org.apache.dubbo:dubbo-common@2.7.5 vulnerabilities
-
latest version
3.3.1
-
latest non vulnerable version
-
first published
6 years ago
-
latest version published
2 months ago
-
licenses detected
- [2.7.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.dubbo:dubbo-common package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.dubbo:dubbo-common is a high-performance, java based, open source RPC framework. Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to improper sanitization when Dubbo generic invoked. How to fix Deserialization of Untrusted Data? Upgrade |
[,2.7.22)
[3.0.0,3.0.14)
[3.1.0,3.1.6)
|
org.apache.dubbo:dubbo-common is a high-performance, java based, open source RPC framework. Affected versions of this package are vulnerable to Remote Code Execution (RCE) via arbitrary bean manipulation in the Telnet handler. This endpoint is unprotected and can be accessed via the Dubbo main service port to collect information, execute methods exposed by the service, and shut down the application. A provider method can be invoked using the How to fix Remote Code Execution (RCE)? Upgrade |
[,2.7.10)
|
org.apache.dubbo:dubbo-common is a high-performance, java based, open source RPC framework. Affected versions of this package are vulnerable to Open Redirect due to the usage of How to fix Open Redirect? Upgrade |
[,2.6.12)
[2.7.0,2.7.15)
|
org.apache.dubbo:dubbo-common is a high-performance, java based, open source RPC framework. Affected versions of this package are vulnerable to NULL Pointer Dereference. When the How to fix NULL Pointer Dereference? Upgrade |
[,2.7.15)
[3.0.0,3.0.2)
|
org.apache.dubbo:dubbo-common is a high-performance, java based, open source RPC framework. Affected versions of this package are vulnerable to Remote Code Execution (RCE). Some components in How to fix Remote Code Execution (RCE)? Upgrade |
[,2.7.13)
|
org.apache.dubbo:dubbo-common is a high-performance, java based, open source RPC framework. Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The How to fix Deserialization of Untrusted Data? Upgrade |
[,2.7.13)
[3.0.0,3.0.2)
|
org.apache.dubbo:dubbo-common is a high-performance, java based, open source RPC framework. Affected versions of this package are vulnerable to Open Redirect. The usage of How to fix Open Redirect? Upgrade |
[2.7.0,2.7.10)
[2.6.0,2.6.10)
|
org.apache.dubbo:dubbo-common is a high-performance, java based, open source RPC framework. Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker can send RPC requests with unrecognized service name or method name along with malicious parameter payloads. When the malicious parameter is deserialized, it will execute malicious code. How to fix Deserialization of Untrusted Data? Upgrade |
[,2.7.8)
|