com.fasterxml.jackson.core:jackson-core@2.7.0-rc3 vulnerabilities
-
latest version
2.18.1
-
latest non vulnerable version
-
first published
13 years ago
-
latest version published
8 days ago
-
licenses detected
- [2.0.0-RC1,2.2.1); [2.4.0-rc1,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the com.fasterxml.jackson.core:jackson-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation Affected versions of this package are vulnerable to Denial of Service (DoS) due to missing input size validation when performing numeric type conversions. A remote attacker can exploit this vulnerability by causing the application to deserialize data containing certain numeric types with large values, causing the application to exhaust all available resources. How to fix Denial of Service (DoS)? Upgrade |
[2.0.0-RC1,2.15.0-rc1)
|
com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation Affected versions of this package are vulnerable to Denial of Service (DoS). If the REST endpoint consumes POST requests with JSON or XML data and data are invalid, the first unrecognized token is printed to server.log
How to fix Denial of Service (DoS)? Upgrade |
[,2.8.6)
|
com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation Affected versions of this package are vulnerable to Denial of Service (DoS). When
How to fix Denial of Service (DoS)? Upgrade |
[2.3.0-rc1,2.7.7)
|