[root@ur-test-docker ~]# trivy bytest-harbor.ur.com.cn/api-project/api-esb-test:v1.0.172021-11-10T13:56:26.570+0800 INFO Detected OS: alpine2021-11-10T13:56:26.570+0800 INFO Detecting Alpine vulnerabilities...2021-11-10T13:56:26.879+0800 INFO Number of language-specific files: 12021-11-10T13:56:26.879+0800 INFO Detecting jar vulnerabilities...2021-11-10T13:56:28.428+0800 WARN maven constraint error ([10.5-alpha0,10.5.3.0_1]): failed to new comparer: 2 errors occurred: * improper constraint: [10.5-alpha0,10.5.3.0_1] * improper requirements: []bytest-harbor.ur.com.cn/api-project/api-esb-test:v1.0.17 (alpine 3.13.5)========================================================================Total: 5 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 2, CRITICAL: 3)+--------------+------------------+----------+-------------------+---------------+---------------------------------------+| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |+--------------+------------------+----------+-------------------+---------------+---------------------------------------+| apk-tools | CVE-2021-36159 | CRITICAL | 2.12.5-r0 | 2.12.6-r0 | libfetch before 2021-07-26, as || | | | | | used in apk-tools, xbps, and || | | | | | other products, mishandles... || | | | | | -->avd.aquasec.com/nvd/cve-2021-36159 |+--------------+------------------+ +-------------------+---------------+---------------------------------------+| libcrypto1.1 | CVE-2021-3711 | | 1.1.1k-r0 | 1.1.1l-r0 | openssl: SM2 Decryption || | | | | | Buffer Overflow || | | | | | -->avd.aquasec.com/nvd/cve-2021-3711 |+ +------------------+----------+ + +---------------------------------------+| | CVE-2021-3712 | HIGH | | | openssl: Read buffer overruns || | | | | | processing ASN.1 strings || | | | | | -->avd.aquasec.com/nvd/cve-2021-3712 |+--------------+------------------+----------+ + +---------------------------------------+| libssl1.1 | CVE-2021-3711 | CRITICAL | | | openssl: SM2 Decryption || | | | | | Buffer Overflow || | | | | | -->avd.aquasec.com/nvd/cve-2021-3711 |+ +------------------+----------+ + +---------------------------------------+| | CVE-2021-3712 | HIGH | | | openssl: Read buffer overruns || | | | | | processing ASN.1 strings || | | | | | -->avd.aquasec.com/nvd/cve-2021-3712 |+--------------+------------------+----------+-------------------+---------------+---------------------------------------+Java (jar)==========Total: 139 (UNKNOWN: 0, LOW: 7, MEDIUM: 41, HIGH: 57, CRITICAL: 34)+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| com.fasterxml.jackson.core:jackson-databind | CVE-2020-25649 | HIGH | 2.10.0 | 2.10.5.1, 2.9.10.7, 2.6.7.4 | jackson-databind: FasterXML || | | | | | DOMDeserializer insecure || | | | | | entity expansion is vulnerable || | | | | | to XML external entity... || | | | | | -->avd.aquasec.com/nvd/cve-2020-25649 |+ +------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| | CVE-2017-15095 | CRITICAL | 2.4.0 | 2.9.4, 2.8.11 | jackson-databind: Unsafe || | | | | | deserialization due to || | | | | | incomplete black list (incomplete || | | | | | fix for CVE-2017-7525)... || | | | | | -->avd.aquasec.com/nvd/cve-2017-15095 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2017-17485 | | | 2.8.11, 2.9.4 | jackson-databind: Unsafe || | | | | | deserialization due to || | | | | | incomplete black list (incomplete || | | | | | fix for CVE-2017-15095)... || | | | | | -->avd.aquasec.com/nvd/cve-2017-17485 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2017-7525 | | | 2.7.9.1, 2.6.7.1, 2.8.9 | jackson-databind: Deserialization || | | | | | vulnerability via readValue || | | | | | method of ObjectMapper || | | | | | -->avd.aquasec.com/nvd/cve-2017-7525 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2018-11307 | | | 2.8.11.2, 2.7.9.4, 2.9.6 | jackson-databind: Potential || | | | | | information exfiltration with || | | | | | default typing, serialization || | | | | | gadget from MyBatis || | | | | | -->avd.aquasec.com/nvd/cve-2018-11307 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2018-14718 | | | 2.7.9.5, 2.8.11.3, 2.9.7 | jackson-databind: arbitrary code || | | | | | execution in slf4j-ext class || | | | | | -->avd.aquasec.com/nvd/cve-2018-14718 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2018-14719 | | | | jackson-databind: arbitrary || | | | | | code execution in blaze-ds-opt || | | | | | and blaze-ds-core classes || | | | | | -->avd.aquasec.com/nvd/cve-2018-14719 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2018-7489 | | | 2.8.11.1, 2.9.5 | jackson-databind: incomplete fix || | | | | | for CVE-2017-7525 permits unsafe || | | | | | serialization via c3p0 libraries || | | | | | -->avd.aquasec.com/nvd/cve-2018-7489 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-14379 | | | 2.9.9.2 | jackson-databind: default || | | | | | typing