Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libplexus-utils-java", "binary_version": "1:1.5.15-4+deb8u1build0.14.04.1" }, { "binary_name": "libplexus-utils-java-doc", "binary_version": "1:1.5.15-4+deb8u1build0.14.04.1" } ], "ubuntu_priority": "medium" }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libplexus-utils2-java", "binary_version": "2.0.5-1+deb7u1build0.14.04.1" }, { "binary_name": "libplexus-utils2-java-doc", "binary_version": "2.0.5-1+deb7u1build0.14.04.1" } ], "ubuntu_priority": "medium" }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libplexus-utils-java", "binary_version": "1:1.5.15-4+deb8u1build0.16.04.1" }, { "binary_name": "libplexus-utils-java-doc", "binary_version": "1:1.5.15-4+deb8u1build0.16.04.1" } ], "ubuntu_priority": "medium" }