Guest

Preview Tool

Cisco Bug: CSCvv80261 - mural5.0p2 ciam alerts for fasterxml-com-jacksonhome jackson-databind 2.

Last Modified

Oct 13, 2020

Products (1)

Known Affected Releases

5.0P4

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2017-15095 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15095
CVE-2017-7525 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525
CVE-2018-14718 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14718
CVE-2018-14719 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14719
CVE-2018-14720 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14720
CVE-2018-14721 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721
CVE-2018-19360 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360
CVE-2018-19361 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19361
CVE-2018-19362 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362
CVE-2018-5968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5968
CVE-2018-7489 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7489
CVE-2019-14540 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540
CVE-2019-14892 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14892
CVE-2019-14893 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893
CVE-2019-16335 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16335
CVE-2019-16942 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942
CVE-2019-16943 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943
CVE-2019-17267 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17267
CVE-2019-17531 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531
CVE-2019-20330 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330
CVE-2020-10672 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10672
CVE-2020-10673 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10673
CVE-2020-10968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10968
CVE-2020-10969 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969
CVE-2020-11111 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11111
CVE-2020-11112 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112
CVE-2020-11113 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113
CVE-2020-11619 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619
CVE-2020-11620 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620
CVE-2020-14060 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060
CVE-2020-14061 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061
CVE-2020-14062 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062
CVE-2020-14195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195
CVE-2020-24616 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616
CVE-2020-8840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840
CVE-2020-9546 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546
CVE-2020-9547 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547
CVE-2020-9548 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548

The affected third-party software component has been upgraded to a version that includes fixes for the vulnerability. Future versions of the product(s) will not be affected by this vulnerability.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.