Skip to content

Code Quality: Push on main #651

Code Quality: Push on main

Code Quality: Push on main #651

Triggered via dynamic January 12, 2026 12:18
Status Success
Total duration 2m 5s
Artifacts

codeql

on: dynamic
Matrix: analyze
Fit to window
Zoom out
Zoom in

Annotations

16 warnings and 30 notices
Vulnerable declared dependency: netty-socketio-micronaut/pom.xml#L90
Provides transitive vulnerable dependency maven:org.yaml:snakeyaml:1.23 * [CVE-2022-1471](https://www.mend.io/vulnerability-database/CVE-2022-1471?utm_source=JetBrains) 8.3 Deserialization of Untrusted Data * [CVE-2017-18640](https://www.mend.io/vulnerability-database/CVE-2017-18640?utm_source=JetBrains) 7.5 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') * [CVE-2022-25857](https://www.mend.io/vulnerability-database/CVE-2022-25857?utm_source=JetBrains) 7.5 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') * [CVE-2022-38752](https://www.mend.io/vulnerability-database/CVE-2022-38752?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-38751](https://www.mend.io/vulnerability-database/CVE-2022-38751?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-38750](https://www.mend.io/vulnerability-database/CVE-2022-38750?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-38749](https://www.mend.io/vulnerability-database/CVE-2022-38749?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-41854](https://www.mend.io/vulnerability-database/CVE-2022-41854?utm_source=JetBrains) 5.8 Out-of-bounds Write Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-core/pom.xml#L157
Provides transitive vulnerable dependency maven:org.yaml:snakeyaml:1.23 * [CVE-2022-1471](https://www.mend.io/vulnerability-database/CVE-2022-1471?utm_source=JetBrains) 8.3 Deserialization of Untrusted Data * [CVE-2017-18640](https://www.mend.io/vulnerability-database/CVE-2017-18640?utm_source=JetBrains) 7.5 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') * [CVE-2022-25857](https://www.mend.io/vulnerability-database/CVE-2022-25857?utm_source=JetBrains) 7.5 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') * [CVE-2022-38752](https://www.mend.io/vulnerability-database/CVE-2022-38752?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-38751](https://www.mend.io/vulnerability-database/CVE-2022-38751?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-38750](https://www.mend.io/vulnerability-database/CVE-2022-38750?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-38749](https://www.mend.io/vulnerability-database/CVE-2022-38749?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-41854](https://www.mend.io/vulnerability-database/CVE-2022-41854?utm_source=JetBrains) 5.8 Out-of-bounds Write Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-core/pom.xml#L152
Provides transitive vulnerable dependency maven:org.json:json:20090211 * [WS-2017-3805](https://www.mend.io/vulnerability-database/WS-2017-3805?utm_source=JetBrains) 7.5 Uncontrolled Resource Consumption ('Resource Exhaustion') * [CVE-2022-45688](https://www.mend.io/vulnerability-database/CVE-2022-45688?utm_source=JetBrains) 7.5 Out-of-bounds Write * [CVE-2023-5072](https://www.mend.io/vulnerability-database/CVE-2023-5072?utm_source=JetBrains) 7.5 Allocation of Resources Without Limits or Throttling Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-spring-boot-starter/pom.xml#L56
Provides transitive vulnerable dependency maven:org.yaml:snakeyaml:1.23 * [CVE-2022-1471](https://www.mend.io/vulnerability-database/CVE-2022-1471?utm_source=JetBrains) 8.3 Deserialization of Untrusted Data * [CVE-2017-18640](https://www.mend.io/vulnerability-database/CVE-2017-18640?utm_source=JetBrains) 7.5 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') * [CVE-2022-25857](https://www.mend.io/vulnerability-database/CVE-2022-25857?utm_source=JetBrains) 7.5 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') * [CVE-2022-38752](https://www.mend.io/vulnerability-database/CVE-2022-38752?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-38751](https://www.mend.io/vulnerability-database/CVE-2022-38751?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-38750](https://www.mend.io/vulnerability-database/CVE-2022-38750?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-38749](https://www.mend.io/vulnerability-database/CVE-2022-38749?utm_source=JetBrains) 6.5 Out-of-bounds Write * [CVE-2022-41854](https://www.mend.io/vulnerability-database/CVE-2022-41854?utm_source=JetBrains) 5.8 Out-of-bounds Write Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-core/pom.xml#L88