mishandling leading || | | | | | to remote code execution || | | | | | -->avd.aquasec.com/nvd/cve-2019-14379 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-14540 | | | 2.9.10 | jackson-databind: || | | | | | Serialization gadgets in || | | | | | com.zaxxer.hikari.HikariConfig || | | | | | -->avd.aquasec.com/nvd/cve-2019-14540 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-14892 | | | 2.9.10, 2.8.11.5, 2.6.7.3 | jackson-databind: Serialization || | | | | | gadgets in classes of the || | | | | | commons-configuration package || | | | | | -->avd.aquasec.com/nvd/cve-2019-14892 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-14893 | | | 2.8.11.5, 2.9.10 | jackson-databind: || | | | | | Serialization gadgets in || | | | | | classes of the xalan package || | | | | | -->avd.aquasec.com/nvd/cve-2019-14893 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-16335 | | | 2.9.10 | jackson-databind: || | | | | | Serialization gadgets in || | | | | | com.zaxxer.hikari.HikariDataSource || | | | | | -->avd.aquasec.com/nvd/cve-2019-16335 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-16942 | | | 2.9.10.1 | jackson-databind: || | | | | | Serialization gadgets in || | | | | | org.apache.commons.dbcp.datasources.* || | | | | | -->avd.aquasec.com/nvd/cve-2019-16942 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2019-16943 | | | | jackson-databind: || | | | | | Serialization gadgets in || | | | | | com.p6spy.engine.spy.P6DataSource || | | | | | -->avd.aquasec.com/nvd/cve-2019-16943 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-17267 | | | 2.9.10 | jackson-databind: Serialization || | | | | | gadgets in classes of || | | | | | the ehcache package || | | | | | -->avd.aquasec.com/nvd/cve-2019-17267 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-17531 | | | 2.9.10.1 | jackson-databind: || | | | | | Serialization gadgets in || | | | | | org.apache.log4j.receivers.db.* || | | | | | -->avd.aquasec.com/nvd/cve-2019-17531 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-20330 | | | 2.9.10.2, 2.8.11.5 | jackson-databind: lacks || | | | | | certain net.sf.ehcache blocking || | | | | | -->avd.aquasec.com/nvd/cve-2019-20330 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-8840 | | | 2.9.10.3, 2.8.11.5 | jackson-databind: Lacks certain || | | | | | xbean-reflect/JNDI blocking || | | | | | -->avd.aquasec.com/nvd/cve-2020-8840 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-9547 | | | 2.9.10.4 | jackson-databind: Serialization || | | | | | gadgets in ibatis-sqlmap || | | | | | -->avd.aquasec.com/nvd/cve-2020-9547 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2020-9548 | | | | jackson-databind: Serialization || | | | | | gadgets in anteros-core || | | | | | -->avd.aquasec.com/nvd/cve-2020-9548 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2018-12022 | HIGH | | 2.8.11.2, 2.7.9.4, 2.9.6 | jackson-databind: improper || | | | | | polymorphic deserialization || | | | | | of types from Jodd-db library || | | | | | -->avd.aquasec.com/nvd/cve-2018-12022 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2018-5968 | | | 2.9.4, 2.8.11 | jackson-databind: unsafe || | | | | | deserialization due to incomplete || | | | | | blacklist (incomplete fix || | | | | | for CVE-2017-7525 and... || | | | | | -->avd.aquasec.com/nvd/cve-2018-5968 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-12086 | | | 2.9.9 | jackson-databind: polymorphic || | | | | | typing issue allows attacker to || | | | | | read arbitrary local files on... || | | | | | -->avd.aquasec.com/nvd/cve-2019-12086 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-14439 | | | 2.9.9.2 | jackson-databind: Polymorphic || | | | | | typing issue related to logback/JNDI || | | | | | -->avd.aquasec.com/nvd/cve-2019-14439 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-10673 | | | 2.9.10.4 | jackson-databind: mishandles || | | | | | the interaction between || | | | | | serialization gadgets and || | | | | | typing which could result... || | | | | | -->avd.aquasec.com/nvd/cve-2020-10673 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-25649 | | | 2.10.5.1, 2.9.10.7, 2.6.7.4 | jackson-databind: FasterXML || | | | | | DOMDeserializer insecure || | | | | | entity expansion is vulnerable || | | | | | to XML external entity... || | | | | | -->avd.aquasec.com/nvd/cve-2020-25649 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-35490 | | | 2.9.10.8 | jackson-databind: mishandles the interaction || | | | | | between serialization gadgets and typing, related to || | | | | | org.apache.commons.dbcp2.datasources.PerUserPoolDataSource... || | | | | | -->avd.aquasec.com/nvd/cve-2020-35490 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2020-35491 | | | | jackson-databind: mishandles the interaction || | | | | | between serialization gadgets and