Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/commons-io/commons-io@2.6
purl pkg:maven/commons-io/commons-io@2.6
Next non-vulnerable version 2.14.0
Latest non-vulnerable version 2.14.0
Risk 4.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-epm8-6b5f-s7aa
Aliases:
CVE-2024-47554
GHSA-78wr-2p64-hpwj
Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The `org.apache.commons.io.input.XmlStreamReader` class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.
2.14.0
Affected by 0 other vulnerabilities.
VCID-msck-u3y4-tqcn
Aliases:
CVE-2021-29425
GHSA-gwrp-pvrq-jmwv
Path Traversal and Improper Input Validation in Apache Commons IO In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
2.7
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.