Git Product home page Git Product logo

javavulnerablelab-1's People

javavulnerablelab-1's Issues

CX: CVE-2018-3258 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

HIGH Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: CVE-2018-3258

Package Name: mysql:mysql-connector-java

Severity: HIGH

CVSS Score: 8.8

Publish Date: 2018-10-17T01:31:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

Reference – NVD link

CX: Cx2906ba70-607a in Yarn-org.json:json and 20131018 @ JavaVulnerableLab-1.refs/heads/master

Description

The package JSON-java before 20171018 is vulnerable to Denial Of Service attack. The function unescape() used in multiple java files, unescapes a given XML string twice, causing the application to crash, due to StringIndexOutOfBoundsException.

HIGH Vulnerable Package issue exists @ org.json:json in branch refs/heads/master

Vulnerability ID: Cx2906ba70-607a

Package Name: org.json:json

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2017-08-18T09:31:00

Current Package Version: 20131018

Remediation Upgrade Recommendation: 20200518

Link To SCA

CX: CVE-2017-3586 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).

MEDIUM Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: CVE-2017-3586

Package Name: mysql:mysql-connector-java

Severity: MEDIUM

CVSS Score: 6.4

Publish Date: 2017-04-24T19:59:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

Reference – NVD link

CX: CVE-2020-25638 in Yarn-org.hibernate:hibernate-core and 4.0.1.Final @ JavaVulnerableLab-1.refs/heads/master

Description

A flaw was found in hibernate-core in versions prior to 5.3.20.Final and from 5.4.0.CR1 to 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.

HIGH Vulnerable Package issue exists @ org.hibernate:hibernate-core in branch refs/heads/master

Vulnerability ID: CVE-2020-25638

Package Name: org.hibernate:hibernate-core

Severity: HIGH

CVSS Score: 7.4

Publish Date: 2020-09-22T16:32:00

Current Package Version: 4.0.1.Final

Remediation Upgrade Recommendation: 5.3.20.Final

Link To SCA

Reference – NVD link

CX: CVE-2020-1757 in Yarn-io.undertow:undertow-core and 2.0.9.Final @ JavaVulnerableLab-1.refs/heads/master

Description

A flaw was found in all undertow-2.x.x SP1 versions prior to undertow-2.0.30.SP1, all undertow-1.x.x and undertow-2.x.x versions prior to undertow-2.1.0.Final, where the Servlet container causes servletPath to normalize incorrectly by truncating the path after semicolon which may lead to an application mapping resulting in the security bypass.

HIGH Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master

Vulnerability ID: CVE-2020-1757

Package Name: io.undertow:undertow-core

Severity: HIGH

CVSS Score: 8.1

Publish Date: 2020-04-21T17:15:00

Current Package Version: 2.0.9.Final

Remediation Upgrade Recommendation: 2.0.33.Final

Link To SCA

Reference – NVD link

CX: CVE-2020-10705 in Yarn-io.undertow:undertow-core and 2.0.9.Final @ JavaVulnerableLab-1.refs/heads/master

Description

A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service.

HIGH Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master

Vulnerability ID: CVE-2020-10705

Package Name: io.undertow:undertow-core

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2020-06-10T20:15:00

Current Package Version: 2.0.9.Final

Remediation Upgrade Recommendation: 2.0.33.Final

Link To SCA

Reference – NVD link

CX: Cx6f651376-312a in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

MySQL Connector/J before version 5.1.44 and 6.x is vulnerable to memory leak. When using cached server-side prepared statements, a memory leak occurred as references to opened statements were being kept while the statements were being decached; it happened when either the close() method has been called twice on a statement, or when there were conflicting cache entries for a statement and the older entry had not been closed and removed from the opened statement list.

HIGH Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: Cx6f651376-312a

Package Name: mysql:mysql-connector-java

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2017-08-14T23:00:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

CX: CVE-2020-13934 in Yarn-org.apache.tomcat:tomcat-coyote and 9.0.22 @ JavaVulnerableLab-1.refs/heads/master

Description

An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.0.x to 8.5.56 and 7.x did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.

