Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies;
false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and
the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties,
implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided
is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever
arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.
Scan Information (
show all ):
dependency-check version : 6.1.1Report Generated On : Sun, 15 Jan 2023 14:19:30 +0100Dependencies Scanned : 92 (69 unique)Vulnerable Dependencies : 16 Vulnerabilities Found : 106Vulnerabilities Suppressed : 0... NVD CVE Checked : 2023-01-15T14:18:40NVD CVE Modified : 2023-01-15T14:00:02VersionCheckOn : 2023-01-15T14:18:40Summary Display:
Showing Vulnerable Dependencies (click to show all) Dependencies HikariCP-4.0.3.jarDescription:
Ultimate JDBC Connection Pool License:
The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/zaxxer/HikariCP/4.0.3/HikariCP-4.0.3.jar
MD5: e725642926105cd1bbf4ad7fdff5d5a9
SHA1: 107cbdf0db6780a065f895ae9d8fbf3bb0e1c21f
SHA256: 7c024aeff1c1063576d74453513f9de6447d8e624d17f8e27f30a2e97688c6c9
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor Manifest build-jdk-spec 11 Low Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor jar package name pool Highest Vendor pom url brettwooldridge/HikariCP Highest Vendor pom organization url brettwooldridge Medium Vendor pom name HikariCP High Vendor pom groupid com.zaxxer Highest Vendor pom organization name Zaxxer.com High Vendor Manifest bundle-docurl https://github.com/brettwooldridge Low Vendor pom groupid zaxxer Highest Vendor file name HikariCP High Vendor jar package name zaxxer Highest Vendor Manifest bundle-symbolicname com.zaxxer.HikariCP Medium Vendor Manifest multi-release true Low Vendor pom artifactid HikariCP Low Vendor Manifest originally-created-by Apache Maven Bundle Plugin Low Product Manifest build-jdk-spec 11 Low Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product jar package name pool Highest Product jar package name 11 Highest Product pom name HikariCP High Product pom organization name Zaxxer.com Low Product Manifest bundle-docurl https://github.com/brettwooldridge Low Product pom groupid zaxxer Highest Product Manifest Bundle-Name HikariCP Medium Product pom url brettwooldridge High Product pom url brettwooldridge/HikariCP High Product file name HikariCP High Product jar package name zaxxer Highest Product Manifest bundle-symbolicname com.zaxxer.HikariCP Medium Product Manifest multi-release true Low Product Manifest originally-created-by Apache Maven Bundle Plugin Low Product pom artifactid HikariCP Highest Version Manifest Bundle-Version 4.0.3 High Version file version 4.0.3 High Version pom version 4.0.3 Highest
antlr-2.7.7.jarDescription:
A framework for constructing recognizers, compilers,
and translators from grammatical descriptions containing
Java, C#, C++, or Python actions.
License:
BSD License: http://www.antlr.org/license.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/antlr/antlr/2.7.7/antlr-2.7.7.jar
MD5: f8f1352c52a4c6a500b597596501fc64
SHA1: 83cd2cd674a217ade95a4bb83a8a14f351f48bd0
SHA256: 88fbda4b912596b9f56e8e12e580cc954bacfb51776ecfddd3e18fc1cf56dc4c
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor jar package name python Highest Vendor pom groupid antlr Highest Vendor pom artifactid antlr Low Vendor jar package name java Highest Vendor file name antlr High Vendor jar package name antlr Highest Vendor pom name AntLR Parser Generator High Vendor jar package name actions Highest Vendor pom url http://www.antlr.org/ Highest Vendor jar package name antlr Low Vendor jar package name parser Highest Product jar package name python Highest Product pom url http://www.antlr.org/ Medium Product pom groupid antlr Highest Product jar package name java Highest Product file name antlr High Product jar package name antlr Highest Product pom name AntLR Parser Generator High Product jar package name actions Highest Product pom artifactid antlr Highest Product jar package name parser Highest Version pom version 2.7.7 Highest Version file version 2.7.7 High
aspectjrt-1.9.6.jarDescription:
The runtime needed to execute a program using AspectJ License:
Eclipse Public License - v 1.0: http://www.eclipse.org/legal/epl-v10.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/aspectj/aspectjrt/1.9.6/aspectjrt-1.9.6.jar
MD5: 391f9257f19b84b45eb79a1878b9600a
SHA1: 1651849d48659e5703adc2599e694bf67b8c3fc4
SHA256: 20c785678cbb4ee045914daf83da25f98a16071177dfa0e3451326723dfb4705
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest automatic-module-name org.aspectj.runtime Medium Vendor jar package name aspectj Highest Vendor pom artifactid aspectjrt Low Vendor manifest: org/aspectj/lang/ Implementation-Vendor https://www.eclipse.org/aspectj/ Medium Vendor file name aspectjrt High Vendor pom groupid org.aspectj Highest Vendor jar package name runtime Highest Vendor pom name AspectJ runtime High Vendor pom groupid aspectj Highest Vendor pom url https://www.eclipse.org/aspectj/ Highest Product Manifest automatic-module-name org.aspectj.runtime Medium Product jar package name aspectj Highest Product file name aspectjrt High Product manifest: org/aspectj/lang/ Specification-Title AspectJ Runtime Classes Medium Product pom artifactid aspectjrt Highest Product jar package name runtime Highest Product pom name AspectJ runtime High Product pom url https://www.eclipse.org/aspectj/ Medium Product pom groupid aspectj Highest Product manifest: org/aspectj/lang/ Implementation-Title org.aspectj.runtime Medium Version pom version 1.9.6 Highest Version file version 1.9.6 High Version manifest: org/aspectj/lang/ Implementation-Version 1.9.6 Medium
betterbeansbinding-core-1.3.0.jarDescription:
Keeping JavaBeans in sync. License:
http://www.gnu.org/licenses/lgpl-2.1.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/betterbeansbinding/betterbeansbinding-core/1.3.0/betterbeansbinding-core-1.3.0.jar
MD5: a4ed4664612ece2fdff12bf5f21accc8
SHA1: ba454e7173845a67ba7f9e9478af4a9e43700b7b
SHA256: da366781ce264f2facefc922b858382dc1b82b551a777c6df6106a9349763080
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Swing:compile
Evidence Type Source Name Value Confidence Vendor Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-core Medium Vendor pom groupid it.tidalwave.betterbeansbinding Highest Vendor file name betterbeansbinding-core High Vendor pom name BetterBeansBinding Core High Vendor pom artifactid betterbeansbinding-core Low Vendor Manifest bundle-docurl http://www.tidalwave.it Low Vendor Manifest implementation-build unknown Low Vendor pom parent-artifactid betterbeansbinding Low Product Manifest Bundle-Name BetterBeansBinding Core Medium Product Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-core Medium Product pom groupid it.tidalwave.betterbeansbinding Highest Product pom parent-artifactid betterbeansbinding Medium Product file name betterbeansbinding-core High Product pom name BetterBeansBinding Core High Product Manifest bundle-docurl http://www.tidalwave.it Low Product Manifest implementation-build unknown Low Product pom artifactid betterbeansbinding-core Highest Version Manifest Bundle-Version 1.3.0 High Version pom version 1.3.0 Highest Version file version 1.3.0 High
betterbeansbinding-el-1.3.0.jarDescription:
Keeping JavaBeans in sync. License:
http://www.gnu.org/licenses/lgpl-2.1.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/betterbeansbinding/betterbeansbinding-el/1.3.0/betterbeansbinding-el-1.3.0.jar
MD5: 63cad21fb9a2b5a837b11e881eeeda22
SHA1: f285f3cd2b41cbde08a45095ca3be862d7ef7adf
SHA256: b19e603cc5e959f2bde777f9f992ea63e59fef211c650d3bf4bf707ed741a84f
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Swing:compile
Evidence Type Source Name Value Confidence Vendor pom artifactid betterbeansbinding-el Low Vendor pom groupid it.tidalwave.betterbeansbinding Highest Vendor Manifest bundle-docurl http://www.tidalwave.it Low Vendor pom name BetterBeansBinding EL High Vendor jar package name el Highest Vendor Manifest implementation-build unknown Low Vendor Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-el Medium Vendor file name betterbeansbinding-el High Vendor pom parent-artifactid betterbeansbinding Low Product Manifest Bundle-Name BetterBeansBinding EL Medium Product pom groupid it.tidalwave.betterbeansbinding Highest Product pom parent-artifactid betterbeansbinding Medium Product pom artifactid betterbeansbinding-el Highest Product Manifest bundle-docurl http://www.tidalwave.it Low Product pom name BetterBeansBinding EL High Product jar package name el Highest Product Manifest implementation-build unknown Low Product Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-el Medium Product file name betterbeansbinding-el High Version Manifest Bundle-Version 1.3.0 High Version pom version 1.3.0 Highest Version file version 1.3.0 High
betterbeansbinding-swingbinding-1.3.0.jarDescription:
Keeping JavaBeans in sync. License:
http://www.gnu.org/licenses/lgpl-2.1.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/betterbeansbinding/betterbeansbinding-swingbinding/1.3.0/betterbeansbinding-swingbinding-1.3.0.jar
MD5: 73e42607d80f5e24e9be17e4e3952184
SHA1: d865d0482b48bd900099fc5c84c02892766ff375
SHA256: 053cdb906c0d366df9e4851ce2528f200ba97fda2d7d6769dabe7012dcc83d29
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Swing:compile
Evidence Type Source Name Value Confidence Vendor Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-swingbinding Medium Vendor pom groupid it.tidalwave.betterbeansbinding Highest Vendor pom name BetterBeansBinding SwingBinding High Vendor file name betterbeansbinding-swingbinding High Vendor pom artifactid betterbeansbinding-swingbinding Low Vendor jar package name swingbinding Highest Vendor Manifest bundle-docurl http://www.tidalwave.it Low Vendor Manifest implementation-build unknown Low Vendor pom parent-artifactid betterbeansbinding Low Product Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-swingbinding Medium Product pom groupid it.tidalwave.betterbeansbinding Highest Product pom name BetterBeansBinding SwingBinding High Product pom parent-artifactid betterbeansbinding Medium Product file name betterbeansbinding-swingbinding High Product jar package name swingbinding Highest Product Manifest bundle-docurl http://www.tidalwave.it Low Product Manifest implementation-build unknown Low Product Manifest Bundle-Name BetterBeansBinding SwingBinding Medium Product pom artifactid betterbeansbinding-swingbinding Highest Version Manifest Bundle-Version 1.3.0 High Version pom version 1.3.0 Highest Version file version 1.3.0 High
bsh-2.0b4.jarDescription:
BeanShell File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/beanshell/bsh/2.0b4/bsh-2.0b4.jarMD5: a1c60aa83c9c9a6cb2391c1c1b85eb00SHA1: a05f0a0feefa8d8467ac80e16e7de071489f0d9cSHA256: 91395c07885839a8c6986d5b7c577cd9bacf01bf129c89141f35e8ea858427b6Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor file name bsh High Vendor Manifest Implementation-Vendor Pat Niemeyer (pat@pat.net) High Vendor pom groupid beanshell Highest Vendor pom artifactid bsh Low Vendor pom parent-groupid org.beanshell Medium Vendor hint analyzer vendor beanshell_project Highest Vendor pom parent-artifactid beanshell Low Vendor pom groupid org.beanshell Highest Vendor jar package name org Highest Vendor jar package name bsh Highest Vendor pom name BeanShell High Vendor Manifest specification-vendor http://www.beanshell.org/ Low Product pom parent-groupid org.beanshell Medium Product file name bsh High Product pom parent-artifactid beanshell Medium Product jar package name org Highest Product Manifest specification-title BeanShell Medium Product jar package name bsh Highest Product pom name BeanShell High Product pom artifactid bsh Highest Product pom groupid beanshell Highest Product hint analyzer product beanshell Highest Version pom version 2.0b4 Highest
Published Vulnerabilities CVE-2016-2510 suppress
BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler. CWE-19 Data Processing Errors
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
byte-buddy-1.10.20.jarDescription:
Byte Buddy is a Java library for creating Java classes at run time.
This artifact is a build of Byte Buddy with all ASM dependencies repackaged into its own name space.
License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy/1.10.20/byte-buddy-1.10.20.jar
MD5: d158464cbd647e92a6493f608bb3b985
SHA1: c5d2d12c75c5d52f8df33f4211e6dbd05a42b117
SHA256: 5fcad05da791e9a22811c255a4a74b7ea094b7243d9dbf3e6fc578c8c94290ac
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom artifactid byte-buddy Low Vendor file name byte-buddy High Vendor pom parent-artifactid byte-buddy-parent Low Vendor pom groupid net.bytebuddy Highest Vendor Manifest bundle-symbolicname net.bytebuddy.byte-buddy Medium Vendor jar package name net Highest Vendor pom name Byte Buddy (without dependencies) High Vendor jar package name bytebuddy Highest Vendor Manifest multi-release true Low Vendor jar package name asm Highest Vendor jar package name build Highest Product pom parent-artifactid byte-buddy-parent Medium Product file name byte-buddy High Product pom artifactid byte-buddy Highest Product pom name Byte Buddy (without dependencies) High Product jar package name asm Highest Product Manifest bundle-symbolicname net.bytebuddy.byte-buddy Medium Product jar package name net Highest Product pom groupid net.bytebuddy Highest Product jar package name bytebuddy Highest Product Manifest multi-release true Low Product jar package name build Highest Product Manifest Bundle-Name Byte Buddy (without dependencies) Medium Version pom version 1.10.20 Highest Version Manifest Bundle-Version 1.10.20 High Version file version 1.10.20 High
byte-buddy-1.10.20.jar (shaded: net.bytebuddy:byte-buddy-dep:1.10.20)Description:
Byte Buddy is a Java library for creating Java classes at run time.
This artifact is a build of Byte Buddy with a remaining dependency onto ASM.
You should never depend on this module without repackaging Byte Buddy and ASM into your own namespace.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy/1.10.20/byte-buddy-1.10.20.jar/META-INF/maven/net.bytebuddy/byte-buddy-dep/pom.xmlMD5: ff053762ee21489bdc49a39082536debSHA1: 180120a8eaf360c106ee4bf5bbe732a83a9376f3SHA256: a1a7b34c16b26ff06eaed38d9d16a712f3fe8b48a3d23567437daacac19557b0Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom parent-artifactid byte-buddy-parent Low Vendor pom name Byte Buddy (with dependencies) High Vendor pom groupid net.bytebuddy Highest Vendor pom artifactid byte-buddy-dep Low Product pom parent-artifactid byte-buddy-parent Medium Product pom name Byte Buddy (with dependencies) High Product pom groupid net.bytebuddy Highest Product pom artifactid byte-buddy-dep Highest Version pom version 1.10.20 Highest
byte-buddy-1.11.22.jarDescription:
Byte Buddy is a Java library for creating Java classes at run time.
This artifact is a build of Byte Buddy with all ASM dependencies repackaged into its own name space.
License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy/1.11.22/byte-buddy-1.11.22.jar
MD5: a3f78063338fae42edff11c2d7503a76
SHA1: 8b4c7fa5562a09da1c2a9ab0873cb51f5034d83f
SHA256: d95656262ebce2fbff31b8c041af7170ad8a3cee843cec8f75cdb21f20b4bd96
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom artifactid byte-buddy Low Vendor file name byte-buddy High Vendor pom parent-artifactid byte-buddy-parent Low Vendor pom groupid net.bytebuddy Highest Vendor Manifest bundle-symbolicname net.bytebuddy.byte-buddy Medium Vendor jar package name net Highest Vendor pom name Byte Buddy (without dependencies) High Vendor jar package name bytebuddy Highest Vendor Manifest multi-release true Low Vendor jar package name asm Highest Vendor jar package name build Highest Product pom parent-artifactid byte-buddy-parent Medium Product file name byte-buddy High Product pom artifactid byte-buddy Highest Product pom name Byte Buddy (without dependencies) High Product jar package name asm Highest Product Manifest bundle-symbolicname net.bytebuddy.byte-buddy Medium Product jar package name net Highest Product pom groupid net.bytebuddy Highest Product jar package name bytebuddy Highest Product Manifest multi-release true Low Product jar package name build Highest Product Manifest Bundle-Name Byte Buddy (without dependencies) Medium Version file version 1.11.22 High Version Manifest Bundle-Version 1.11.22 High Version pom version 1.11.22 Highest
byte-buddy-1.11.22.jar (shaded: net.bytebuddy:byte-buddy-dep:1.11.22)Description:
Byte Buddy is a Java library for creating Java classes at run time.
This artifact is a build of Byte Buddy with a remaining dependency onto ASM.
You should never depend on this module without repackaging Byte Buddy and ASM into your own namespace.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy/1.11.22/byte-buddy-1.11.22.jar/META-INF/maven/net.bytebuddy/byte-buddy-dep/pom.xmlMD5: 8855d3bb1ab593992da3a9a255b93031SHA1: d278d77d994f02da86d5216f5b7e4663915645cfSHA256: 814bae0b13923f8fea2e78128b044c862e9c61b83bfa42f72c25b4d34b81f4e5Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom parent-artifactid byte-buddy-parent Low Vendor pom name Byte Buddy (with dependencies) High Vendor pom groupid net.bytebuddy Highest Vendor pom artifactid byte-buddy-dep Low Product pom parent-artifactid byte-buddy-parent Medium Product pom name Byte Buddy (with dependencies) High Product pom groupid net.bytebuddy Highest Product pom artifactid byte-buddy-dep Highest Version pom version 1.11.22 Highest
byte-buddy-agent-1.10.20.jarDescription:
The Byte Buddy agent offers convenience for attaching an agent to the local or a remote VM. License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy-agent/1.10.20/byte-buddy-agent-1.10.20.jar
MD5: 9a19e38d298603d085f175401702f725
SHA1: 8391bfea9da53fd92edd4a453571ef70b3aae09f
SHA256: b592a6c43e752bf41659717956c57fbb790394d2ee5f8941876659f9c5c0e7e8
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor Manifest can-set-native-method-prefix true Low Vendor pom name Byte Buddy agent High Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.5))" Low Vendor jar package name agent Highest Vendor pom parent-artifactid byte-buddy-parent Low Vendor Manifest can-redefine-classes true Low Vendor pom groupid net.bytebuddy Highest Vendor jar package name net Highest Vendor jar package name bytebuddy Highest Vendor Manifest multi-release true Low Vendor pom artifactid byte-buddy-agent Low Vendor file name byte-buddy-agent High Vendor Manifest can-retransform-classes true Low Vendor Manifest bundle-symbolicname net.bytebuddy.byte-buddy-agent Medium Product Manifest can-set-native-method-prefix true Low Product pom parent-artifactid byte-buddy-parent Medium Product pom name Byte Buddy agent High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.5))" Low Product jar package name agent Highest Product Manifest can-redefine-classes true Low Product jar package name net Highest Product pom groupid net.bytebuddy Highest Product jar package name bytebuddy Highest Product Manifest multi-release true Low Product file name byte-buddy-agent High Product pom artifactid byte-buddy-agent Highest Product Manifest can-retransform-classes true Low Product Manifest bundle-symbolicname net.bytebuddy.byte-buddy-agent Medium Product Manifest Bundle-Name Byte Buddy agent Medium Version pom version 1.10.20 Highest Version Manifest Bundle-Version 1.10.20 High Version file version 1.10.20 High
classmate-1.5.1.jarDescription:
Library for introspecting types with full generic information
including resolving of field and method types.
License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/fasterxml/classmate/1.5.1/classmate-1.5.1.jar
MD5: e91fcd30ba329fd1b0b6dc5321fd067c
SHA1: 3fe0bed568c62df5e89f4f174c101eab25345b6c
SHA256: aab4de3006808c09d25dd4ff4a3611cfb63c95463cfd99e73d2e1680d229a33b
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest bundle-docurl https://github.com/FasterXML/java-classmate Low Vendor pom organization name fasterxml.com High Vendor jar package name types Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.6))" Low Vendor jar package name fasterxml Highest Vendor Manifest specification-vendor fasterxml.com Low Vendor pom organization url https://fasterxml.com Medium Vendor Manifest Implementation-Vendor-Id com.fasterxml Medium Vendor pom groupid com.fasterxml Highest Vendor pom artifactid classmate Low Vendor Manifest Implementation-Vendor fasterxml.com High Vendor pom parent-artifactid oss-parent Low Vendor pom url FasterXML/java-classmate Highest Vendor jar package name classmate Highest Vendor Manifest bundle-symbolicname com.fasterxml.classmate Medium Vendor pom name ClassMate High Vendor file name classmate High Vendor Manifest implementation-build-date 2019-10-19 22:46:35+0000 Low Vendor pom parent-groupid com.fasterxml Medium Vendor pom groupid fasterxml Highest Vendor Manifest automatic-module-name com.fasterxml.classmate Medium Product Manifest Bundle-Name ClassMate Medium Product Manifest bundle-docurl https://github.com/FasterXML/java-classmate Low Product Manifest specification-title ClassMate Medium Product pom organization url https://fasterxml.com Low Product pom url FasterXML/java-classmate High Product jar package name types Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.6))" Low Product pom artifactid classmate Highest Product jar package name fasterxml Highest Product jar package name filter Highest Product jar package name classmate Highest Product Manifest bundle-symbolicname com.fasterxml.classmate Medium Product pom name ClassMate High Product file name classmate High Product Manifest implementation-build-date 2019-10-19 22:46:35+0000 Low Product pom parent-artifactid oss-parent Medium Product pom parent-groupid com.fasterxml Medium Product Manifest Implementation-Title ClassMate High Product pom groupid fasterxml Highest Product Manifest automatic-module-name com.fasterxml.classmate Medium Product pom organization name fasterxml.com Low Version Manifest Bundle-Version 1.5.1 High Version pom parent-version 1.5.1 Low Version file version 1.5.1 High Version pom version 1.5.1 Highest Version Manifest Implementation-Version 1.5.1 High
h2-2.1.214.jarDescription:
H2 Database Engine License:
MPL 2.0: https://www.mozilla.org/en-US/MPL/2.0/
EPL 1.0: https://opensource.org/licenses/eclipse-1.0.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/h2database/h2/2.1.214/h2-2.1.214.jar
MD5: 93628fb706e682dd989f697394039025
SHA1: d5c2005c9e3279201e12d4776c948578b16bf8b2
SHA256: d623cdc0f61d218cf549a8d09f1c391ff91096116b22e2475475fce4fbe72bd0
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest bundle-symbolicname com.h2database Medium Vendor pom groupid h2database Highest Vendor pom url https://h2database.com Highest Vendor Manifest implementation-url https://h2database.com Low Vendor Manifest automatic-module-name com.h2database Medium Vendor Manifest provide-capability osgi.service;objectClass:List=org.osgi.service.jdbc.DataSourceFactory Low Vendor pom name H2 Database Engine High Vendor jar package name h2 Highest Vendor jar package name database Highest Vendor file name h2 High Vendor Manifest bundle-category jdbc Low Vendor Manifest multi-release true Low Vendor pom artifactid h2 Low Vendor pom groupid com.h2database Highest Vendor jar package name engine Highest Product Manifest bundle-symbolicname com.h2database Medium Product pom groupid h2database Highest Product Manifest implementation-url https://h2database.com Low Product Manifest automatic-module-name com.h2database Medium Product Manifest provide-capability osgi.service;objectClass:List=org.osgi.service.jdbc.DataSourceFactory Low Product pom name H2 Database Engine High Product jar package name h2 Highest Product jar package name database Highest Product jar package name jdbc Highest Product file name h2 High Product jar package name service Highest Product Manifest bundle-category jdbc Low Product jar package name org Highest Product pom url https://h2database.com Medium Product Manifest multi-release true Low Product Manifest Implementation-Title H2 Database Engine High Product jar package name engine Highest Product Manifest Bundle-Name H2 Database Engine Medium Product pom artifactid h2 Highest Version Manifest Implementation-Version 2.1.214 High Version Manifest Bundle-Version 2.1.214 High Version file version 2.1.214 High Version pom version 2.1.214 Highest
Published Vulnerabilities CVE-2022-45868 suppress
The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that." CWE-312 Cleartext Storage of Sensitive Information
CVSSv3:
Base Score: HIGH (7.8) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
h2-2.1.214.jar: data.zip: table.jsFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/h2database/h2/2.1.214/h2-2.1.214.jar/org/h2/util/data.zip/org/h2/server/web/res/table.jsMD5: 1c37e9e03787c821410ce684efa8feb7SHA1: 3377bc4afb4fa0aeaa4fff9098ebb4446fa5be99SHA256: 07e1b3fc6feb8a8713b6659fc047cd9177d85b22f4bb0fa857be1c81786db701Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence
h2-2.1.214.jar: data.zip: tree.jsFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/h2database/h2/2.1.214/h2-2.1.214.jar/org/h2/util/data.zip/org/h2/server/web/res/tree.jsMD5: 4303428a5a49c1ae6c87a5dde9b4c9c3SHA1: 9bca06117ddee5657dbe89eea197372128fe56e9SHA256: 1d5c4ba3b1a5dfcfe250fba716b55a9a7d0ffe624fc480713ff782c4d671836fReferenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence
hamcrest-core-1.3.jarDescription:
This is the core API of hamcrest matcher framework to be used by third-party framework providers. This includes the a foundation set of matcher implementations for common operations.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jarMD5: 6393363b47ddcbba82321110c3e07519SHA1: 42a25dc3219429f0e5d060061f71acb49bf010a0SHA256: 66fdef91e9739348df7a096aa384a5685f4e875584cce89386a7a47251c4d8e9Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom name Hamcrest Core High Vendor pom groupid org.hamcrest Highest Vendor Manifest built-date 2012-07-09 19:49:34 Low Vendor pom parent-groupid org.hamcrest Medium Vendor Manifest Implementation-Vendor hamcrest.org High Vendor pom artifactid hamcrest-core Low Vendor file name hamcrest-core High Vendor pom groupid hamcrest Highest Vendor jar package name matcher Highest Vendor pom parent-artifactid hamcrest-parent Low Vendor jar package name hamcrest Highest Vendor jar package name core Highest Product pom name Hamcrest Core High Product pom artifactid hamcrest-core Highest Product file name hamcrest-core High Product pom groupid hamcrest Highest Product pom parent-artifactid hamcrest-parent Medium Product jar package name matcher Highest Product Manifest built-date 2012-07-09 19:49:34 Low Product pom parent-groupid org.hamcrest Medium Product jar package name hamcrest Highest Product Manifest Implementation-Title hamcrest-core High Product jar package name core Highest Version pom version 1.3 Highest Version file version 1.3 High Version Manifest Implementation-Version 1.3 High
hibernate-commons-annotations-5.1.2.Final.jarDescription:
Common reflection code used in support of annotation processing License:
GNU Library General Public License v2.1 or later: http://www.opensource.org/licenses/LGPL-2.1 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/hibernate/common/hibernate-commons-annotations/5.1.2.Final/hibernate-commons-annotations-5.1.2.Final.jar
MD5: 2a2490b3eb8e7585a6a899d27d7ed43f
SHA1: e59ffdbc6ad09eeb33507b39ffcf287679a498c8
SHA256: 1c7ce712b2679fea0a5441eb02a04144297125b768944819be0765befb996275
