92
Affected versions of this package are vulnerable to unauthenticated remote code execution via an unrestricted JDBC connection. Due to H2O using the getConnectionSafe method, it appears that the intention was to establish a secure connection. However, in practice, no restrictions are placed on the JDBC connection settings, allowing attackers to arbitrarily set the JDBC URL. This can lead to deserialization attacks, file reads, command execution, and other risks on the victim's server.
You're affected if you are using a version which is within vulnerability ranges.
Upgrade h2o library to patch version.