GitHub user robertdale opened a pull request: https://github.com/apache/tinkerpop/pull/930
TINKERPOP-2032 bump jython-standalone 2.7.1 https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451 Overview org.python:jython-standalone Affected versions of this package are vulnerable to Arbitrary Code Execution by sending a serialized function to the deserializer, which in turn will execute the code. References [CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000) [Jython Bug Report](http://bugs.jython.org/issue2454) [Fix Commit](https://hg.python.org/jython/rev/d06e29d100c0) You can merge this pull request into a Git repository by running: $ git pull https://github.com/apache/tinkerpop TINKERPOP-2032 Alternatively you can review and apply these changes as the patch at: https://github.com/apache/tinkerpop/pull/930.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #930 ---- commit f70d108e0e9cace79565c658e6bac5c7e9f045ba Author: Robert Dale <robdale@...> Date: 2018-09-11T12:35:33Z TINKERPOP-2032 bump jython-standalone 2.7.1 ---- ---