typing, related to || | | | | | org.apache.commons.dbcp2.datasources.SharedPoolDataSource... || | | | | | -->avd.aquasec.com/nvd/cve-2020-35491 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-20190 | | | 2.9.10.7 | jackson-databind: mishandles || | | | | | the interaction between || | | | | | serialization gadgets and || | | | | | typing, related to javax.swing... || | | | | | -->avd.aquasec.com/nvd/cve-2021-20190 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2018-1000873 | MEDIUM | | 2.9.8 | jackson-modules-java8: DoS due || | | | | | to an Improper Input Validation || | | | | | -->avd.aquasec.com/nvd/cve-2018-1000873 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-12384 | | | 2.9.9.1 | jackson-databind: failure || | | | | | to block the logback-core || | | | | | class from polymorphic || | | | | | deserialization leading to... || | | | | | -->avd.aquasec.com/nvd/cve-2019-12384 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2019-12814 | | | | jackson-databind: polymorphic || | | | | | typing issue allows attacker to || | | | | | read arbitrary local files on... || | | | | | -->avd.aquasec.com/nvd/cve-2019-12814 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| com.google.guava:guava | CVE-2018-10237 | | 19.0 | 24.1.1 | guava: Unbounded memory || | | | | | allocation in AtomicDoubleArray || | | | | | and CompoundOrdering classes || | | | | | allow remote attackers... || | | | | | -->avd.aquasec.com/nvd/cve-2018-10237 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2020-8908 | LOW | | 30.0-jre | guava: local information || | | | | | disclosure via temporary directory || | | | | | created with unsafe permissions || | | | | | -->avd.aquasec.com/nvd/cve-2020-8908 |+ +------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| | CVE-2018-10237 | MEDIUM | 22.0 | 24.1.1 | guava: Unbounded memory || | | | | | allocation in AtomicDoubleArray || | | | | | and CompoundOrdering classes || | | | | | allow remote attackers... || | | | | | -->avd.aquasec.com/nvd/cve-2018-10237 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2020-8908 | LOW | | 30.0-jre | guava: local information || | | | | | disclosure via temporary directory || | | | | | created with unsafe permissions || | | | | | -->avd.aquasec.com/nvd/cve-2020-8908 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer | CVE-2021-42575 | CRITICAL | r239 | 20211018.1 | Policies not properly enforced || | | | | | in OWASP Java HTML Sanitizer || | | | | | -->avd.aquasec.com/nvd/cve-2021-42575 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| com.mchange:c3p0 | CVE-2018-20433 | | 0.9.5.2 | 0.9.5.3 | c3p0: XML external entity processing || | | | | | in extractXmlConfigFromInputStream || | | | | | -->avd.aquasec.com/nvd/cve-2018-20433 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2019-5427 | HIGH | | 0.9.5.4 | c3p0: loading XML configuration || | | | | | leads to denial of service || | | | | | -->avd.aquasec.com/nvd/cve-2019-5427 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| com.squareup.okhttp3:okhttp | CVE-2018-20200 | MEDIUM | 3.10.0 | 3.12.1 | okhttp: certificate pinning bypass || | | | | | -->avd.aquasec.com/nvd/cve-2018-20200 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| com.squareup.okhttp:okhttp | CVE-2016-2402 | | 2.7.5 | 3.1.2 | Improper Certificate Validation || | | | | | -->avd.aquasec.com/nvd/cve-2016-2402 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| commons-beanutils:commons-beanutils | CVE-2019-10086 | HIGH | 1.9.3 | 1.9.4 | apache-commons-beanutils: does || | | | | | not suppresses the class property || | | | | | in PropertyUtilsBean by default || | | | | | -->avd.aquasec.com/nvd/cve-2019-10086 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| commons-fileupload:commons-fileupload | CVE-2016-1000031 | CRITICAL | 1.3.1 | 1.3.3 | Apache Commons FileUpload: || | | | | | DiskFileItem file manipulation || | | | | | -->avd.aquasec.com/nvd/cve-2016-1000031 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2016-3092 | HIGH | | 1.3.2 | tomcat: Usage of vulnerable || | | | | | FileUpload package can result || | | | | | in denial of service... || | | | | | -->avd.aquasec.com/nvd/cve-2016-3092 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| commons-httpclient:commons-httpclient | CVE-2012-5783 | MEDIUM | 3.1 | | jakarta-commons-httpclient: || | | | | | missing connection hostname check || | | | | | against X.509 certificate name || | | | | | -->avd.aquasec.com/nvd/cve-2012-5783 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| commons-io:commons-io | CVE-2021-29425 | | 2.5 | 2.7 | apache-commons-io: Limited || | | | | | path traversal in Apache || | | | | | Commons IO 2.2 to 2.6 || | | | | | -->avd.aquasec.com/nvd/cve-2021-29425 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| io.netty:netty | CVE-2019-20444 | CRITICAL | 3.7.0.Final | 4.1.44.Final | netty: HTTP request smuggling || | | | | | -->avd.aquasec.com/nvd/cve-2019-20444 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2019-20445 | | | | netty: HttpObjectDecoder.java allows || | | | | | Content-Length header to accompanied || | | | | | by second Content-Length header || | | | | | -->avd.aquasec.com/nvd/cve-2019-20445 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2019-16869 | HIGH | | 4.1.42.Final | netty: HTTP request smuggling || | | | | | by mishandled whitespace || | | | | | before the colon in HTTP... || | | | | | -->avd.aquasec.com/nvd/cve-2019-16869 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2021-21290 | MEDIUM | | 4.1.59.Final | netty: Information disclosure via || | | | | | the local system temporary directory || | | | | | -->avd.aquasec.com/nvd/cve-2021-21290 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-21295 | | | 4.1.60.Final | netty: possible request smuggling || | | | | | in HTTP/2 due missing validation || | | | | | -->avd.aquasec.com/nvd/cve-2021-21295 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-21409 | | | 4.1.61.Final | netty: Request smuggling || | | | | | via content-length header || | | | | | -->avd.aquasec.com/nvd/cve-2021-21409 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| io.netty:netty-all | CVE-2019-16869 | HIGH | 4.1.17.Final | 4.1.42 | netty: HTTP request smuggling || | | | | | by mishandled whitespace || | | | | | before the colon in HTTP... || | | | | | -->avd.aquasec.com/nvd/cve-2019-16869 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| io.netty:netty-codec | CVE-2021-37136 | | 4.1.42.Final | 4.1.68.Final | netty-codec: Bzip2Decoder || | | | | | doesn't allow setting size || | | | | | restrictions for decompressed data || | | | | | -->avd.aquasec.com/nvd/cve-2021-37136 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2021-37137 | | | | netty-codec: SnappyFrameDecoder || | | | | | doesn't restrict chunk length and || | | | | | may buffer skippable chunks in... || | | | | | -->avd.aquasec.com/nvd/cve-2021-37137 |+--------------------------------------------------------------------+------------------+----------+ +--------------------------------+---------------------------------------------------------------+| io.netty:netty-codec-http | CVE-2021-21290 | MEDIUM | | 4.1.59.Final | netty: Information disclosure via || | | | | | the local system temporary directory || | | | | | -->avd.aquasec.com/nvd/cve-2021-21290 |+--------------------------------------------------------------------+------------------+----------+ +--------------------------------+---------------------------------------------------------------+| io.netty:netty-handler | CVE-2019-20444 | CRITICAL | | 4.1.44 | netty: HTTP request smuggling || | | | | | -->avd.aquasec.com/nvd/cve-2019-20444 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-20445 | | | 4.1.45 | netty: HttpObjectDecoder.java allows || | | | | | Content-Length header to accompanied || | | | | | by second Content-Length header || | | | | | -->avd.aquasec.com/nvd/cve-2019-20445 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2020-11612 | HIGH | | 4.1.46 | netty: compression/decompression || | | | | | codecs don't enforce limits || | | | | | on buffer allocation sizes || | | | | | -->avd.aquasec.com/nvd/cve-2020-11612 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| jline:jline | CVE-2010-1330 | MEDIUM | 0.9.94 | 1.4.1 | jruby: XSS in the regular || | | | | | expression engine when || | | | | | processing invalid UTF-8 byte... || | | | | | -->avd.aquasec.com/nvd/cve-2010-1330 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2013-2035 | | | 2.11 | HawtJNI: predictable temporary || | | | | | file name leading to local || | | | | | arbitrary code execution || | | | | | -->avd.aquasec.com/nvd/cve-2013-2035 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| junit:junit | CVE-2020-15250 | | 4.12 | 4.13.1 | junit4: TemporaryFolder is || | | | | | shared between all users across || | | | | | system which could result... || | | | | | -->avd.aquasec.com/nvd/cve-2020-15250 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| log4j:log4j | CVE-2019-17571 | CRITICAL | 1.2.16 | | log4j: deserialization of || | | | | | untrusted data in SocketServer || | | | | | -->avd.aquasec.com/nvd/cve-2019-17571 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2020-9488 | LOW | | 2.13.2 | log4j: improper validation || | | | | | of certificate with host || | | | | | mismatch in SMTP appender || | | | | | -->avd.aquasec.com/nvd/cve-2020-9488 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| mysql:mysql-connector-java | CVE-2020-2934 | MEDIUM | 8.0.18 | 5.1.49, 8.0.20 | mysql-connector-java: allows || | | | | | unauthenticated attacker with || | | | | | network access via multiple || | | | | | protocols to compromise... || | | | | | -->avd.aquasec.com/nvd/cve-2020-2934 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.activemq:activemq-broker | CVE-2020-13947 | | 5.15.10 | 5.15.14, 5.16.1 | Cross-site Scripting || | | | | | -->avd.aquasec.com/nvd/cve-2020-13947 |+--------------------------------------------------------------------+ + + + + +| org.apache.activemq:activemq-client | | | | | || | | | | | |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.ant:ant | CVE-2020-11979 | HIGH | 1.9.1 | 1.10.9 | ant: insecure temporary file || | | | | | -->avd.aquasec.com/nvd/cve-2020-11979 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2020-1945 | MEDIUM | | 1.10.8, 1.9.15 | ant: insecure temporary || | | | | | file vulnerability || | | | | | -->avd.aquasec.com/nvd/cve-2020-1945 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-36373 | | | 1.10.11, 1.9.16 | ant: excessive memory || | | | | | allocation when reading a || | | | | | specially crafted TAR archive || | | | | | -->avd.aquasec.com/nvd/cve-2021-36373 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2021-36374 | | | | ant: excessive memory allocation || | | | | | when reading a specially || | | | | | crafted ZIP archive or... || | | | | | -->avd.aquasec.com/nvd/cve-2021-36374 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.commons:commons-compress | CVE-2021-35515 | HIGH | 1.4.1 | 1.21 | apache-commons-compress: || | | | | | infinite loop when reading a || | | | | | specially crafted 7Z archive || | | | | | -->avd.aquasec.com/nvd/cve-2021-35515 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2021-35516 | | | | apache-commons-compress: excessive || | | | | | memory allocation when reading || | | | | | a specially crafted 7Z archive || | | | | | -->avd.aquasec.com/nvd/cve-2021-35516 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2021-35517 | | | | apache-commons-compress: excessive || | | | | | memory allocation when reading || | | | | | a specially crafted TAR archive || | | | | | -->avd.aquasec.com/nvd/cve-2021-35517 |+ +------------------+ + + +---------------------------------------------------------------+| | CVE-2021-36090 | | | | apache-commons-compress: excessive || | | | | | memory allocation when reading || | | | | | a specially crafted ZIP archive || | | | | | -->avd.aquasec.com/nvd/cve-2021-36090 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2018-11771 | MEDIUM | | 1.18 | apache-commons-compress: || | | | | | ZipArchiveInputStream.read() || | | | | | fails to identify correct EOF || | | | | | allowing for DoS via crafted... || | | | | | -->avd.aquasec.com/nvd/cve-2018-11771 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.hadoop:hadoop-common | CVE-2018-8009 | HIGH | 2.7.4 | 2.7.7, 2.8.5, 2.9.2, 3.1.1 | hadoop: arbitrary file write || | | | | | vulnerability / arbitrary code || | | | | | execution using a specially... || | | | | | -->avd.aquasec.com/nvd/cve-2018-8009 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2018-8029 | | | 2.8.5, 2.9.2, 3.1.1 | hadoop: a user who can escalate || | | | | | to yarn user can possibly run... || | | | | | -->avd.aquasec.com/nvd/cve-2018-8029 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2017-15713 | MEDIUM | | 2.8.3, 3.0.1 | Moderate severity vulnerability that || | | | | | affects org.apache.hadoop:hadoop-main || | | | | | -->avd.aquasec.com/nvd/cve-2017-15713 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.hive:hive-jdbc | CVE-2018-1282 | CRITICAL | 1.1.0 | 2.3.3 | hive: Improper input validation || | | | | | in jdbc/HivePreparedStatement.java || | | | | | allows for SQL injection || | | | | | -->avd.aquasec.com/nvd/cve-2018-1282 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2018-1314 | MEDIUM | | 3.1.1, 2.3.4 | Py-hiverunner 5.0.0 updates the || | | | | | default supported Hive version || | | | | | to 2.3.4 because version... || | | | | | -->avd.aquasec.com/nvd/cve-2018-1314 |+--------------------------------------------------------------------+------------------+----------+ +--------------------------------+---------------------------------------------------------------+| org.apache.hive:hive-service | CVE-2015-1772 | HIGH | | 1.1.1, 1.0.1 | Apache Hive: authentication || | | | | | vulnerability in HiveServer2 || | | | | | -->avd.aquasec.com/nvd/cve-2015-1772 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2015-7521 | | | 1.2.2 | High severity vulnerability that || | | | | | affects org.apache.hive:hive, || | | | | | org.apache.hive:hive-exec, and || | | | | | org.apache.hive:hive-service || | | | | | -->avd.aquasec.com/nvd/cve-2015-7521 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2016-3083 | | | 2.0.1, 1.2.2 | Moderate severity vulnerability || | | | | | that affects org.apache.hive:hive, || | | | | | org.apache.hive:hive-exec, and || | | | | | org.apache.hive:hive-service || | | | | | -->avd.aquasec.com/nvd/cve-2016-3083 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2018-1284 | LOW | | 2.3.3 | hive: Mishandled input in || | | | | | UDFXPathUtil.java allows users || | | | | | to access arbitrary files via... || | | | | | -->avd.aquasec.com/nvd/cve-2018-1284 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.httpcomponents:httpclient | CVE-2020-13956 | MEDIUM | 4.5.10 | 5.0.3, 4.5.13 | apache-httpclient: incorrect || | | | | | handling of malformed authority || | | | | | component in request URIs || | | | | | -->avd.aquasec.com/nvd/cve-2020-13956 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.logging.log4j:log4j-core | CVE-2020-9488 | LOW | 2.12.1 | 2.13.2 | log4j: improper validation || | | | | | of certificate with host || | | | | | mismatch in SMTP appender || | | | | | -->avd.aquasec.com/nvd/cve-2020-9488 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.poi:poi | CVE-2019-12415 | MEDIUM | 3.17 | 4.1.1 | poi: a specially crafted || | | | | | Microsoft Excel document allows || | | | | | attacker to read files... || | | | | | -->avd.aquasec.com/nvd/cve-2019-12415 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.thrift:libthrift | CVE-2018-1320 | HIGH | 0.9.2 | 0.12.0 | thrift: SASL negotiation || | | | | | isComplete validation bypass in the || | | | | | org.apache.thrift.transport.TSaslTransport || | | | | | class -->avd.aquasec.com/nvd/cve-2018-1320 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-0205 | | | 0.13.0 | thrift: Endless loop when || | | | | | feed with specific input data || | | | | | -->avd.aquasec.com/nvd/cve-2019-0205 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2015-3254 | MEDIUM | | 0.9.3 | thrift: Infinite recursion via || | | | | | vectors involving the skip function || | | | | | -->avd.aquasec.com/nvd/cve-2015-3254 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2018-11798 | | | 0.12.0 | thrift: Improper Access || | | | | | Control grants access to files || | | | | | outside the webservers... || | | | | | -->avd.aquasec.com/nvd/cve-2018-11798 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-1938 | CRITICAL | 9.0.27 | 7.0.100, 8.5.51, 9.0.31 | tomcat: Apache Tomcat AJP File || | | | | | Read/Inclusion Vulnerability || | | | | | -->avd.aquasec.com/nvd/cve-2020-1938 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2019-12418 | HIGH | | 9.0.29, 8.5.49, 7.0.99 | tomcat: local privilege escalation || | | | | | -->avd.aquasec.com/nvd/cve-2019-12418 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-17563 | | | 9.0.30, 8.5.50, 7.0.99 | tomcat: Session fixation when || | | | | | using FORM authentication || | | | | | -->avd.aquasec.com/nvd/cve-2019-17563 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-13934 | | | 8.5.57, 9.0.37 | tomcat: OutOfMemoryException || | | | | | caused by HTTP/2 connection || | | | | | leak could lead to DoS || | | | | | -->avd.aquasec.com/nvd/cve-2020-13934 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-17527 | | | 8.5.60, 9.0.40, 10.0.2 | tomcat: HTTP/2 request header mix-up || | | | | | -->avd.aquasec.com/nvd/cve-2020-17527 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-9484 | | | 7.0.104, 8.5.55, 9.0.35, | tomcat: deserialization || | | | | 10.0.0-M5 | flaw in session persistence || | | | | | storage leading to RCE || | | | | | -->avd.aquasec.com/nvd/cve-2020-9484 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-25122 | | | 8.5.63, 9.0.43, 10.0.2 | tomcat: Request mix-up with h2c || | | | | | -->avd.aquasec.com/nvd/cve-2021-25122 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-25329 | | | 7.0.108, 8.5.61, 9.0.41, | tomcat: Incomplete fix || | | | | 10.0.2 | for CVE-2020-9484 (RCE || | | | | | via session persistence) || | | | | | -->avd.aquasec.com/nvd/cve-2021-25329 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2020-1935 | MEDIUM | | 9.0.31, 8.5.51, 7.0.100 | tomcat: Mishandling of || | | | | | Transfer-Encoding header allows || | | | | | for HTTP request smuggling || | | | | | -->avd.aquasec.com/nvd/cve-2020-1935 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-24122 | | | 7.0.107, 8.5.60, 9.0.40, | tomcat: Information disclosure || | | | | 10.0.0-M10 | when using NTFS file system || | | | | | -->avd.aquasec.com/nvd/cve-2021-24122 |+--------------------------------------------------------------------+------------------+----------+ +--------------------------------+---------------------------------------------------------------+| org.apache.tomcat.embed:tomcat-embed-websocket | CVE-2020-13935 | HIGH | | 7.0.105, 8.5.57, 9.0.37, | tomcat: multiple requests || | | | | 10.0.2 | with invalid payload length || | | | | | in a WebSocket frame could... || | | | | | -->avd.aquasec.com/nvd/cve-2020-13935 