Vulnerabilities (CVE)

Filtered by vendor Codehaus-plexus Subscribe
Filtered by product Plexus-utils
Total 3 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-1000487 2 Codehaus-plexus, Debian 2 Plexus-utils, Debian Linux 2024-11-21 7.5 HIGH 9.8 CRITICAL
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
CVE-2022-4244 2 Codehaus-plexus, Redhat 2 Plexus-utils, Integration Camel K 2024-10-10 N/A 7.5 HIGH
A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
CVE-2022-4245 2 Codehaus-plexus, Redhat 2 Plexus-utils, Integration Camel K 2024-10-10 N/A 4.3 MEDIUM
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.