HIGH Vulnerable Package issue exists @ org.apache.tomcat:tomcat-coyote in branch refs/heads/master

Vulnerability ID: CVE-2020-13934

Package Name: org.apache.tomcat:tomcat-coyote

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2020-07-14T15:15:00

Current Package Version: 9.0.22

Remediation Upgrade Recommendation: 9.0.40

Link To SCA

Reference – NVD link

CX: CVE-2017-3523 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.40 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).

HIGH Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: CVE-2017-3523

Package Name: mysql:mysql-connector-java

Severity: HIGH

CVSS Score: 8.5

Publish Date: 2017-04-24T19:59:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

Reference – NVD link

CX: CVE-2015-6420 in Yarn-commons-collections:commons-collections and 3.2.1 @ JavaVulnerableLab-1.refs/heads/master

Description

Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

HIGH Vulnerable Package issue exists @ commons-collections:commons-collections in branch refs/heads/master

Vulnerability ID: CVE-2015-6420

Package Name: commons-collections:commons-collections

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2015-12-15T05:59:00

Current Package Version: 3.2.1

Remediation Upgrade Recommendation: 3.2.2

Link To SCA

Reference – NVD link

CX: CVE-2015-7501 in Yarn-commons-collections:commons-collections and 3.2.1 @ JavaVulnerableLab-1.refs/heads/master

Description

Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

HIGH Vulnerable Package issue exists @ commons-collections:commons-collections in branch refs/heads/master

Vulnerability ID: CVE-2015-7501

Package Name: commons-collections:commons-collections

Severity: HIGH

CVSS Score: 9.8

Publish Date: 2017-11-09T17:29:00

Current Package Version: 3.2.1

Remediation Upgrade Recommendation: 3.2.2

Link To SCA

Reference – NVD link

CX: Cxdb5a1032-eda2 in Yarn-org.json:json and 20131018 @ JavaVulnerableLab-1.refs/heads/master

Description

The package JSON-java before 20200518 is vulnerable to Denial Of Service. The function nextMeta in the file XMLTokener.java runs into an infinite loop as the JSONTokener.nextMeta() function
returns the same character repeatedly and never advances the Tokener index. Due to this flaw, the availability of the application is affected.

HIGH Vulnerable Package issue exists @ org.json:json in branch refs/heads/master

Vulnerability ID: Cxdb5a1032-eda2

Package Name: org.json:json

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2019-09-17T10:37:00

Current Package Version: 20131018

Remediation Upgrade Recommendation: 20200518

Link To SCA

CX: CVE-2018-1000632 in Yarn-dom4j:dom4j and 1.6.1 @ JavaVulnerableLab-1.refs/heads/master

Description

dom4j prior to 2.0.3 and 2.1.x prior to 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document.
To resolve this issue - upgrade to version 2.0.3 or 2.1.1. Please note: the package name was changed to org.dom4j:dom4j on version 2.0.0.

HIGH Vulnerable Package issue exists @ dom4j:dom4j in branch refs/heads/master

Vulnerability ID: CVE-2018-1000632

Package Name: dom4j:dom4j

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2018-08-20T19:31:00

Current Package Version: 1.6.1

Remediation Upgrade Recommendation:

Link To SCA

Reference – NVD link

CX: CVE-2020-1938 in Yarn-org.apache.tomcat:tomcat-coyote and 9.0.22 @ JavaVulnerableLab-1.refs/heads/master

Description

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.

HIGH Vulnerable Package issue exists @ org.apache.tomcat:tomcat-coyote in branch refs/heads/master

Vulnerability ID: CVE-2020-1938

Package Name: org.apache.tomcat:tomcat-coyote

Severity: HIGH

CVSS Score: 9.8

Publish Date: 2020-02-24T22:15:00

Current Package Version: 9.0.22

Remediation Upgrade Recommendation: 9.0.40

Link To SCA

Reference – NVD link

CX: CVE-2020-2875 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).

MEDIUM Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: CVE-2020-2875

Package Name: mysql:mysql-connector-java

Severity: MEDIUM

CVSS Score: 4.7

Publish Date: 2020-04-15T14:15:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

Reference – NVD link

CX: CVE-2019-3888 in Yarn-io.undertow:undertow-core and 2.0.9.Final @ JavaVulnerableLab-1.refs/heads/master

Description

A vulnerability was found in Undertow web server up to 1.0.0.Alpha19, between 1.3.0.Beta9 to 1.3.0.Beta13, 1.3.0.CR.x, between 1.3.0.Final to 1.4.27.Final and 2.0.x before 2.0.20.Final. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)

HIGH Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master

Vulnerability ID: CVE-2019-3888

Package Name: io.undertow:undertow-core

Severity: HIGH

CVSS Score: 9.8

Publish Date: 2019-06-12T14:29:00

Current Package Version: 2.0.9.Final

Remediation Upgrade Recommendation: 2.0.33.Final

Link To SCA

Reference – NVD link

CX: CVE-2020-2933 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 5.1.48 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).

LOW Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: CVE-2020-2933

Package Name: mysql:mysql-connector-java

Severity: LOW

CVSS Score: 2.2

Publish Date: 2020-04-15T14:15:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

Reference – NVD link

CX: CVE-2019-2692 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

MEDIUM Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: CVE-2019-2692

Package Name: mysql:mysql-connector-java

Severity: MEDIUM

CVSS Score: 6.3

Publish Date: 2019-04-23T19:32:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

Reference – NVD link

CX: CVE-2019-17569 in Yarn-org.apache.tomcat:tomcat-coyote and 9.0.22 @ JavaVulnerableLab-1.refs/heads/master

Description

The refactoring present in Apache Tomcat before 8.5.51 and 9.x before 9.0.31 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.

MEDIUM Vulnerable Package issue exists @ org.apache.tomcat:tomcat-coyote in branch refs/heads/master

Vulnerability ID: CVE-2019-17569

Package Name: org.apache.tomcat:tomcat-coyote

Severity: MEDIUM

CVSS Score: 4.8

Publish Date: 2020-02-24T22:15:00

Current Package Version: 9.0.22

Remediation Upgrade Recommendation: 9.0.40

Link To SCA

Reference – NVD link

CX: Cx7ef609d2-efb5 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

MySQL Connector/J before 5.1.31 is vulnerable to Memory Leak. Upon continuous interruption between the server and the database, the dead connections are accumulated in a map in ProfilerEventHandlerFactory factory and aren't removed from the memory. When the number of database connections reaches a certain number, it causes the application to throw an OutOfMemoryException as the garbage collector fails to collect the dead connections.

HIGH Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: Cx7ef609d2-efb5

Package Name: mysql:mysql-connector-java

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2010-08-01T23:00:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

CX: CVE-2019-10212 in Yarn-io.undertow:undertow-core and 2.0.9.Final @ JavaVulnerableLab-1.refs/heads/master

Description

A flaw was found in versions before 2.0.27.Final, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.

HIGH Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master

Vulnerability ID: CVE-2019-10212

Package Name: io.undertow:undertow-core

Severity: HIGH

CVSS Score: 9.8

Publish Date: 2019-10-02T19:15:00

Current Package Version: 2.0.9.Final

Remediation Upgrade Recommendation: 2.0.33.Final

Link To SCA

Reference – NVD link

CX: CVE-2020-10687 in Yarn-io.undertow:undertow-core and 2.0.9.Final @ JavaVulnerableLab-1.refs/heads/master

Description

A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.

MEDIUM Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master

Vulnerability ID: CVE-2020-10687

Package Name: io.undertow:undertow-core

Severity: MEDIUM

CVSS Score: 6.5

Publish Date: 2020-09-23T13:15:00

Current Package Version: 2.0.9.Final

Remediation Upgrade Recommendation: 2.0.33.Final

Link To SCA

Reference – NVD link

CX: CVE-2020-2934 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.19 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).

MEDIUM Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: CVE-2020-2934

Package Name: mysql:mysql-connector-java

Severity: MEDIUM

CVSS Score: 5.0

Publish Date: 2020-04-15T14:15:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

Reference – NVD link

CX: CVE-2020-10683 in Yarn-dom4j:dom4j and 1.6.1 @ JavaVulnerableLab-1.refs/heads/master

Description

dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.

HIGH Vulnerable Package issue exists @ dom4j:dom4j in branch refs/heads/master

Vulnerability ID: CVE-2020-10683

Package Name: dom4j:dom4j

Severity: HIGH

CVSS Score: 9.8

Publish Date: 2020-05-01T19:15:00

Current Package Version: 1.6.1

Remediation Upgrade Recommendation:

Link To SCA

Reference – NVD link

CX: CVE-2019-14900 in Yarn-org.hibernate:hibernate-core and 4.0.1.Final @ JavaVulnerableLab-1.refs/heads/master

Description

A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

MEDIUM Vulnerable Package issue exists @ org.hibernate:hibernate-core in branch refs/heads/master

Vulnerability ID: CVE-2019-14900

Package Name: org.hibernate:hibernate-core

Severity: MEDIUM

CVSS Score: 6.5

Publish Date: 2019-01-15T00:00:00

Current Package Version: 4.0.1.Final

Remediation Upgrade Recommendation: 5.3.20.Final

Link To SCA

Reference – NVD link

CX: CVE-2020-10719 in Yarn-io.undertow:undertow-core and 2.0.9.Final @ JavaVulnerableLab-1.refs/heads/master

Description

A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.

MEDIUM Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master

Vulnerability ID: CVE-2020-10719

Package Name: io.undertow:undertow-core

Severity: MEDIUM

CVSS Score: 6.5

Publish Date: 2020-05-26T16:15:00

Current Package Version: 2.0.9.Final

Remediation Upgrade Recommendation: 2.0.33.Final

Link To SCA

Reference – NVD link

CX: Cx08fcacc9-cb99 in Yarn-org.json:json and 20131018 @ JavaVulnerableLab-1.refs/heads/master

Description

The package JSON-java before 20180130 is vulnerable to Denial of service. The method JSONArray() in class JSONArray() of file JSONArray.java, doesn't check for unclosed array while parsing, causing the application to crash, due to an StackOverflowException. This affects the Availability of the application.

HIGH Vulnerable Package issue exists @ org.json:json in branch refs/heads/master

Vulnerability ID: Cx08fcacc9-cb99

Package Name: org.json:json

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2017-10-30T11:27:00

Current Package Version: 20131018

Remediation Upgrade Recommendation: 20200518

Link To SCA

CX: CVE-2020-1935 in Yarn-org.apache.tomcat:tomcat-coyote and 9.0.22 @ JavaVulnerableLab-1.refs/heads/master

Description

In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.

MEDIUM Vulnerable Package issue exists @ org.apache.tomcat:tomcat-coyote in branch refs/heads/master

Vulnerability ID: CVE-2020-1935

Package Name: org.apache.tomcat:tomcat-coyote

Severity: MEDIUM

CVSS Score: 4.8

Publish Date: 2020-02-24T22:15:00

Current Package Version: 9.0.22

Remediation Upgrade Recommendation: 9.0.40

Link To SCA

Reference – NVD link

CX: CVE-2020-1745 in Yarn-io.undertow:undertow-core and 2.0.9.Final @ JavaVulnerableLab-1.refs/heads/master

Description

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

HIGH Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master

Vulnerability ID: CVE-2020-1745

Package Name: io.undertow:undertow-core

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2020-04-28T15:15:00

Current Package Version: 2.0.9.Final

Remediation Upgrade Recommendation: 2.0.33.Final

Link To SCA

Reference – NVD link

CX: CVE-2020-17527 in Yarn-org.apache.tomcat:tomcat-coyote and 9.0.22 @ JavaVulnerableLab-1.refs/heads/master

Description

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

HIGH Vulnerable Package issue exists @ org.apache.tomcat:tomcat-coyote in branch refs/heads/master

Vulnerability ID: CVE-2020-17527

Package Name: org.apache.tomcat:tomcat-coyote

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2020-12-03T19:15:00

Current Package Version: 9.0.22

Remediation Upgrade Recommendation: 9.0.40

Link To SCA

Reference – NVD link

CX: CVE-2020-11996 in Yarn-org.apache.tomcat:tomcat-coyote and 9.0.22 @ JavaVulnerableLab-1.refs/heads/master

Description

A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.

HIGH Vulnerable Package issue exists @ org.apache.tomcat:tomcat-coyote in branch refs/heads/master

Vulnerability ID: CVE-2020-11996

Package Name: org.apache.tomcat:tomcat-coyote

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2020-06-26T17:15:00

Current Package Version: 9.0.22

Remediation Upgrade Recommendation: 9.0.40

Link To SCA

Reference – NVD link

CX: CVE-2017-3589 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

MEDIUM Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: CVE-2017-3589

Package Name: mysql:mysql-connector-java

Severity: MEDIUM

CVSS Score: 3.3

Publish Date: 2017-04-24T19:59:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

Reference – NVD link

CX: Cx78f40514-81ff in Yarn-commons-collections:commons-collections and 3.2.1 @ JavaVulnerableLab-1.refs/heads/master

Description

The framework Apache Commons Collections before 4.3 is vulnerable to
Stack Overflow. The function add() in the file src/main/java/org/apache/commons/collections4/list/SetUniqueList.java throws a StackOverflowError when the add() method is called with its own list.
To resolve this issue - upgrade to version 4.3. Please note: the package name was changed to org.apache.commons:commons-collections4 on version 4.0.

HIGH Vulnerable Package issue exists @ commons-collections:commons-collections in branch refs/heads/master

Vulnerability ID: Cx78f40514-81ff

Package Name: commons-collections:commons-collections

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2018-10-31T10:39:00

Current Package Version: 3.2.1

Remediation Upgrade Recommendation:

Link To SCA

CX: CVE-2020-14340 in Yarn-org.jboss.xnio:xnio-nio and 3.3.8.Final @ JavaVulnerableLab-1.refs/heads/master

Description

XNIO prior to 3.7.9.Final and 3.8.0.Final through 3.8.1.Final has a file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. This may allow an attacker to cause a denial of service.

MEDIUM Vulnerable Package issue exists @ org.jboss.xnio:xnio-nio in branch refs/heads/master

Vulnerability ID: CVE-2020-14340

Package Name: org.jboss.xnio:xnio-nio

Severity: MEDIUM

CVSS Score: 5.9

Publish Date: 2020-07-24T09:52:00

Current Package Version: 3.3.8.Final

Remediation Upgrade Recommendation: 3.7.9.Final

Link To SCA

Reference – NVD link

CX: CVE-2015-2575 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

MySQL Connector/J before 5.1.35 is vulnerable to SQL Injection. The function quoteIdentifier() in the file src/com/mysql/jdbc/StringUtils.java doesn't check if the identifier is correctly quoted and if quotes within are correctly escaped in the given indentifier, allowing an attacker to inject malicious queries.

HIGH Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: CVE-2015-2575

Package Name: mysql:mysql-connector-java

Severity: HIGH

CVSS Score: 9.1

Publish Date: 2014-12-06T00:00:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

Reference – NVD link

CX: Cx039cb67c-ead3 in Yarn-mysql:mysql-connector-java and 5.1.26 @ JavaVulnerableLab-1.refs/heads/master

Description

MySQL Connector/J before 5.1.37 is vulnerable to Memory Leak. The method methodCompressedInputStream.getNextPacketFromServer() of src/com/mysq/jdbc/CompressedInputStream.java has high memory and garbage collection usage caused by the consecutive instantiation of a new inflater.

HIGH Vulnerable Package issue exists @ mysql:mysql-connector-java in branch refs/heads/master

Vulnerability ID: Cx039cb67c-ead3

Package Name: mysql:mysql-connector-java

Severity: HIGH

CVSS Score: 7.5

Publish Date: 2015-08-16T23:00:00

Current Package Version: 5.1.26

Remediation Upgrade Recommendation: 8.0.20

Link To SCA

CX: CVE-2020-13943 in Yarn-org.apache.tomcat:tomcat-coyote and 9.0.22 @ JavaVulnerableLab-1.refs/heads/master

Description

If an HTTP/2 client connecting to Apache Tomcat between 10.0.0-M1 and 10.0.0-M7, between 9.0.0.M1 and 9.0.37, and between 8.5.0 and 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

MEDIUM Vulnerable Package issue exists @ org.apache.tomcat:tomcat-coyote in branch refs/heads/master

Vulnerability ID: CVE-2020-13943

Package Name: org.apache.tomcat:tomcat-coyote

Severity: MEDIUM

CVSS Score: 4.3

Publish Date: 2020-10-12T14:15:00

Current Package Version: 9.0.22

Remediation Upgrade Recommendation: 9.0.40

Link To SCA

Reference – NVD link

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.