Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade com.fasterxml.jackson.core:jackson-databind from 2.9.10.4 to 2.16.2 #415

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

struce2
Copy link
Owner

@struce2 struce2 commented Apr 2, 2024

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade com.fasterxml.jackson.core:jackson-databind from 2.9.10.4 to 2.16.2.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 63 versions ahead of your current version.
  • The recommended version was released 24 days ago, on 2024-03-09.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-608664
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
XML External Entity (XXE) Injection
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426
726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
Proof of Concept

(*) Note that the real score may have changed since the PR was raised.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

…4 to 2.16.2

Snyk has created this PR to upgrade com.fasterxml.jackson.core:jackson-databind from 2.9.10.4 to 2.16.2.

See this package in Maven Repository:
https://mvnrepository.com/artifact/com.fasterxml.jackson.core/jackson-databind/

See this project in Snyk:
https://app.snyk.io/org/struce/project/e826a2c5-0d45-4da5-b70b-e7b82f95423f?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants