| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.hawt:project | maven | <= 2.17.2 |
The vulnerability report explicitly references the Zips.unzip method in the provided code snippet (line 111 of Zips.java). The PoC demonstrates how crafted zip entries with path traversal sequences bypass directory restrictions. The CWE-22 classification and GitHub issue #2832 directly implicate this function as the entry point for unsafe file extraction. No other functions are mentioned in the context of the exploit mechanism.
KEV Misses 88% of Exploited CVEs- Get the report