raml-java-client-generator
raml-java-client-generator copied to clipboard
[Snyk] Security upgrade org.glassfish.jersey.media:jersey-media-json-jackson from 2.24 to 2.26
Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.
Changes included in this PR
- Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
- raml-client-generator-core/pom.xml
Vulnerabilities that will be fixed
With an upgrade:
Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity |
---|---|---|---|---|---|
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1047324 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
Denial of Service (DoS) SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
616/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 5.9 |
Denial of Service (DoS) SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
616/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 5.9 |
Denial of Service (DoS) SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
479/1000 Why? Has a fix available, CVSS 5.3 |
Denial of Service (DoS) SNYK-JAVA-COMFASTERXMLJACKSONCORE-31519 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-31573 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-32043 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-32044 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-32111 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
834/1000 Why? Mature exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Mature |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
791/1000 Why? Mature exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Mature |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-548451 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-559094 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-560762 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-560766 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-561362 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-561373 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-561585 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-561586 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-561587 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-564887 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-564888 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
726/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-608664 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | Proof of Concept |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72445 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72446 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72447 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72448 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72449 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72450 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72451 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72882 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72883 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
![]() |
630/1000 Why? Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-JAVA-COMFASTERXMLJACKSONCORE-72884 |
org.glassfish.jersey.media:jersey-media-json-jackson: 2.24 -> 2.26 |
No | No Known Exploit |
(*) Note that the real score may have changed since the PR was raised.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📚 Read more about Snyk's upgrade and patch logic
[//]: # (snyk:metadata:{"prId":"a0b2c8de-919b-4be7-b7df-f2f28f874982","prPublicId":"a0b2c8de-919b-4be7-b7df-f2f28f874982","dependencies":[{"name":"org.glassfish.jersey.media:jersey-media-json-jackson","from":"2.24","to":"2.26"}],"packageManager":"maven","projectPublicId":"a280d7db-6754-4264-bc82-e24ade331425","projectUrl":"https://app.snyk.io/org/mulesoft-labs/project/a280d7db-6754-4264-bc82-e24ade331425?utm_source=github-enterprise&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1047324","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931","SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736","SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426","SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507","SNYK-JAVA-COMFASTERXMLJACKSONCORE-31573","SNYK-JAVA-COMFASTERXMLJACKSONCORE-32043","SNYK-JAVA-COMFASTERXMLJACKSONCORE-32044","SNYK-JAVA-COMFASTERXMLJACKSONCORE-32111","SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207","SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917","SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617","SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014","SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015","SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016","SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674","SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676","SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943","SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980","SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500","SNYK-JAVA-COMFASTERXMLJACKSONCORE-548451","SNYK-JAVA-COMFASTERXMLJACKSONCORE-559094","SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106","SNYK-JAVA-COMFASTERXMLJACKSONCORE-560762","SNYK-JAVA-COMFASTERXMLJACKSONCORE-560766","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561362","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561373","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561585","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561586","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561587","SNYK-JAVA-COMFASTERXMLJACKSONCORE-564887","SNYK-JAVA-COMFASTERXMLJACKSONCORE-564888","SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625","SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300","SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314","SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316","SNYK-JAVA-COMFASTERXMLJACKSONCORE-608664","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72445","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72446","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72447","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72448","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72449","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72450","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72451","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72882","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72883","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72884","SNYK-JAVA-COMFASTERXMLJACKSONCORE-31519"],"upgrade":["SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1047324","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427","SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931","SNYK-JAVA-COMFASTERXMLJACKSONCORE-174736","SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426","SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507","SNYK-JAVA-COMFASTERXMLJACKSONCORE-31519","SNYK-JAVA-COMFASTERXMLJACKSONCORE-31573","SNYK-JAVA-COMFASTERXMLJACKSONCORE-32043","SNYK-JAVA-COMFASTERXMLJACKSONCORE-32044","SNYK-JAVA-COMFASTERXMLJACKSONCORE-32111","SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207","SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917","SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617","SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014","SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015","SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016","SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674","SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676","SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943","SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980","SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500","SNYK-JAVA-COMFASTERXMLJACKSONCORE-548451","SNYK-JAVA-COMFASTERXMLJACKSONCORE-559094","SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106","SNYK-JAVA-COMFASTERXMLJACKSONCORE-560762","SNYK-JAVA-COMFASTERXMLJACKSONCORE-560766","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561362","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561373","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561585","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561586","SNYK-JAVA-COMFASTERXMLJACKSONCORE-561587","SNYK-JAVA-COMFASTERXMLJACKSONCORE-564887","SNYK-JAVA-COMFASTERXMLJACKSONCORE-564888","SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625","SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300","SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314","SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316","SNYK-JAVA-COMFASTERXMLJACKSONCORE-608664","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72445","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72446","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72447","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72448","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72449","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72450","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72451","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72882","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72883","SNYK-JAVA-COMFASTERXMLJACKSONCORE-72884"],"isBreakingChange":false,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[630,630,619,619,726,630,726,630,726,630,726,726,630,630,726,726,619,726,589,616,616,726,619,726,619,619,726,834,619,619,791,630,619,619,619,619,619,726,726,726,726,630,630,630,726,630,630,630,630,630,630,630,630,726,630,630,630,630,630,630,630,630,630,630,479],"remediationStrategy":"vuln"})
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Deserialization of Untrusted Data 🦉 Denial of Service (DoS)