The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Hibernate ORM

Hibernate ORM: SQL injection via Comments
An attacker can use a SQL injection via Comments of Hibernate ORM, in order to read or alter data...
CVE-2020-25638, DLA-2512-1, DSA-4908-1, RHSA-2020:5174-01, RHSA-2020:5175-01, RHSA-2020:5254-01, RHSA-2020:5340-01, RHSA-2020:5341-01, RHSA-2020:5342-01, RHSA-2020:5344-01, RHSA-2020:5526-01, RHSA-2020:5527-01, RHSA-2020:5528-01, RHSA-2020:5533-01, VIGILANCE-VUL-33940
Hibernate ORM: SQL injection
An attacker can use a SQL injection of Hibernate ORM, in order to read or alter data...
CVE-2019-14900, RHBUG-1666499, RHSA-2020:2106-01, RHSA-2020:2107-01, RHSA-2020:2108-01, RHSA-2020:2112-01, RHSA-2020:2113-01, RHSA-2020:3461-01, RHSA-2020:3462-01, RHSA-2020:3463-01, RHSA-2020:3464-01, RHSA-2020:3637-01, RHSA-2020:3638-01, RHSA-2020:3639-01, RHSA-2020:3642-01, VIGILANCE-VUL-32258
plexus-utils: code execution via Commandline Class
An attacker can use a vulnerability via Commandline Class of plexus-utils, in order to run code...
CVE-2017-1000487, DLA-1236-1, DLA-1237-1, DSA-4146-1, DSA-4149-1, RHSA-2018:1322-01, VIGILANCE-VUL-24989
Our database contains other pages. You can request a free trial to read them.

Display information about Hibernate ORM: