org.apache.inlong:manager-pojo@1.3.0 vulnerabilities
-
latest version
1.11.0
-
latest non vulnerable version
-
first published
2 years ago
-
latest version published
2 months ago
-
licenses detected
- [0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.inlong:manager-pojo package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Weak Password Requirements such that when users change their password to a simple password (with any character or symbol), attackers can easily guess the user's password and access the account. How to fix Weak Password Requirements? Upgrade |
[1.1.0,1.7.0)
|
Affected versions of this package are vulnerable to Deserialization of Untrusted Data from the MySQL JDBC URL in the How to fix Deserialization of Untrusted Data? Upgrade |
[1.1.0,1.6.0)
|
Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the How to fix Authorization Bypass Through User-Controlled Key? Upgrade |
[0,1.6.0)
|
Affected versions of this package are vulnerable to Out-of-bounds Read via the JDBC Connection due to improper encoding check to the MySQL JDBC URL. How to fix Out-of-bounds Read? Upgrade |
[1.1.0,1.6.0)
|
Affected versions of this package are vulnerable to Deserialization of Untrusted Data by an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database. How to fix Deserialization of Untrusted Data? Upgrade |
[0,1.4.0)
|