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2021-24122 | MEDIUM | | 10.0.0-M10, 9.0.40, 8.5.60, | tomcat: Information disclosure || | | | | 7.0.107 | when using NTFS file system || | | | | | -->avd.aquasec.com/nvd/cve-2021-24122 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.xmlbeans:xmlbeans | CVE-2021-23926 | CRITICAL | 2.6.0 | 3.0.0 | xmlbeans: allowed malicious || | | | | | XML input may lead to XML || | | | | | Entity Expansion attack... || | | | | | -->avd.aquasec.com/nvd/cve-2021-23926 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.apache.zookeeper:zookeeper | CVE-2017-5637 | HIGH | 3.4.6 | 3.4.10, 3.5.3 | zookeeper: Incorrect || | | | | | input validation with || | | | | | wchp/wchc four letter words || | | | | | -->avd.aquasec.com/nvd/cve-2017-5637 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2018-8012 | | | 3.4.10, 3.5.4 | zookeeper: No authentication || | | | | | or authorization is enforced || | | | | | when a server joins a... || | | | | | -->avd.aquasec.com/nvd/cve-2018-8012 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2019-0201 | MEDIUM | | 3.5.5, 3.4.14 | zookeeper: Information || | | | | | disclosure in Apache ZooKeeper || | | | | | -->avd.aquasec.com/nvd/cve-2019-0201 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.codehaus.jackson:jackson-mapper-asl | CVE-2019-10172 | HIGH | 1.9.13 | | jackson-mapper-asl: XML external || | | | | | entity similar to CVE-2016-3720 || | | | | | -->avd.aquasec.com/nvd/cve-2019-10172 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| org.eclipse.jetty:jetty-http | CVE-2020-27216 | | 8.1.14.v20131031 | 9.3.29.v20201019, | jetty: local temporary directory || | | | | 9.4.32.v20200930, 11.0.1 | hijacking vulnerability || | | | | | -->avd.aquasec.com/nvd/cve-2020-27216 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-28165 | | | 9.4.39.v20210325, 10.0.2, | jetty: Resource exhaustion when || | | | | 11.0.2 | receiving an invalid large TLS frame || | | | | | -->avd.aquasec.com/nvd/cve-2021-28165 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2019-10247 | MEDIUM | | 9.2.28.v20190418, | jetty: error path || | | | | 9.3.27.v20190418, | information disclosure || | | | | 9.4.17.v20190418 | -->avd.aquasec.com/nvd/cve-2019-10247 |+--------------------------------------------------------------------+------------------+----------+ +--------------------------------+---------------------------------------------------------------+| org.eclipse.jetty:jetty-io | CVE-2021-28165 | HIGH | | 10.0.2, 9.4.39, 11.0.2 | jetty: Resource exhaustion when || | | | | | receiving an invalid large TLS frame || | | | | | -->avd.aquasec.com/nvd/cve-2021-28165 |+--------------------------------------------------------------------+------------------+----------+ +--------------------------------+---------------------------------------------------------------+| org.eclipse.jetty:jetty-server | CVE-2017-7657 | CRITICAL | | 9.3.24.v20180605, | jetty: HTTP request smuggling || | | | | 9.2.25.v20180606 | -->avd.aquasec.com/nvd/cve-2017-7657 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2017-7658 | | | 9.2.26.v20180806, | jetty: Incorrect header handling || | | | | 9.3.24.v20180605, | -->avd.aquasec.com/nvd/cve-2017-7658 || | | | | 9.4.11.v20180605 | |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2015-2080 | HIGH | | 9.2.9.v20150224 | jetty: remote unauthenticated || | | | | | credential exposure || | | | | | -->avd.aquasec.com/nvd/cve-2015-2080 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2017-7656 | | | 9.4.11.v20180605, | jetty: HTTP request smuggling || | | | | 9.3.24.v20180605 | using the range header || | | | | | -->avd.aquasec.com/nvd/cve-2017-7656 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-27216 | | | 9.3.29.v20201019, | jetty: local temporary directory || | | | | 9.4.32.v20200930, 11.0.1 | hijacking vulnerability || | | | | | -->avd.aquasec.com/nvd/cve-2020-27216 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-28165 | | | 9.4.39.v20210325, 10.0.2, | jetty: Resource exhaustion when || | | | | 11.0.2 | receiving an invalid large TLS frame || | | | | | -->avd.aquasec.com/nvd/cve-2021-28165 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2019-10241 | MEDIUM | | 9.4.16.v20190411, | jetty: using specially formatted || | | | | 9.3.26.v20190403, | URL against DefaultServlet or || | | | | 9.2.27.v20190403 | ResourceHandler leads to XSS... || | | | | | -->avd.aquasec.com/nvd/cve-2019-10241 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2019-10247 | | | 9.4.17.v20190418, | jetty: error path || | | | | 9.3.27.v20190418, | information disclosure || | | | | 9.2.28.v20190418 | -->avd.aquasec.com/nvd/cve-2019-10247 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2021-34428 | LOW | | 11.0.3, 10.0.3, 9.4.41 | jetty: SessionListener can || | | | | | prevent a session