📂 Vulnerable Library - maven-core-4.0.0-alpha-6-SNAPSHOT.jar
Path to dependency file: /maven-compat/pom.xml
Path to vulnerable library: /maven-core/4.0.0-alpha-6-SNAPSHOT/maven-core-4.0.0-alpha-6-SNAPSHOT.jar
Findings
| Finding |
Severity |
🎯 CVSS |
Exploit Maturity |
EPSS |
Library |
Type |
Fixed in |
Remediation Available |
Reachability |
| CVE-82529-348347 |
🟣 Critical |
9.8 |
N/A |
N/A |
guava-30.1-jre.jar |
Direct |
N/A |
❌ |
Reachable |
| CVE-2025-48924 |
🟠 Medium |
6.9 |
Not Defined |
< 1% |
commons-lang3-3.12.0.jar |
Direct |
N/A |
❌ |
Unreachable |
| CVE-2020-8908 |
🟠 Medium |
4.8 |
Not Defined |
< 1% |
guava-30.1-jre.jar |
Direct |
com.google.guava:guava:32.0.0-android |
✅ |
Reachable |
Details
🟣CVE-82529-348347
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Dependency Hierarchy:
Reachability Analysis
This vulnerability is potentially reachable:
- org.apache.maven.session.scope.internal.SessionScopeModule (Application)
- org.apache.maven.repository.internal.MavenResolverModule (Extension)
- com.google.inject.binder.LinkedBindingBuilder (Extension)
- com.google.inject.TypeLiteral (Extension)
- com.google.common.collect.ImmutableList (Extension)
- com.google.common.collect.Iterables (Extension)
- com.google.common.collect.Iterables$3 (Extension)
- com.google.common.collect.StandardTable$ColumnKeyIterator (Extension)
- com.google.common.cache.CacheBuilder$2 (Extension)
- com.google.common.cache.CacheBuilder (Extension)
- com.google.common.cache.LocalCache (Extension)
- com.google.common.cache.LocalCache$Segment (Extension)
-> ❌ com.google.common.cache.RemovalCause$3 (Vulnerable Component)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-82529-348347
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2025-48924
Vulnerable Library - commons-lang3-3.12.0.jar
Apache Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.
Library home page: https://www.apache.org/
Path to dependency file: /maven-resolver-provider/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-lang3/3.12.0/commons-lang3-3.12.0.jar
Dependency Hierarchy:
-
maven-core-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
- maven-artifact-4.0.0-alpha-6-SNAPSHOT.jar
- ❌ commons-lang3-3.12.0.jar (Vulnerable Library)
-
❌ commons-lang3-3.12.0.jar (Vulnerable Library)
-
maven-artifact-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
- ❌ commons-lang3-3.12.0.jar (Vulnerable Library)
-
maven-model-builder-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
- maven-artifact-4.0.0-alpha-6-SNAPSHOT.jar
- ❌ commons-lang3-3.12.0.jar (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Publish Date: Jul 12, 2025 04:01 AM
URL: CVE-2025-48924
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.9
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2020-8908
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Dependency Hierarchy:
Reachability Analysis
This vulnerability is potentially reachable:
- org.apache.maven.session.scope.internal.SessionScopeModule (Application)
- com.google.inject.util.Modules$OverrideModule (Extension)
- com.google.common.collect.Sets (Extension)
- com.google.common.collect.Sets$FilteredNavigableSet (Extension)
- com.google.common.reflect.TypeToken$TypeFilter$2 (Extension)
- com.google.common.reflect.TypeToken (Extension)
- com.google.common.reflect.TypeToken$InterfaceSet (Extension)
- com.google.common.collect.FluentIterable$1 (Extension)
-> ❌ com.google.common.graph.AbstractNetwork$1$1$1 (Vulnerable Component)
Vulnerability Details
A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.
Mend Note:
Publish Date: Dec 10, 2020 10:10 PM
URL: CVE-2020-8908
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-5mg8-w23w-74h3
Release Date: Dec 10, 2020 10:10 PM
Fix Resolution : com.google.guava:guava:32.0.0-android
📂 Vulnerable Library - maven-core-4.0.0-alpha-6-SNAPSHOT.jar
Path to dependency file: /maven-compat/pom.xml
Path to vulnerable library: /maven-core/4.0.0-alpha-6-SNAPSHOT/maven-core-4.0.0-alpha-6-SNAPSHOT.jar
Findings
Details
🟣CVE-82529-348347
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Dependency Hierarchy:
❌ guava-30.1-jre.jar (Vulnerable Library)
maven-core-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-82529-348347
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2025-48924
Vulnerable Library - commons-lang3-3.12.0.jar
Apache Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.
Library home page: https://www.apache.org/
Path to dependency file: /maven-resolver-provider/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-lang3/3.12.0/commons-lang3-3.12.0.jar
Dependency Hierarchy:
maven-core-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
❌ commons-lang3-3.12.0.jar (Vulnerable Library)
maven-artifact-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
maven-model-builder-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Publish Date: Jul 12, 2025 04:01 AM
URL: CVE-2025-48924
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.9
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2020-8908
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Dependency Hierarchy:
❌ guava-30.1-jre.jar (Vulnerable Library)
maven-core-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.
Mend Note:
Publish Date: Dec 10, 2020 10:10 PM
URL: CVE-2020-8908
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-5mg8-w23w-74h3
Release Date: Dec 10, 2020 10:10 PM
Fix Resolution : com.google.guava:guava:32.0.0-android