org.apache.inlong:manager-pojo@1.6.0 vulnerabilities
-
latest version
2.0.0
-
latest non vulnerable version
-
first published
2 years ago
-
latest version published
a month ago
-
licenses detected
- [0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.inlong:manager-pojo package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to insufficient validation of user-supplied parameters. An attacker can execute arbitrary code by injecting malicious input into the code generation process. How to fix Improper Control of Generation of Code ('Code Injection')? Upgrade |
[1.5.0,1.10.0)
|
Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the How to fix Authorization Bypass Through User-Controlled Key? Upgrade |
[1.4.0,1.9.0-RC0)
|
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to improper encoding check to the MySQL JDBC URL and improper validation of the The attacker could bypass the current logic and achieve arbitrary file reading. How to fix Deserialization of Untrusted Data? Upgrade |
[1.4.0,1.8.0)
|
Affected versions of this package are vulnerable to Weak Password Requirements such that when users change their password to a simple password (with any character or symbol), attackers can easily guess the user's password and access the account. How to fix Weak Password Requirements? Upgrade |
[1.1.0,1.7.0)
|
Affected versions of this package are vulnerable to Deserialization of Untrusted Data that allows attackers to bypass Note: The maintainers have rated this vulnerability as having a moderate impact at the time of discovery. How to fix Deserialization of Untrusted Data? Upgrade |
[1.4.0,1.7.0)
|
Affected versions of this package are vulnerable to Exposure of Resource to Wrong Sphere that allows attackers to change the immutable name and type of clusters. How to fix Exposure of Resource to Wrong Sphere? Upgrade |
[1.4.0,1.7.0)
|
Affected versions of this package are vulnerable to Insecure Default Initialization of Resource that allows users to see deleted users' data. How to fix Insecure Default Initialization of Resource? Upgrade |
[1.5.0,1.7.0)
|