from being || | | | | | invalidated breaking logout || | | | | | -->avd.aquasec.com/nvd/cve-2021-34428 |+--------------------------------------------------------------------+------------------+----------+ +--------------------------------+---------------------------------------------------------------+| org.eclipse.jetty:jetty-util | CVE-2017-9735 | HIGH | | 9.4.6.v20170531 | jetty: Timing channel attack || | | | | | in util/security/Password.java || | | | | | -->avd.aquasec.com/nvd/cve-2017-9735 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-27216 | | | 9.3.29.v20201019, | jetty: local temporary directory || | | | | 9.4.32.v20200930, 11.0.1 | hijacking vulnerability || | | | | | -->avd.aquasec.com/nvd/cve-2020-27216 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-28165 | | | 9.4.39.v20210325, 10.0.2, | jetty: Resource exhaustion when || | | | | 11.0.2 | receiving an invalid large TLS frame || | | | | | -->avd.aquasec.com/nvd/cve-2021-28165 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| org.eclipse.paho:org.eclipse.paho.client.mqttv3 | CVE-2019-11777 | | 1.2.0 | 1.2.1 | org.eclipse.paho.client.mqttv3: || | | | | | Improper hostname validation || | | | | | in the MQTT library || | | | | | -->avd.aquasec.com/nvd/cve-2019-11777 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| org.elasticsearch:elasticsearch | CVE-2020-7014 | | 6.8.3 | 7.6.2, 6.8.8 | elasticsearch: Incomplete fix || | | | | | for CVE-2020-7009 could result || | | | | | in generating API key with... || | | | | | -->avd.aquasec.com/nvd/cve-2020-7014 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2021-22135 | MEDIUM | | 6.8.15, 7.11.2 | elasticsearch: Document disclosure || | | | | | flaw in the Elasticsearch suggester || | | | | | -->avd.aquasec.com/nvd/cve-2021-22135 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2021-22144 | | | 7.13.3, 6.8.17 | elasticsearch: uncontrolled || | | | | | recursion in Grok parser || | | | | | -->avd.aquasec.com/nvd/cve-2021-22144 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2020-7020 | LOW | | 7.9.2, 6.8.13 | elasticsearch: not properly || | | | | | preserving security || | | | | | permissions when executing || | | | | | complex queries may lead... || | | | | | -->avd.aquasec.com/nvd/cve-2020-7020 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.hibernate.validator:hibernate-validator | CVE-2019-10219 | MEDIUM | 6.0.17.Final | 6.0.18 | hibernate-validator: || | | | | | safeHTML validator allows XSS || | | | | | -->avd.aquasec.com/nvd/cve-2019-10219 |+ +------------------+ + +--------------------------------+---------------------------------------------------------------+| | CVE-2020-10693 | | | 6.0.20.Final, 6.1.5.Final | hibernate-validator: Improper input || | | | | | validation in the interpolation || | | | | | of constraint error messages || | | | | | -->avd.aquasec.com/nvd/cve-2020-10693 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.jdom:jdom2 | CVE-2021-33813 | HIGH | 2.0.6 | | jdom: XXE allows attackers to || | | | | | cause a DoS via a crafted HTTP... || | | | | | -->avd.aquasec.com/nvd/cve-2021-33813 |+--------------------------------------------------------------------+------------------+ +-------------------+--------------------------------+---------------------------------------------------------------+| org.mybatis:mybatis | CVE-2020-26945 | | 3.5.0 | 3.5.6 | mybatis: mishandles deserialization || | | | | | of object streams which could || | | | | | result in remote code... || | | | | | -->avd.aquasec.com/nvd/cve-2020-26945 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.quartz-scheduler:quartz | CVE-2019-13990 | CRITICAL | 2.3.1 | 2.3.2 | libquartz: XXE attacks || | | | | | via job description || | | | | | -->avd.aquasec.com/nvd/cve-2019-13990 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.springframework:spring-webmvc | CVE-2020-5398 | HIGH | 5.2.0.RELEASE | 5.0.16, 5.1.13, 5.2.3 | springframework: RFD attack via || | | | | | Content-Disposition Header sourced || | | | | | from request input by Spring... || | | | | | -->avd.aquasec.com/nvd/cve-2020-5398 |+ +------------------+----------+ +--------------------------------+---------------------------------------------------------------+| | CVE-2020-5397 | MEDIUM | | 5.2.3 | springframework: CSRF attack || | | | | | via CORS Preflight Requests || | | | | | with Spring MVC or Spring... || | | | | | -->avd.aquasec.com/nvd/cve-2020-5397 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+| org.yaml:snakeyaml | CVE-2017-18640 | HIGH | 1.25 | 1.26 | snakeyaml: Billion laughs || | | | | | attack via alias feature || | | | | | -->avd.aquasec.com/nvd/cve-2017-18640 |+--------------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+---------------------------------------------------------------+[root@ur-test-docker ~]#