Conversation
… vulnerabilities The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-15907551
|
This set of upgrades includes a major version increase for jersey-media-json-jackson (2.37 → 3.0.4) - HIGH RISKThe upgrade to Jersey 3.x is driven by the transition from Java EE to Jakarta EE. This is a major breaking change that requires developer action. Key Breaking Changes:
Recommendation: Before merging, a thorough migration of all Jackson Upgrades (2.19.2 → 2.21.2) - LOW RISKThe upgrades for
These upgrades are considered safe and should not introduce breaking changes for applications already running on Java 8 or newer. Source: Jersey 3.x Migration Guide, Jackson 2.20 Release Notes, Jackson 2.21 Release Notes
|
|
| Status | Scan Engine | Total (0) | ||||
|---|---|---|---|---|---|---|
| Open Source Security | 0 | 0 | 0 | 0 | See details | |
| Licenses | 0 | 0 | 0 | 0 | See details | |
| ✅ | Code Security | 0 | 0 | 0 | 0 | 0 issues |
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.
Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
samples/client/others/java/jersey2-oneOf-Mixed/pom.xmlVulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-COMFASTERXMLJACKSONCORE-15907551
2.19.2->2.21.2com.fasterxml.jackson.core:jackson-databind:
2.19.2->2.21.2com.fasterxml.jackson.datatype:jackson-datatype-jsr310:
2.19.2->2.21.2org.glassfish.jersey.media:jersey-media-json-jackson:
2.37->3.0.4Major version upgradeNo Path FoundNo Known ExploitBreaking Change Risk
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Allocation of Resources Without Limits or Throttling