3.6.0
14 years ago
1 months ago
Known vulnerabilities in the org.apache.uima:uimaj-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.uima:uimaj-core is a core implementation of the UIMA Java Framework. Affected versions of this package are vulnerable to Deserialization of Untrusted Data through the How to fix Deserialization of Untrusted Data? Upgrade | [,3.5.0) |
org.apache.uima:uimaj-core is a core implementation of the UIMA Java Framework. Affected versions of this package are vulnerable to Directory Traversal due to allowing an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. Note: PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine. How to fix Directory Traversal? Upgrade | [,3.3.1) |
org.apache.uima:uimaj-core is a core implementation of the UIMA Java Framework. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. As part of its configuration and operation, UIMA may read XML from various sources. An attacker may craft malicious XML file which could inadvertently disclose local files or other internal content. How to fix XML External Entity (XXE) Injection? Upgrade | [,2.10.2)[3.0.0-alpha,3.0.0-beta) |