Security Vulnerability
| We recently discovered and fixed an important security vulnerability within the Payara Server and Payara Micro products. A path traversal security issue was found when the application is deployed under the ROOT context root ( /), which allowed a hacker to read from the file system of the server running the application. We highly recommend that you upgrade to this version to avoid the security issue. | 
Bug Fixes
- 
[FISH-6392] Improve memory management of ALPN negotiator maps in Grizzly NPN NegotiationSupport class 
- 
[FISH-6389] Update Woodstox-core to 5.3.0 
- 
[FISH-6298] OpenAPI document doesn’t take into account multiple applications deployment 
- 
[FISH-6276] The Healthcheck Service for Hogging threads throws ArithmeticException 
- 
[FISH-6072] WebSocket Redeployment Fails