Severity: low
Affected versions:
- Apache Commons IO 2.0 before 2.14.0
Description:
Uncontrolled Resource Consumption vulnerability in Apache Commons IO.
The org.apache.commons.io.input.XmlStreamReader class may excessively consume
CPU resources when processing maliciously crafted input.
Th
Severity: low
Affected versions:
- Apache Commons Configuration 2.0 before 2.10.1
Description:
Out-of-bounds Write vulnerability in Apache Commons Configuration.This issue
affects Apache Commons Configuration: from 2.0 before 2.10.1.
Users are recommended to upgrade to version 2.10.1, which f
Severity: low
Affected versions:
- Apache Commons Configuration 2.0 before 2.10.1
Description:
Out-of-bounds Write vulnerability in Apache Commons Configuration.This issue
affects Apache Commons Configuration: from 2.0 before 2.10.1.
Users are recommended to upgrade to version 2.10.1, which f
Severity: moderate
Affected versions:
- Apache Commons Compress 1.21 before 1.26.0
Description:
Allocation of Resources Without Limits or Throttling vulnerability in Apache
Commons Compress.This issue affects Apache Commons Compress: from 1.21 before
1.26.
Users are recommended to upgrade to
Severity: important
Affected versions:
- Apache Commons Compress 1.3 through 1.25.0
Description:
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache
Commons Compress.This issue affects Apache Commons Compress: from 1.3 through
1.25.0.
Users are recommended to upgra
Severity: moderate
Affected versions:
- Apache Commons Compress 1.22 before 1.24.0
Description:
Improper Input Validation, Uncontrolled Resource Consumption vulnerability in
Apache Commons Compress in TAR parsing.This issue affects Apache Commons
Compress: from 1.22 before 1.24.0.
Users are
Severity: low
Description:
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV
response by default. A malicious server can redirect the Commons Net code to
use a different host, but the user has to connect to the malicious server in
the first place. This may lead to l
Description:
Apache Commons BCEL has a number of APIs that would normally only allow
changing specific class characteristics. However, due to an out-of-bounds
writing issue, these APIs can be used to produce arbitrary bytecode. This could
be abused in applications that pass attacker-controllabl
Severity: important
Description:
Apache Commons Text performs variable interpolation, allowing properties to be
dynamically evaluated and expanded. The standard format for interpolation is
"${prefix:name}", where "prefix" is used to locate an instance of
org.apache.commons.text.lookup.StringLo