Skip to content

[Snyk] Fix for 44 vulnerabilities#475

Closed
Centaurioun wants to merge 3 commits intomasterfrom
snyk-fix-9e5b1f9a544f62c522c367ac9f89ce44
Closed

[Snyk] Fix for 44 vulnerabilities#475
Centaurioun wants to merge 3 commits intomasterfrom
snyk-fix-9e5b1f9a544f62c522c367ac9f89ce44

Conversation

@Centaurioun
Copy link
Copy Markdown
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • jhipster-modules/jhipster-microservice/dealer-app/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity Reachability
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1047324
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 855/1000
Why? Mature exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Mature Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 825/1000
Why? Mature exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Mature Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 705/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-548451
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-559094
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-560762
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-560766
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561362
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561373
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 780/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561585
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes Proof of Concept Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561586
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-561587
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-564887
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-564888
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable
high severity 713/1000
Why? Is reachable, Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316
net.logstash.logback:logstash-logback-encoder:
4.8 -> 6.3
Yes No Known Exploit Reachable

(*) Note that the real score may have changed since the PR was raised.

Vulnerabilities that could not be fixed

  • Upgrade:
    • Could not upgrade com.fasterxml.jackson.datatype:jackson-datatype-hibernate5@2.8.11 to com.fasterxml.jackson.datatype:jackson-datatype-hibernate5@2.10.0; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/com/fasterxml/jackson/jackson-bom/2.8.11.20181123/jackson-bom-2.8.11.20181123.pom
    • Could not upgrade com.fasterxml.jackson.datatype:jackson-datatype-hppc@2.8.11 to com.fasterxml.jackson.datatype:jackson-datatype-hppc@2.10.0; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/com/fasterxml/jackson/jackson-bom/2.8.11.20181123/jackson-bom-2.8.11.20181123.pom
    • Could not upgrade com.fasterxml.jackson.datatype:jackson-datatype-json-org@2.8.11 to com.fasterxml.jackson.datatype:jackson-datatype-json-org@2.10.0; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/com/fasterxml/jackson/jackson-bom/2.8.11.20181123/jackson-bom-2.8.11.20181123.pom
    • Could not upgrade com.fasterxml.jackson.datatype:jackson-datatype-jsr310@2.8.11 to com.fasterxml.jackson.datatype:jackson-datatype-jsr310@2.10.0; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/com/fasterxml/jackson/jackson-bom/2.8.11.20181123/jackson-bom-2.8.11.20181123.pom
    • Could not upgrade io.dropwizard.metrics:metrics-json@3.1.5 to io.dropwizard.metrics:metrics-json@4.1.17; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/1.5.22.RELEASE/spring-boot-dependencies-1.5.22.RELEASE.pom
    • Could not upgrade io.dropwizard.metrics:metrics-servlets@3.1.5 to io.dropwizard.metrics:metrics-servlets@4.1.17; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/1.5.22.RELEASE/spring-boot-dependencies-1.5.22.RELEASE.pom
    • Could not upgrade org.springframework.boot:spring-boot-actuator@1.5.22.RELEASE to org.springframework.boot:spring-boot-actuator@2.0.0.RELEASE; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/1.5.22.RELEASE/spring-boot-dependencies-1.5.22.RELEASE.pom
    • Could not upgrade org.springframework.boot:spring-boot-starter-cloud-connectors@1.5.22.RELEASE to org.springframework.boot:spring-boot-starter-cloud-connectors@2.1.11.RELEASE; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/1.5.22.RELEASE/spring-boot-dependencies-1.5.22.RELEASE.pom
    • Could not upgrade org.springframework.boot:spring-boot-starter-web@1.5.22.RELEASE to org.springframework.boot:spring-boot-starter-web@2.0.0.RELEASE; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/1.5.22.RELEASE/spring-boot-dependencies-1.5.22.RELEASE.pom
    • Could not upgrade org.springframework.cloud:spring-cloud-starter-config@1.2.2.RELEASE to org.springframework.cloud:spring-cloud-starter-config@1.4.4.RELEASE; Reason could not apply upgrade, dependency is managed externally ; Location: provenance does not contain location
    • Could not upgrade org.springframework.cloud:spring-cloud-starter-eureka@1.2.5.RELEASE to org.springframework.cloud:spring-cloud-starter-eureka@1.4.0.RELEASE; Reason could not apply upgrade, dependency is managed externally ; Location: provenance does not contain location

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Deserialization of Untrusted Data
🦉 Deserialization of Untrusted Data
🦉 Deserialization of Untrusted Data
🦉 More lessons are available in Snyk Learn

Centaurioun and others added 3 commits January 11, 2023 20:12
…bilities (#425)

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-DEBUG-3227433

Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: null <null>

Signed-off-by: null <null>
…uce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1009829
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1047324
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052449
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1052450
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1054588
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056414
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056416
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056417
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056418
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056419
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056420
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056421
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056424
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056425
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056426
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1056427
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1061931
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-450207
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-450917
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-455617
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-467014
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-467015
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-467016
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-469674
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-469676
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-471943
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-472980
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-540500
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-548451
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-559094
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-559106
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-560762
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-560766
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561362
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561373
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561585
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561586
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-561587
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-564887
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-564888
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572300
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314
- https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants