jackson-databind vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jackson-databind package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Sensitive Information Uncleared Before Release

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Improper Input Validation

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Deserialization of Untrusted Data

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Static Code Injection

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Deserialization of Untrusted Data

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Deserialization of Untrusted Data

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Deserialization of Untrusted Data

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Static Code Injection

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Deserialization of Untrusted Data

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
HTTP Request Smuggling

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Improper Input Validation

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Improper Certificate Validation

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Cross-site Scripting (XSS)

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • H
Deserialization of Untrusted Data

<0:2.9.9.2-1.module+el8.0.0+3892+c903d3f0
  • H
Race Condition

<0:2.9.8-1.module+el8.0.0+3248+9d514f3b
  • H
Improper Input Validation

<0:2.9.8-1.module+el8.0.0+3248+9d514f3b
  • H
Improper Access Control

<0:2.9.8-1.module+el8.0.0+3248+9d514f3b
  • H
Resource Injection

<0:2.9.8-1.module+el8.0.0+3248+9d514f3b
  • M
Deserialization of Untrusted Data

<0:2.9.9.2-1.module+el8.1.0+3832+9784644d
  • M
Deserialization of Untrusted Data

<0:2.9.9.2-1.module+el8.1.0+3832+9784644d
  • M
Deserialization of Untrusted Data

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Deserialization of Untrusted Data

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Deserialization of Untrusted Data

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Deserialization of Untrusted Data

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • M
Improper Authorization

<0:2.10.0-1.module+el8.2.0+5059+3eb3af25
  • L
XML External Entity (XXE) Injection

*
  • L
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*