diff --git a/doc/known-vulnerabilities.csv b/doc/known-vulnerabilities.csv index e906205..e67a027 100644 --- a/doc/known-vulnerabilities.csv +++ b/doc/known-vulnerabilities.csv @@ -1,5 +1,5 @@ DependencyName,DependencyPath,Description,License,Md5,Sha1,Identifiers,CPE,CVE,CWE,Vulnerability,Source,CVSSv2_Severity,CVSSv2_Score,CVSSv2,CVSSv3_BaseSeverity,CVSSv3_BaseScore,CVSSv3,CPE Confidence,Evidence Count,VendorProject,Product,Name,DateAdded,ShortDescription,RequiredAction,DueDate,Notes -guava-30.1.1-jre.jar,/home/runner/.m2/repository/com/google/guava/guava/30.1.1-jre/guava-30.1.1-jre.jar,"Guava is a suite of core and expanded libraries that include utility classes, Google's collections, I/O classes, and much more.",http://www.apache.org/licenses/LICENSE-2.0.txt,05374f163d0a4141db672fff9df95b12,87e0fd1df874ea3cbe577702fe6f17068b790fd8,pkg:maven/com.google.guava/guava@30.1.1-jre,cpe:2.3:a:google:guava:30.1.1:*:*:*:*:*:*:*,CVE-2023-2976,CWE-378 Creation of Temporary File With Insecure Permissions,"Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.",OSSINDEX,,,,MEDIUM,6.2,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,HIGH,22,,,,,,,, +guava-30.1.1-jre.jar,/home/runner/.m2/repository/com/google/guava/guava/30.1.1-jre/guava-30.1.1-jre.jar,"Guava is a suite of core and expanded libraries that include utility classes, Google's collections, I/O classes, and much more.",http://www.apache.org/licenses/LICENSE-2.0.txt,05374f163d0a4141db672fff9df95b12,87e0fd1df874ea3cbe577702fe6f17068b790fd8,pkg:maven/com.google.guava/guava@30.1.1-jre,cpe:2.3:a:google:guava:30.1.1:*:*:*:*:*:*:*,CVE-2023-2976,CWE-552 Files or Directories Accessible to External Parties,"Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.",NVD,,,,HIGH,7.1,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,HIGH,22,,,,,,,, guava-30.1.1-jre.jar,/home/runner/.m2/repository/com/google/guava/guava/30.1.1-jre/guava-30.1.1-jre.jar,"Guava is a suite of core and expanded libraries that include utility classes, Google's collections, I/O classes, and much more.",http://www.apache.org/licenses/LICENSE-2.0.txt,05374f163d0a4141db672fff9df95b12,87e0fd1df874ea3cbe577702fe6f17068b790fd8,pkg:maven/com.google.guava/guava@30.1.1-jre,cpe:2.3:a:google:guava:30.1.1:*:*:*:*:*:*:*,CVE-2020-8908,CWE-379 Creation of Temporary File in Directory with Insecure Permissions,guava - Creation of Temporary File in Directory with Insecure Permissions [CVE-2020-8908] The software creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file.,OSSINDEX,,,,LOW,3.3,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,HIGH,22,,,,,,,, jackson-databind-2.12.7.jar,/home/runner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.12.7/jackson-databind-2.12.7.jar,General data-binding functionality for Jackson: works on core streaming API,"The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt",c98af3dc162eefeeb3ffd0491099cbc2,c48e7b68d8cbfec1347e357ee2682e825f861127,pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.12.7,"cpe:2.3:a:fasterxml:jackson-databind:2.12.7:*:*:*:*:*:*:*, cpe:2.3:a:fasterxml:jackson-modules-java8:2.12.7:*:*:*:*:*:*:*",CVE-2022-42003,CWE-502 Deserialization of Untrusted Data,"In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. Additional fix version in 2.13.4.1 and 2.12.17.1",NVD,,,,HIGH,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,HIGH,40,,,,,,,, jackson-databind-2.12.7.jar,/home/runner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.12.7/jackson-databind-2.12.7.jar,General data-binding functionality for Jackson: works on core streaming API,"The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt",c98af3dc162eefeeb3ffd0491099cbc2,c48e7b68d8cbfec1347e357ee2682e825f861127,pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.12.7,"cpe:2.3:a:fasterxml:jackson-databind:2.12.7:*:*:*:*:*:*:*, cpe:2.3:a:fasterxml:jackson-modules-java8:2.12.7:*:*:*:*:*:*:*",CVE-2022-42004,CWE-502 Deserialization of Untrusted Data,"In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.",NVD,,,,HIGH,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,HIGH,40,,,,,,,,