Search for packages
| purl | pkg:maven/com.h2database/h2@2.0.206 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-6tyr-1gfy-fua1
Aliases: CVE-2022-23221 GHSA-45hx-wfhj-473x |
Improper Control of Generation of Code ('Code Injection') H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392. |
Affected by 1 other vulnerability. |
|
VCID-ahev-cr9q-g3d3
Aliases: CVE-2022-45868 GHSA-22wj-vf5f-wrvj |
Password exposure in H2 Database The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that." |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-jstt-6zs3-ybew | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in com.h2database:h2. |
CVE-2021-42392
GHSA-h376-j262-vhq6 GMS-2022-7 |