You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/xerces/xercesImpl/2.9.1/1136d197e2755bbde296ceee217ec5fe2917477b/xercesImpl-2.9.1.jar
Dependency Hierarchy:
spark-sql_2.11-2.2.3.jar (Root Library)
spark-core_2.11-2.2.3.jar
hadoop-client-2.6.5.jar
hadoop-hdfs-2.6.5.jar
❌ xercesImpl-2.9.1.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
mend-for-github-combot
changed the title
CVE-2012-0881 (High) detected in xercesImpl-2.9.1.jar
CVE-2012-0881 (Medium) detected in xercesImpl-2.9.1.jar
Jul 19, 2022
mend-for-github-combot
changed the title
CVE-2012-0881 (Medium) detected in xercesImpl-2.9.1.jar
CVE-2012-0881 (High) detected in xercesImpl-2.9.1.jar
Nov 24, 2022
CVE-2012-0881 - High Severity Vulnerability
Auto generated POM
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/xerces/xercesImpl/2.9.1/1136d197e2755bbde296ceee217ec5fe2917477b/xercesImpl-2.9.1.jar
Dependency Hierarchy:
Found in base branch: master
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
Publish Date: 2017-10-30
URL: CVE-2012-0881
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0881
Release Date: 2017-10-30
Fix Resolution (xerces:xercesImpl): 2.12.0
Direct dependency fix Resolution (org.apache.spark:spark-sql_2.11): 2.3.0
⛑️ Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: