Lookup for vulnerable packages by Package URL.

Purlpkg:maven/com.h2database/h2@1.2.144
Typemaven
Namespacecom.h2database
Nameh2
Version1.2.144
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.2.220
Latest_non_vulnerable_version2.2.220
Affected_by_vulnerabilities
0
url VCID-6tyr-1gfy-fua1
vulnerability_id VCID-6tyr-1gfy-fua1
summary
Improper Control of Generation of Code ('Code Injection')
H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392.
references
0
reference_url http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23221.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23221.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23221
reference_id
reference_type
scores
0
value 0.26568
scoring_system epss
scoring_elements 0.96346
published_at 2026-04-21T12:55:00Z
1
value 0.26568
scoring_system epss
scoring_elements 0.96345
published_at 2026-04-18T12:55:00Z
2
value 0.26568
scoring_system epss
scoring_elements 0.96302
published_at 2026-04-02T12:55:00Z
3
value 0.26568
scoring_system epss
scoring_elements 0.96309
published_at 2026-04-04T12:55:00Z
4
value 0.26568
scoring_system epss
scoring_elements 0.96349
published_at 2026-04-29T12:55:00Z
5
value 0.26568
scoring_system epss
scoring_elements 0.96348
published_at 2026-04-26T12:55:00Z
6
value 0.26568
scoring_system epss
scoring_elements 0.96347
published_at 2026-04-24T12:55:00Z
7
value 0.26568
scoring_system epss
scoring_elements 0.96322
published_at 2026-04-08T12:55:00Z
8
value 0.26568
scoring_system epss
scoring_elements 0.96314
published_at 2026-04-07T12:55:00Z
9
value 0.26568
scoring_system epss
scoring_elements 0.9634
published_at 2026-04-16T12:55:00Z
10
value 0.26568
scoring_system epss
scoring_elements 0.96332
published_at 2026-04-13T12:55:00Z
11
value 0.26568
scoring_system epss
scoring_elements 0.96329
published_at 2026-04-12T12:55:00Z
12
value 0.26568
scoring_system epss
scoring_elements 0.96325
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23221
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42392
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23221
5
reference_url http://seclists.org/fulldisclosure/2022/Jan/39
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url http://seclists.org/fulldisclosure/2022/Jan/39
6
reference_url https://github.com/h2database/h2database
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/h2database/h2database
7
reference_url https://github.com/h2database/h2database/releases/tag/version-2.1.210
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url https://github.com/h2database/h2database/releases/tag/version-2.1.210
8
reference_url https://github.com/h2database/h2database/security/advisories
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url https://github.com/h2database/h2database/security/advisories
9
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html
10
reference_url https://security.netapp.com/advisory/ntap-20230818-0011
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230818-0011
11
reference_url https://security.netapp.com/advisory/ntap-20230818-0011/
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url https://security.netapp.com/advisory/ntap-20230818-0011/
12
reference_url https://twitter.com/d0nkey_man/status/1483824727936450564
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url https://twitter.com/d0nkey_man/status/1483824727936450564
13
reference_url https://www.debian.org/security/2022/dsa-5076
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url https://www.debian.org/security/2022/dsa-5076
14
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url https://www.oracle.com/security-alerts/cpuapr2022.html
15
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:39Z/
url https://www.oracle.com/security-alerts/cpujul2022.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044596
reference_id 2044596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044596
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23221
reference_id CVE-2022-23221
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23221
18
reference_url https://github.com/advisories/GHSA-45hx-wfhj-473x
reference_id GHSA-45hx-wfhj-473x
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-45hx-wfhj-473x
19
reference_url https://access.redhat.com/errata/RHSA-2022:4918
reference_id RHSA-2022:4918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4918
20
reference_url https://access.redhat.com/errata/RHSA-2022:4919
reference_id RHSA-2022:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4919
21
reference_url https://access.redhat.com/errata/RHSA-2022:4922
reference_id RHSA-2022:4922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4922
22
reference_url https://access.redhat.com/errata/RHSA-2022:5532
reference_id RHSA-2022:5532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5532
23
reference_url https://usn.ubuntu.com/5365-1/
reference_id USN-5365-1
reference_type
scores
url https://usn.ubuntu.com/5365-1/
24
reference_url https://usn.ubuntu.com/6834-1/
reference_id USN-6834-1
reference_type
scores
url https://usn.ubuntu.com/6834-1/
fixed_packages
0
url pkg:maven/com.h2database/h2@2.1.210
purl pkg:maven/com.h2database/h2@2.1.210
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ahev-cr9q-g3d3
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.h2database/h2@2.1.210
aliases CVE-2022-23221, GHSA-45hx-wfhj-473x
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tyr-1gfy-fua1
1
url VCID-furu-at6b-nbez
vulnerability_id VCID-furu-at6b-nbez
summary
Improper Restriction of XML External Entity Reference
The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23463.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23463.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23463
reference_id
reference_type
scores
0
value 0.00766
scoring_system epss
scoring_elements 0.73532
published_at 2026-04-24T12:55:00Z
1
value 0.00766
scoring_system epss
scoring_elements 0.73541
published_at 2026-04-29T12:55:00Z
2
value 0.00766
scoring_system epss
scoring_elements 0.73543
published_at 2026-04-26T12:55:00Z
3
value 0.00766
scoring_system epss
scoring_elements 0.73406
published_at 2026-04-01T12:55:00Z
4
value 0.00766
scoring_system epss
scoring_elements 0.73414
published_at 2026-04-02T12:55:00Z
5
value 0.00766
scoring_system epss
scoring_elements 0.73437
published_at 2026-04-04T12:55:00Z
6
value 0.00766
scoring_system epss
scoring_elements 0.73409
published_at 2026-04-07T12:55:00Z
7
value 0.00766
scoring_system epss
scoring_elements 0.73446
published_at 2026-04-08T12:55:00Z
8
value 0.00766
scoring_system epss
scoring_elements 0.73459
published_at 2026-04-09T12:55:00Z
9
value 0.00766
scoring_system epss
scoring_elements 0.73483
published_at 2026-04-11T12:55:00Z
10
value 0.00766
scoring_system epss
scoring_elements 0.73463
published_at 2026-04-12T12:55:00Z
11
value 0.00766
scoring_system epss
scoring_elements 0.73455
published_at 2026-04-13T12:55:00Z
12
value 0.00766
scoring_system epss
scoring_elements 0.73497
published_at 2026-04-16T12:55:00Z
13
value 0.00766
scoring_system epss
scoring_elements 0.73505
published_at 2026-04-18T12:55:00Z
14
value 0.00766
scoring_system epss
scoring_elements 0.73499
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23463
2
reference_url https://github.com/boris-unckel/h2database/commit/f9ad6aef2bfa59eba2b4d3e7c4c32d2cce8e8b05
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/boris-unckel/h2database/commit/f9ad6aef2bfa59eba2b4d3e7c4c32d2cce8e8b05
3
reference_url https://github.com/h2database/h2database
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/h2database/h2database
4
reference_url https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3
5
reference_url https://github.com/h2database/h2database/issues/3195
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/h2database/h2database/issues/3195
6
reference_url https://github.com/h2database/h2database/pull/3199
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/h2database/h2database/pull/3199
7
reference_url https://github.com/h2database/h2database/pull/3199#issuecomment-1002830390
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/h2database/h2database/pull/3199#issuecomment-1002830390
8
reference_url https://security.netapp.com/advisory/ntap-20230818-0010
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230818-0010
9
reference_url https://security.netapp.com/advisory/ntap-20230818-0010/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20230818-0010/
10
reference_url https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238
11
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2033392
reference_id 2033392
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2033392
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-23463
reference_id CVE-2021-23463
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-23463
14
reference_url https://github.com/advisories/GHSA-7rpj-hg47-cx62
reference_id GHSA-7rpj-hg47-cx62
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7rpj-hg47-cx62
fixed_packages
0
url pkg:maven/com.h2database/h2@2.0.202
purl pkg:maven/com.h2database/h2@2.0.202
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6tyr-1gfy-fua1
1
vulnerability VCID-ahev-cr9q-g3d3
2
vulnerability VCID-jstt-6zs3-ybew
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.h2database/h2@2.0.202
aliases CVE-2021-23463, GHSA-7rpj-hg47-cx62
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-furu-at6b-nbez
2
url VCID-jstt-6zs3-ybew
vulnerability_id VCID-jstt-6zs3-ybew
summary Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in com.h2database:h2.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42392.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42392
reference_id
reference_type
scores
0
value 0.90773
scoring_system epss
scoring_elements 0.99622
published_at 2026-04-02T12:55:00Z
1
value 0.91037
scoring_system epss
scoring_elements 0.99644
published_at 2026-04-26T12:55:00Z
2
value 0.91037
scoring_system epss
scoring_elements 0.99642
published_at 2026-04-24T12:55:00Z
3
value 0.91037
scoring_system epss
scoring_elements 0.9964
published_at 2026-04-18T12:55:00Z
4
value 0.91037
scoring_system epss
scoring_elements 0.99639
published_at 2026-04-16T12:55:00Z
5
value 0.91037
scoring_system epss
scoring_elements 0.99645
published_at 2026-04-29T12:55:00Z
6
value 0.91037
scoring_system epss
scoring_elements 0.99638
published_at 2026-04-13T12:55:00Z
7
value 0.91037
scoring_system epss
scoring_elements 0.99636
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42392
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23221
4
reference_url https://github.com/h2database/h2database
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/h2database/h2database
5
reference_url https://github.com/h2database/h2database/releases/tag/version-2.0.206
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/h2database/h2database/releases/tag/version-2.0.206
6
reference_url https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console
7
reference_url https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/
reference_id
reference_type
scores
url https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/
8
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-42392
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-42392
10
reference_url https://security.netapp.com/advisory/ntap-20220119-0001
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220119-0001
11
reference_url https://security.netapp.com/advisory/ntap-20220119-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220119-0001/
12
reference_url https://www.debian.org/security/2022/dsa-5076
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5076
13
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
14
reference_url https://www.secpod.com/blog/log4shell-critical-remote-code-execution-vulnerability-in-h2database-console
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.secpod.com/blog/log4shell-critical-remote-code-execution-vulnerability-in-h2database-console
15
reference_url https://www.secpod.com/blog/log4shell-critical-remote-code-execution-vulnerability-in-h2database-console/
reference_id
reference_type
scores
url https://www.secpod.com/blog/log4shell-critical-remote-code-execution-vulnerability-in-h2database-console/
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003894
reference_id 1003894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003894
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039403
reference_id 2039403
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039403
18
reference_url https://github.com/advisories/GHSA-h376-j262-vhq6
reference_id GHSA-h376-j262-vhq6
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h376-j262-vhq6
19
reference_url https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6
reference_id GHSA-h376-j262-vhq6
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6
20
reference_url https://access.redhat.com/errata/RHSA-2022:1013
reference_id RHSA-2022:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1013
21
reference_url https://access.redhat.com/errata/RHSA-2022:4918
reference_id RHSA-2022:4918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4918
22
reference_url https://access.redhat.com/errata/RHSA-2022:4919
reference_id RHSA-2022:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4919
23
reference_url https://access.redhat.com/errata/RHSA-2022:4922
reference_id RHSA-2022:4922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4922
24
reference_url https://access.redhat.com/errata/RHSA-2022:6782
reference_id RHSA-2022:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6782
25
reference_url https://access.redhat.com/errata/RHSA-2022:6783
reference_id RHSA-2022:6783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6783
26
reference_url https://access.redhat.com/errata/RHSA-2022:6787
reference_id RHSA-2022:6787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6787
27
reference_url https://access.redhat.com/errata/RHSA-2022:7409
reference_id RHSA-2022:7409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7409
28
reference_url https://access.redhat.com/errata/RHSA-2022:7410
reference_id RHSA-2022:7410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7410
29
reference_url https://access.redhat.com/errata/RHSA-2022:7411
reference_id RHSA-2022:7411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7411
30
reference_url https://access.redhat.com/errata/RHSA-2022:7417
reference_id RHSA-2022:7417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7417
31
reference_url https://access.redhat.com/errata/RHSA-2025:1747
reference_id RHSA-2025:1747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1747
32
reference_url https://usn.ubuntu.com/5365-1/
reference_id USN-5365-1
reference_type
scores
url https://usn.ubuntu.com/5365-1/
33
reference_url https://usn.ubuntu.com/6834-1/
reference_id USN-6834-1
reference_type
scores
url https://usn.ubuntu.com/6834-1/
fixed_packages
0
url pkg:maven/com.h2database/h2@2.0.206
purl pkg:maven/com.h2database/h2@2.0.206
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6tyr-1gfy-fua1
1
vulnerability VCID-ahev-cr9q-g3d3
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.h2database/h2@2.0.206
aliases CVE-2021-42392, GHSA-h376-j262-vhq6, GMS-2022-7
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jstt-6zs3-ybew
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/com.h2database/h2@1.2.144