Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/eap7-jackson-databind@2.8.11.6-2.SP1_redhat_00002.1.ep7?arch=el7
purl pkg:rpm/redhat/eap7-jackson-databind@2.8.11.6-2.SP1_redhat_00002.1.ep7?arch=el7
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (14)
Vulnerability Summary Fixed by
VCID-5qfd-jjh1-d3fx
Aliases:
CVE-2020-10673
GHSA-fqwf-pjwf-7vqv
jackson-databind mishandles the interaction between serialization gadgets and typing FasterXML jackson-databind 2.x before 2.9.10.4 and 2.6.7.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus). There are no reported fixed by versions.
VCID-8977-tjss-w7ba
Aliases:
CVE-2021-45046
GHSA-7rjr-3q55-vv33
Incomplete fix for Apache Log4j vulnerability The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack. There are no reported fixed by versions.
VCID-9h46-72hw-bkcr
Aliases:
CVE-2022-42003
GHSA-jjjh-jjxp-wpff
Multiple vulnerabilities have been found in FasterXML jackson-databind, the worst of which could result in denial of service. There are no reported fixed by versions.
VCID-bydt-bkf4-rbh2
Aliases:
CVE-2020-9546
GHSA-5p34-5m6p-p58g
jackson-databind mishandles the interaction between serialization gadgets and typing FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). There are no reported fixed by versions.
VCID-j986-mtma-b3bw
Aliases:
CVE-2022-42889
GHSA-599f-7c49-w659
Arbitrary code execution in Apache Commons Text Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default. There are no reported fixed by versions.
VCID-jvp6-892x-nkc7
Aliases:
CVE-2020-9548
GHSA-p43x-xfjf-5jhr
jackson-databind mishandles the interaction between serialization gadgets and typing FasterXML jackson-databind 2.x before 2.9.10.4, 2.8.11.6, and 2.7.9.7 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). There are no reported fixed by versions.
VCID-jwav-88m7-6fhz
Aliases:
CVE-2021-44228
GHSA-jfh8-c2jp-5v3q
Remote code injection in Log4j Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default. Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory. There are no reported fixed by versions.
VCID-netd-rr9e-wbg5
Aliases:
CVE-2022-45047
GHSA-fhw8-8j55-vwgq
Unsafe deserialization in Apache MINA SSHD Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server. Until version 2.1.0, the code affected by this vulnerability appeared in `org.apache.sshd:sshd-core`. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package `org.apache.sshd:sshd-common`, which did not exist until version 2.1.0. There are no reported fixed by versions.
VCID-qruf-r6dc-3ugj
Aliases:
CVE-2022-41881
GHSA-fx2c-96vj-985v
HAProxyMessageDecoder Stack Exhaustion DoS ### Impact A StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. ### Patches Users should upgrade to 4.1.86.Final. ### Workarounds There is no workaround, except using a custom HaProxyMessageDecoder. ### References When parsing a TLV with type = PP2_TYPE_SSL, the value can be again a TLV with type = PP2_TYPE_SSL and so on. The only limitation of the recursion is that the TLV length cannot be bigger than 0xffff because it is encoded in an unsigned short type. Providing a TLV with a nesting level that is large enough will lead to raising of a StackOverflowError. The StackOverflowError will be caught if HAProxyMessageDecoder is used as part of Netty’s ChannelPipeline, but using it directly without the ChannelPipeline will lead to a thrown exception / crash. ### For more information If you have any questions or comments about this advisory: * Open an issue in [netty](https://github.com/netty/netty) There are no reported fixed by versions.
VCID-ruae-hqdg-m7ek
Aliases:
CVE-2020-9547
GHSA-q93h-jc49-78gg
jackson-databind mishandles the interaction between serialization gadgets and typing FasterXML jackson-databind 2.x before 2.9.10.4, 2.8.11.6, and 2.7.9.7 mishandles the interaction between serialization gadgets and typing, related to `com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig` (aka `ibatis-sqlmap`). There are no reported fixed by versions.
VCID-v2pq-1qhm-4qb9
Aliases:
CVE-2022-42004
GHSA-rgv9-q543-rqg4
Multiple vulnerabilities have been found in FasterXML jackson-databind, the worst of which could result in denial of service. There are no reported fixed by versions.
VCID-wdgx-34uc-2qa4
Aliases:
CVE-2020-10672
GHSA-95cm-88f5-f2c7
jackson-databind mishandles the interaction between serialization gadgets and typing FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms). There are no reported fixed by versions.
VCID-wp9q-eurd-43dx
Aliases:
CVE-2022-45693
GHSA-grr4-wv38-f68w
Jettison Out-of-bounds Write vulnerability Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string. There are no reported fixed by versions.
VCID-xnyb-nuwm-pkdr
Aliases:
CVE-2020-8840
GHSA-4w82-r329-3q67
Deserialization of Untrusted Data in jackson-databind FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:11:51.866113+00:00 RedHat Importer Affected by VCID-jvp6-892x-nkc7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9548.json 38.0.0
2026-04-01T14:11:27.780497+00:00 RedHat Importer Affected by VCID-ruae-hqdg-m7ek https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9547.json 38.0.0
2026-04-01T14:11:03.370541+00:00 RedHat Importer Affected by VCID-bydt-bkf4-rbh2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9546.json 38.0.0
2026-04-01T14:10:38.926582+00:00 RedHat Importer Affected by VCID-xnyb-nuwm-pkdr https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8840.json 38.0.0
2026-04-01T14:09:54.376158+00:00 RedHat Importer Affected by VCID-wdgx-34uc-2qa4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10672.json 38.0.0
2026-04-01T14:09:50.245358+00:00 RedHat Importer Affected by VCID-5qfd-jjh1-d3fx https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10673.json 38.0.0
2026-04-01T14:00:43.085189+00:00 RedHat Importer Affected by VCID-jwav-88m7-6fhz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44228.json 38.0.0
2026-04-01T14:00:41.423912+00:00 RedHat Importer Affected by VCID-8977-tjss-w7ba https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45046.json 38.0.0
2026-04-01T13:56:59.639460+00:00 RedHat Importer Affected by VCID-v2pq-1qhm-4qb9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42004.json 38.0.0
2026-04-01T13:56:58.137280+00:00 RedHat Importer Affected by VCID-9h46-72hw-bkcr https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42003.json 38.0.0
2026-04-01T13:56:44.266999+00:00 RedHat Importer Affected by VCID-j986-mtma-b3bw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42889.json 38.0.0
2026-04-01T13:56:19.008556+00:00 RedHat Importer Affected by VCID-netd-rr9e-wbg5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45047.json 38.0.0
2026-04-01T13:56:08.903174+00:00 RedHat Importer Affected by VCID-qruf-r6dc-3ugj https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41881.json 38.0.0
2026-04-01T13:56:07.429264+00:00 RedHat Importer Affected by VCID-wp9q-eurd-43dx https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45693.json 38.0.0