jre-redhat-00001
Description: A temp directory creation vulnerability exist in Guava versions prior to 30.0 allowing an attacker with access to the machine to potentially access...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: 6ct%2FmEhdYb57bFLW13S3HMG40Fdot6D7XWdQowtmd%2F0%3D
Vulnerable Package
LOW Missing_Content_Security_Policy /go/client.go: 437
detailsA Content Security Policy is not explicitly defined within the web-application.
ID: j9Tk8Tqxfr941FqUesePeVAzR8Q%3D
Attack Vector
Fixed Issues (1448)

Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 743
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 235
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 482
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1431
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 545
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 323
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 399
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 577
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 545
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 437
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1133
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 100
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 141
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 313
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 521
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1273
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 254
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 417
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 428
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 1040
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 96
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1435
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 428
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1120
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 974
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 100
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 577
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 63
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 750
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 807
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1120
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 358
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 313
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 482
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1129
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1435
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1113
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1113
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 917
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 929
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1273
HIGH Array Without Maximum Number of Items (v3) /specification.yaml: 1036
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 521
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 1431
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 322
HIGH Array Without Maximum Number of Items (v3) /openapi.yaml: 344
HIGH CVE-2024-45296 Npm-path-to-regexp-1.8.0
HIGH Cx89601373-08db Npm-debug-3.2.7
HIGH Cx89601373-08db Npm-debug-3.1.0
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 130
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 107
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 58
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 87
HIGH Security Field On Operations Has An Empty Object Definition (v3) /specification.yaml: 107
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 29
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 58
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 68
HIGH Security Field On Operations Has An Empty Object Definition (v3) /specification.yaml: 88
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 105
HIGH Security Field On Operations Has An Empty Object Definition (v3) /specification.yaml: 150
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 130
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 130
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 179
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 52
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 151
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 151
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 105
HIGH Security Field On Operations Has An Empty Object Definition (v3) /specification.yaml: 68
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 87
HIGH Security Field On Operations Has An Empty Object Definition (v3) /specification.yaml: 129
HIGH Security Field On Operations Has An Empty Object Definition (v3) /specification.yaml: 48
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 91
HIGH Security Field On Operations Has An Empty Object Definition (v3) /openapi.yaml: 179
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1205
MEDIUM Additional Properties Too Permissive /specification.yaml: 897
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1124
MEDIUM Additional Properties Too Permissive /openapi.yaml: 972
MEDIUM Additional Properties Too Permissive /openapi.yaml: 651
MEDIUM Additional Properties Too Permissive /openapi.yaml: 710
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1165
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1246
MEDIUM Additional Properties Too Permissive /specification.yaml: 909
MEDIUM Additional Properties Too Permissive /specification.yaml: 691
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1387
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1408
MEDIUM Additional Properties Too Permissive /openapi.yaml: 932
MEDIUM Additional Properties Too Permissive /openapi.yaml: 875
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1124
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1246
MEDIUM Additional Properties Too Permissive /specification.yaml: 1031
MEDIUM Additional Properties Too Permissive /openapi.yaml: 915
MEDIUM Additional Properties Too Permissive /openapi.yaml: 811
MEDIUM Additional Properties Too Permissive /openapi.yaml: 795
MEDIUM Additional Properties Too Permissive /openapi.yaml: 934
MEDIUM Additional Properties Too Permissive /specification.yaml: 1014
MEDIUM Additional Properties Too Permissive /openapi.yaml: 992
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1080
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1408
MEDIUM Additional Properties Too Permissive /specification.yaml: 812
MEDIUM Additional Properties Too Permissive /specification.yaml: 869
MEDIUM Additional Properties Too Permissive /openapi.yaml: 862
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1278
MEDIUM Additional Properties Too Permissive /openapi.yaml: 901
MEDIUM Additional Properties Too Permissive /openapi.yaml: 759
MEDIUM Additional Properties Too Permissive /specification.yaml: 546
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1106
MEDIUM Additional Properties Too Permissive /openapi.yaml: 932
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1231
MEDIUM Additional Properties Too Permissive /openapi.yaml: 583
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1231
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1278
MEDIUM Additional Properties Too Permissive /specification.yaml: 728
MEDIUM Additional Properties Too Permissive /openapi.yaml: 979
MEDIUM Additional Properties Too Permissive /specification.yaml: 881
MEDIUM Additional Properties Too Permissive /specification.yaml: 784
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1205
MEDIUM Additional Properties Too Permissive /openapi.yaml: 811
MEDIUM Additional Properties Too Permissive /openapi.yaml: 1188

More results are available on the CxOne platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file java Pull requests that update Java code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant