GithubHelp home page GithubHelp logo

c_file_test's People

Contributors

h-459 avatar mend-for-github-com[bot] avatar

Watchers

 avatar

c_file_test's Issues

jackson-databind-2.13.0.jar: 5 vulnerabilities (highest severity is: 7.5)

Vulnerable Library - jackson-databind-2.13.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/jackson-databind-2.13.0.jar

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (jackson-databind version) Remediation Available
CVE-2022-42004 High 7.5 jackson-databind-2.13.0.jar Direct 2.13.4
CVE-2022-42003 High 7.5 jackson-databind-2.13.0.jar Direct 2.13.4.1
CVE-2020-36518 High 7.5 jackson-databind-2.13.0.jar Direct 2.13.2.1
CVE-2021-46877 High 7.5 jackson-databind-2.13.0.jar Direct 2.13.1
WS-2021-0616 Medium 5.9 jackson-databind-2.13.0.jar Direct 2.13.1

Details

CVE-2022-42004

Vulnerable Library - jackson-databind-2.13.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/jackson-databind-2.13.0.jar

Dependency Hierarchy:

  • jackson-databind-2.13.0.jar (Vulnerable Library)

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Found in base branch: main

Vulnerability Details

In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.

Publish Date: 2022-10-02

URL: CVE-2022-42004

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2022-10-02

Fix Resolution: 2.13.4

In order to enable automatic remediation, please create workflow rules

CVE-2022-42003

Vulnerable Library - jackson-databind-2.13.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/jackson-databind-2.13.0.jar

Dependency Hierarchy:

  • jackson-databind-2.13.0.jar (Vulnerable Library)

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Found in base branch: main

Vulnerability Details

In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. Additional fix version in 2.13.4.1 and 2.12.17.1

Publish Date: 2022-10-02

URL: CVE-2022-42003

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2022-10-02

Fix Resolution: 2.13.4.1

In order to enable automatic remediation, please create workflow rules

CVE-2020-36518

Vulnerable Library - jackson-databind-2.13.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/jackson-databind-2.13.0.jar

Dependency Hierarchy:

  • jackson-databind-2.13.0.jar (Vulnerable Library)

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Found in base branch: main

Vulnerability Details

jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
Mend Note: After conducting further research, Mend has determined that all versions of com.fasterxml.jackson.core:jackson-databind up to version 2.13.2 are vulnerable to CVE-2020-36518.

Publish Date: 2022-03-11

URL: CVE-2020-36518

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2022-03-11

Fix Resolution: 2.13.2.1

In order to enable automatic remediation, please create workflow rules

CVE-2021-46877

Vulnerable Library - jackson-databind-2.13.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/jackson-databind-2.13.0.jar

Dependency Hierarchy:

  • jackson-databind-2.13.0.jar (Vulnerable Library)

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Found in base branch: main

Vulnerability Details

jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.

Publish Date: 2023-03-18

URL: CVE-2021-46877

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2021-46877

Release Date: 2023-03-18

Fix Resolution: 2.13.1

In order to enable automatic remediation, please create workflow rules

WS-2021-0616

Vulnerable Library - jackson-databind-2.13.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/jackson-databind-2.13.0.jar

Dependency Hierarchy:

  • jackson-databind-2.13.0.jar (Vulnerable Library)

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Found in base branch: main

Vulnerability Details

FasterXML jackson-databind before 2.12.6 and 2.13.1 there is DoS when using JDK serialization to serialize JsonNode.

Publish Date: 2021-11-20

URL: WS-2021-0616

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-11-20

Fix Resolution: 2.13.1

In order to enable automatic remediation, please create workflow rules


In order to enable automatic remediation for this issue, please create workflow rules

plexus-utils-3.0.22.jar: 4 vulnerabilities (highest severity is: 5.9)

Vulnerable Library - plexus-utils-3.0.22.jar

A collection of various utility classes to ease working with strings, files, command lines, XML and more.

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/plexus-utils-3.0.22.jar

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (plexus-utils version) Remediation Available
WS-2016-7057 Medium 5.9 plexus-utils-3.0.22.jar Direct 3.0.24
WS-2016-7062 Medium 5.3 plexus-utils-3.0.22.jar Direct 3.0.24
CVE-2022-4244 Medium 5.3 plexus-utils-3.0.22.jar Direct 3.0.24
CVE-2022-4245 Medium 4.3 plexus-utils-3.0.22.jar Direct 3.0.24

Details

WS-2016-7057

Vulnerable Library - plexus-utils-3.0.22.jar

A collection of various utility classes to ease working with strings, files, command lines, XML and more.

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/plexus-utils-3.0.22.jar

Dependency Hierarchy:

  • plexus-utils-3.0.22.jar (Vulnerable Library)

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Found in base branch: main

Vulnerability Details

Plexus-utils before 3.0.24 are vulnerable to Directory Traversal

Publish Date: 2016-05-07

URL: WS-2016-7057

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2016-05-07

Fix Resolution: 3.0.24

In order to enable automatic remediation, please create workflow rules

WS-2016-7062

Vulnerable Library - plexus-utils-3.0.22.jar

A collection of various utility classes to ease working with strings, files, command lines, XML and more.

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/plexus-utils-3.0.22.jar

Dependency Hierarchy:

  • plexus-utils-3.0.22.jar (Vulnerable Library)

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Found in base branch: main

Vulnerability Details

Security vulnerability found in plexus-utils before 3.0.24. XML injection found in XmlWriterUtil.java.

Publish Date: 2016-05-07

URL: WS-2016-7062

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2016-05-07

Fix Resolution: 3.0.24

In order to enable automatic remediation, please create workflow rules

CVE-2022-4244

Vulnerable Library - plexus-utils-3.0.22.jar

A collection of various utility classes to ease working with strings, files, command lines, XML and more.

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/plexus-utils-3.0.22.jar

Dependency Hierarchy:

  • plexus-utils-3.0.22.jar (Vulnerable Library)

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Found in base branch: main

Vulnerability Details

CVE-2022-4244 codehaus-plexus: Directory Traversal

Publish Date: 2022-12-01

URL: CVE-2022-4244

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2022-12-01

Fix Resolution: 3.0.24

In order to enable automatic remediation, please create workflow rules

CVE-2022-4245

Vulnerable Library - plexus-utils-3.0.22.jar

A collection of various utility classes to ease working with strings, files, command lines, XML and more.

Path to dependency file: /pom.xml

Path to vulnerable library: /tmp/ws-ua_20230511080124_GJTDPM/downloadResource_XHOKWJ/20230511080145/plexus-utils-3.0.22.jar

Dependency Hierarchy:

  • plexus-utils-3.0.22.jar (Vulnerable Library)

Found in HEAD commit: c1356b5718aa1d3963efd61c3d47aec9f217538c

Found in base branch: main

Vulnerability Details

CVE-2022-4245 codehaus-plexus: XML External Entity (XXE) Injection

Publish Date: 2022-12-01

URL: CVE-2022-4245

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.suse.com/show_bug.cgi?id=1205930

Release Date: 2022-12-01

Fix Resolution: 3.0.24

In order to enable automatic remediation, please create workflow rules


In order to enable automatic remediation for this issue, please create workflow rules

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.