org.apache.geode:geode-core@1.5.0 vulnerabilities
-
latest version
1.15.1
-
latest non vulnerable version
-
first published
8 years ago
-
latest version published
2 years ago
-
licenses detected
- [1.0.0-incubating,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.geode:geode-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using REST API on Java 8 or Java 11. How to fix Deserialization of Untrusted Data? Upgrade |
[,1.15.0)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using Note: Upgrading to the fix version of the package will automatically protect users on Java 11. How to fix Deserialization of Untrusted Data? Upgrade |
[,1.15.0)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using Note: Users should also upgrade to Java 11. If upgrading to Java 11 is not possible, then upgrade to the fixed version and specify How to fix Deserialization of Untrusted Data? Upgrade |
[,1.15.0)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Information Exposure when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix How to fix Information Exposure? Upgrade |
[,1.12.5)
[1.13.0,1.13.5)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack. How to fix Man-in-the-Middle (MitM)? Upgrade |
[,1.10.0)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Missing Permission Check. When an Apache Geode server is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster. How to fix Missing Permission Check? Upgrade |
[1.0.0,1.9.0)
|