Provides transitive vulnerable dependency maven:org.lz4:lz4-java:1.8.0 * [CVE-2025-66566](https://www.mend.io/vulnerability-database/CVE-2025-66566?utm_source=Jetbrains) 7.5 yawkat LZ4 Java has a possible information leak in Java safe decompressor Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-micronaut/pom.xml#L85
Provides transitive vulnerable dependency maven:org.json:json:20090211 * [WS-2017-3805](https://www.mend.io/vulnerability-database/WS-2017-3805?utm_source=JetBrains) 7.5 Uncontrolled Resource Consumption ('Resource Exhaustion') * [CVE-2022-45688](https://www.mend.io/vulnerability-database/CVE-2022-45688?utm_source=JetBrains) 7.5 Out-of-bounds Write * [CVE-2023-5072](https://www.mend.io/vulnerability-database/CVE-2023-5072?utm_source=JetBrains) 7.5 Allocation of Resources Without Limits or Throttling Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-spring-boot-starter/pom.xml#L51
Provides transitive vulnerable dependency maven:org.json:json:20090211 * [WS-2017-3805](https://www.mend.io/vulnerability-database/WS-2017-3805?utm_source=JetBrains) 7.5 Uncontrolled Resource Consumption ('Resource Exhaustion') * [CVE-2022-45688](https://www.mend.io/vulnerability-database/CVE-2022-45688?utm_source=JetBrains) 7.5 Out-of-bounds Write * [CVE-2023-5072](https://www.mend.io/vulnerability-database/CVE-2023-5072?utm_source=JetBrains) 7.5 Allocation of Resources Without Limits or Throttling Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-spring-boot-starter/pom.xml#L51
Provides transitive vulnerable dependency maven:com.squareup.okio:okio:1.15.0 * [CVE-2023-3635](https://www.mend.io/vulnerability-database/CVE-2023-3635?utm_source=JetBrains) 5.9 Incorrect Conversion between Numeric Types Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-core/pom.xml#L152
Provides transitive vulnerable dependency maven:com.squareup.okio:okio:1.15.0 * [CVE-2023-3635](https://www.mend.io/vulnerability-database/CVE-2023-3635?utm_source=JetBrains) 5.9 Incorrect Conversion between Numeric Types Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-spring-boot-starter/pom.xml#L51
Provides transitive vulnerable dependency maven:com.squareup.okhttp3:okhttp:3.12.12 * [CVE-2023-0833](https://www.mend.io/vulnerability-database/CVE-2023-0833?utm_source=JetBrains) 4.7 Generation of Error Message Containing Sensitive Information Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-core/pom.xml#L152
Provides transitive vulnerable dependency maven:com.squareup.okhttp3:okhttp:3.12.12 * [CVE-2023-0833](https://www.mend.io/vulnerability-database/CVE-2023-0833?utm_source=JetBrains) 4.7 Generation of Error Message Containing Sensitive Information Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-micronaut/pom.xml#L85
Provides transitive vulnerable dependency maven:com.squareup.okhttp3:okhttp:3.12.12 * [CVE-2023-0833](https://www.mend.io/vulnerability-database/CVE-2023-0833?utm_source=JetBrains) 4.7 Generation of Error Message Containing Sensitive Information Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-core/pom.xml#L77
Dependency maven:com.hazelcast:hazelcast:5.2.5 is vulnerable , safe version 5.3.5 * [CVE-2023-33264](https://www.mend.io/vulnerability-database/CVE-2023-33264?utm_source=JetBrains) 4.3 Insufficiently Protected Credentials Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)
Vulnerable declared dependency: netty-socketio-micronaut/pom.xml#L85
Provides transitive vulnerable dependency maven:com.squareup.okio:okio:1.15.0 * [CVE-2023-3635](https://www.mend.io/vulnerability-database/CVE-2023-3635?utm_source=JetBrains) 5.9 Incorrect Conversion between Numeric Types Results powered by [Mend.io](https://www.mend.io/jetbrains-lp/?utm_source=JetBrains)