An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the loadpluginPath parameter.
{ "binaries": [ { "binary_version": "3.6.0+dfsg-3", "binary_name": "libpf4j-java" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-40827.json"
{ "binaries": [ { "binary_version": "3.10.0+dfsg-1", "binary_name": "libpf4j-java" } ] }
{ "binaries": [ { "binary_version": "3.12.0+dfsg-1", "binary_name": "libpf4j-java" } ] }