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest bundle-symbolicname org.hibernate.common.hibernate-commons-annotations Medium Vendor Manifest implementation-url http://hibernate.org Low Vendor Manifest Implementation-Vendor Hibernate.org High Vendor pom artifactid hibernate-commons-annotations Low Vendor pom organization name Hibernate.org High Vendor pom url http://hibernate.org Highest Vendor jar package name hibernate Highest Vendor Manifest Implementation-Vendor-Id org.hibernate Medium Vendor jar package name common Highest Vendor jar package name annotations Highest Vendor hint analyzer vendor redhat Highest Vendor Manifest automatic-module-name org.hibernate.commons.annotations Medium Vendor pom groupid org.hibernate.common Highest Vendor pom groupid hibernate.common Highest Vendor jar package name reflection Highest Vendor pom organization url http://hibernate.org Medium Vendor file name hibernate-commons-annotations High Vendor pom name Hibernate Commons Annotations High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product pom organization url http://hibernate.org Low Product Manifest bundle-symbolicname org.hibernate.common.hibernate-commons-annotations Medium Product Manifest implementation-url http://hibernate.org Low Product jar package name version Highest Product jar package name hibernate Highest Product jar package name common Highest Product pom artifactid hibernate-commons-annotations Highest Product jar package name annotations Highest Product Manifest Bundle-Name hibernate-commons-annotations Medium Product pom organization name Hibernate.org Low Product Manifest automatic-module-name org.hibernate.commons.annotations Medium Product pom groupid hibernate.common Highest Product jar package name reflection Highest Product pom url http://hibernate.org Medium Product file name hibernate-commons-annotations High Product pom name Hibernate Commons Annotations High Version pom version 5.1.2.Final Highest Version Manifest Implementation-Version 5.1.2.Final High Version Manifest Bundle-Version 5.1.2.Final High
hibernate-core-5.6.3.Final.jarDescription:
Hibernate's core ORM functionality License:
GNU Library General Public License v2.1 or later: https://www.opensource.org/licenses/LGPL-2.1 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/hibernate/hibernate-core/5.6.3.Final/hibernate-core-5.6.3.Final.jar
MD5: 7f938eeda4bf347377081bb556c0632f
SHA1: a2420e0a2c9c168c029584aecf6a5b9a2475cd10
SHA256: e535a9df6892d3fe5abf696490b3b0781e9fa2c0c9d0d1f9b8c88ad38d2000c5
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom groupid org.hibernate Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor pom organization url https://hibernate.org Medium Vendor Manifest specification-vendor Hibernate.org Low Vendor pom artifactid hibernate-core Low Vendor Manifest Implementation-Vendor Hibernate.org High Vendor pom organization name Hibernate.org High Vendor pom url https://hibernate.org/orm Highest Vendor jar package name hibernate Highest Vendor Manifest Implementation-Vendor-Id org.hibernate Medium Vendor Manifest automatic-module-name org.hibernate.orm.core Medium Vendor pom groupid hibernate Highest Vendor hint analyzer vendor redhat Highest Vendor Manifest bundle-symbolicname org.hibernate.orm.core Medium Vendor Manifest bundle-docurl https://hibernate.org/orm/5.6 Low Vendor Manifest implementation-url https://hibernate.org/orm Low Vendor pom name Hibernate ORM - hibernate-core High Vendor file name hibernate-core High Product pom artifactid hibernate-core Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product jar package name version Highest Product Manifest specification-title hibernate-core Medium Product jar package name hibernate Highest Product hint analyzer product orm Highest Product Manifest automatic-module-name org.hibernate.orm.core Medium Product pom groupid hibernate Highest Product jar package name filter Highest Product pom organization name Hibernate.org Low Product Manifest Bundle-Name hibernate-core Medium Product Manifest bundle-symbolicname org.hibernate.orm.core Medium Product pom url https://hibernate.org/orm Medium Product pom organization url https://hibernate.org Low Product Manifest Implementation-Title hibernate-core High Product Manifest bundle-docurl https://hibernate.org/orm/5.6 Low Product Manifest implementation-url https://hibernate.org/orm Low Product pom name Hibernate ORM - hibernate-core High Product file name hibernate-core High Version Manifest Implementation-Version 5.6.3.Final High Version pom version 5.6.3.Final Highest Version Manifest Bundle-Version 5.6.3.Final High
Related Dependencies hibernate-entitymanager-5.6.3.Final.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/hibernate/hibernate-entitymanager/5.6.3.Final/hibernate-entitymanager-5.6.3.Final.jar MD5: 1a5cdf4ccfe544aab46d165a5cb65d05 SHA1: 82fcf63c6dae61a03f5c54fd61e62804659a396d SHA256: d4ff808134addbfe7fa17a64408d3903f22901dfcd64dd42b33396e32e414978 pkg:maven/org.hibernate/hibernate-entitymanager@5.6.3.Final istack-commons-runtime-3.0.12.jarDescription:
istack common utility code License:
http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/sun/istack/istack-commons-runtime/3.0.12/istack-commons-runtime-3.0.12.jar
MD5: 1952bd76321f8580cfaa57e332a68287
SHA1: cbbe1a62b0cc6c85972e99d52aaee350153dc530
SHA256: 27d85fc134c9271d5c79d3300fc4669668f017e72409727c428f54f2417f04cd
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom groupid com.sun.istack Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor pom artifactid istack-commons-runtime Low Vendor file name istack-commons-runtime High Vendor pom groupid sun.istack Highest Vendor Manifest bundle-symbolicname com.sun.istack.commons-runtime Medium Vendor jar package name istack Highest Vendor pom parent-groupid com.sun.istack Medium Vendor Manifest Implementation-Vendor-Id com.sun.istack Medium Vendor Manifest implementation-build-id 3.0.12 - 7ed1368 Low Vendor jar package name sun Highest Vendor pom name istack common utility code runtime High Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor jar (hint) package name oracle Highest Vendor jar package name com Highest Vendor Manifest multi-release true Low Vendor pom parent-artifactid istack-commons Low Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-docurl https://www.eclipse.org Low Product pom artifactid istack-commons-runtime Highest Product file name istack-commons-runtime High Product pom groupid sun.istack Highest Product jar package name istack Highest Product Manifest bundle-symbolicname com.sun.istack.commons-runtime Medium Product pom parent-groupid com.sun.istack Medium Product Manifest implementation-build-id 3.0.12 - 7ed1368 Low Product jar package name sun Highest Product pom name istack common utility code runtime High Product Manifest Bundle-Name istack common utility code runtime Medium Product pom parent-artifactid istack-commons Medium Product jar package name com Highest Product Manifest multi-release true Low Version pom version 3.0.12 Highest Version Manifest Bundle-Version 3.0.12 High Version file version 3.0.12 High Version Manifest implementation-build-id 3.0.12 Low
it-tidalwave-messagebus-3.2-ALPHA-13.jarDescription:
An abstract description of a simple message bus to be used within an application.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-messagebus/3.2-ALPHA-13/it-tidalwave-messagebus-3.2-ALPHA-13.jarMD5: 9992d8a0d104bf4ad40b9fc375d7149bSHA1: 0dd552ddf34b26b3cd6e20b4f719666ef4b98adaSHA256: 03f9d03588cce9ff2ede5a423198ef8c605ee1e2ffbde776eba6a465546f48e3Referenced In Projects/Scopes:
TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile Evidence Type Source Name Value Confidence Vendor Manifest build-jdk-spec 11 Low Vendor jar package name tidalwave Highest Vendor pom artifactid it-tidalwave-messagebus Low Vendor jar package name messagebus Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor pom name TheseFoolishThings :: MessageBus High Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor jar package name it Highest Vendor pom parent-artifactid modules Low Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor file name it-tidalwave-messagebus High Product Manifest build-jdk-spec 11 Low Product jar package name messagebus Highest Product jar package name tidalwave Highest Product Manifest Implementation-Title TheseFoolishThings :: MessageBus High Product pom name TheseFoolishThings :: MessageBus High Product jar package name it Highest Product Manifest specification-title TheseFoolishThings :: MessageBus Medium Product pom groupid it.tidalwave.thesefoolishthings Highest Product file name it-tidalwave-messagebus High Product pom artifactid it-tidalwave-messagebus Highest Product pom parent-artifactid modules Medium Version pom version 3.2-ALPHA-13 Highest
it-tidalwave-role-3.2-ALPHA-13.jarDescription:
Roles are a powerful way for designing complex behaviours while keeping good practices such as Single Responsibility, Dependency Inversion and
Interface Segregation.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-role/3.2-ALPHA-13/it-tidalwave-role-3.2-ALPHA-13.jarMD5: 47fc775a52a26416035d14e471a6dfa7SHA1: cb3eac18bf1f94bef761915cd1ff22a0b30dc6d7SHA256: 33bd323639d78f8369ab2d2be41f8089c42eb752f8b5a6206b7fd543152daf8fReferenced In Projects/Scopes:
TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest build-jdk-spec 11 Low Vendor jar package name tidalwave Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor jar package name it Highest Vendor pom parent-artifactid modules Low Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor pom name TheseFoolishThings :: Roles High Vendor file name it-tidalwave-role High Vendor pom artifactid it-tidalwave-role Low Vendor jar package name role Highest Product Manifest build-jdk-spec 11 Low Product pom artifactid it-tidalwave-role Highest Product Manifest specification-title TheseFoolishThings :: Roles Medium Product Manifest Implementation-Title TheseFoolishThings :: Roles High Product jar package name tidalwave Highest Product jar package name it Highest Product pom groupid it.tidalwave.thesefoolishthings Highest Product pom name TheseFoolishThings :: Roles High Product file name it-tidalwave-role High Product jar package name role Highest Product pom parent-artifactid modules Medium Version pom version 3.2-ALPHA-13 Highest
it-tidalwave-role-spring-3.2-ALPHA-13.jarDescription:
Specific Spring support for DCI roles.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-role-spring/3.2-ALPHA-13/it-tidalwave-role-spring-3.2-ALPHA-13.jarMD5: cd6c6f56d524561e8e999872e69bb324SHA1: ba43b1585e31d2e025bc026ec5282515ab87f0deSHA256: 790e337889c7e50051bfc9db4aa032918a93752cff4ffab31d0fdb6295d306c1Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest build-jdk-spec 11 Low Vendor jar package name tidalwave Highest Vendor pom parent-artifactid modules Low Vendor file name it-tidalwave-role-spring High Vendor pom artifactid it-tidalwave-role-spring Low Vendor jar package name spring Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor jar package name it Highest Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor jar package name role Highest Vendor pom name TheseFoolishThings :: Roles :: Spring High Product Manifest build-jdk-spec 11 Low Product jar package name tidalwave Highest Product file name it-tidalwave-role-spring High Product pom parent-artifactid modules Medium Product Manifest specification-title TheseFoolishThings :: Roles :: Spring Medium Product Manifest Implementation-Title TheseFoolishThings :: Roles :: Spring High Product jar package name spring Highest Product jar package name it Highest Product pom artifactid it-tidalwave-role-spring Highest Product pom groupid it.tidalwave.thesefoolishthings Highest Product jar package name role Highest Product pom name TheseFoolishThings :: Roles :: Spring High Version pom version 3.2-ALPHA-13 Highest
it-tidalwave-thesefoolishthings-examples-data-3.2-ALPHA-13.jarDescription:
This module provides sample data structures used by other examples.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-thesefoolishthings-examples-data/3.2-ALPHA-13/it-tidalwave-thesefoolishthings-examples-data-3.2-ALPHA-13.jarMD5: 31d9d9403900352423f7e95ab27d632cSHA1: 17bf6988874cef3addfb244d17b3eec10d6bfb64SHA256: 9a611e7de2638d053bf2cac0d2169050f9412c03037ec01852ff486cc87ca0b9Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest build-jdk-spec 11 Low Vendor jar package name tidalwave Highest Vendor pom name TheseFoolishThings :: Examples :: Data High Vendor pom parent-artifactid thesefoolishthings-examples Low Vendor file name it-tidalwave-thesefoolishthings-examples-data High Vendor jar package name examples Highest Vendor jar package name thesefoolishthings Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor jar package name it Highest Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor pom artifactid it-tidalwave-thesefoolishthings-examples-data Low Product Manifest build-jdk-spec 11 Low Product jar package name tidalwave Highest Product pom name TheseFoolishThings :: Examples :: Data High Product Manifest Implementation-Title TheseFoolishThings :: Examples :: Data High Product pom parent-artifactid thesefoolishthings-examples Medium Product file name it-tidalwave-thesefoolishthings-examples-data High Product jar package name examples Highest Product jar package name thesefoolishthings Highest Product jar package name it Highest Product Manifest specification-title TheseFoolishThings :: Examples :: Data Medium Product pom artifactid it-tidalwave-thesefoolishthings-examples-data Highest Product pom groupid it.tidalwave.thesefoolishthings Highest Version pom version 3.2-ALPHA-13 Highest
it-tidalwave-thesefoolishthings-examples-finderexample1-3.2-ALPHA-13.jarDescription:
A simple example of Finder usage.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-thesefoolishthings-examples-finderexample1/3.2-ALPHA-13/it-tidalwave-thesefoolishthings-examples-finderexample1-3.2-ALPHA-13.jarMD5: 0fc75cdba930590202c6e49645bc7c5fSHA1: b248426ee9d9b6790916121a889d4cd4efa94695SHA256: 5f4b73d9ccf1febb566313e0381b6f0a6b3f8213342169e37c2b04c7fe33aa47Referenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile
Evidence Type Source Name Value Confidence Vendor Manifest build-jdk-spec 11 Low Vendor pom name TheseFoolishThings :: Examples :: Finder :: In-memory Finder High Vendor jar package name tidalwave Highest Vendor pom parent-artifactid thesefoolishthings-examples Low Vendor jar package name examples Highest Vendor jar package name thesefoolishthings Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor jar package name it Highest Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor file name it-tidalwave-thesefoolishthings-examples-finderexample1 High Vendor pom artifactid it-tidalwave-thesefoolishthings-examples-finderexample1 Low Product Manifest build-jdk-spec 11 Low Product pom name TheseFoolishThings :: Examples :: Finder :: In-memory Finder High Product pom artifactid it-tidalwave-thesefoolishthings-examples-finderexample1 Highest Product jar package name tidalwave Highest Product pom parent-artifactid thesefoolishthings-examples Medium Product Manifest specification-title TheseFoolishThings :: Examples :: Finder :: In-memory Finder Medium Product jar package name examples Highest Product jar package name thesefoolishthings Highest Product Manifest Implementation-Title TheseFoolishThings :: Examples :: Finder :: In-memory Finder High Product jar package name it Highest Product pom groupid it.tidalwave.thesefoolishthings Highest Product file name it-tidalwave-thesefoolishthings-examples-finderexample1 High Version pom version 3.2-ALPHA-13 Highest
it-tidalwave-util-3.2-ALPHA-13.jarDescription:
A collection of common utilities.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-util/3.2-ALPHA-13/it-tidalwave-util-3.2-ALPHA-13.jarMD5: f5c49524e4c30ff650eb46976a767aadSHA1: ba3cfecfeffeaaf48d11acaf1c6e5a93eef527eeSHA256: 4cbbc7184cccba63987059dd67753273e019a677a2513395a86d44066c0a7804Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor Manifest build-jdk-spec 11 Low Vendor jar package name util Highest Vendor jar package name tidalwave Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor jar package name it Highest Vendor pom parent-artifactid modules Low Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor pom artifactid it-tidalwave-util Low Vendor file name it-tidalwave-util High Vendor pom name TheseFoolishThings :: Utilities High Product Manifest build-jdk-spec 11 Low Product jar package name util Highest Product Manifest Implementation-Title TheseFoolishThings :: Utilities High Product jar package name tidalwave Highest Product jar package name it Highest Product pom artifactid it-tidalwave-util Highest Product pom groupid it.tidalwave.thesefoolishthings Highest Product file name it-tidalwave-util High Product Manifest specification-title TheseFoolishThings :: Utilities Medium Product pom name TheseFoolishThings :: Utilities High Product pom parent-artifactid modules Medium Version pom version 3.2-ALPHA-13 Highest
it-tidalwave-util-test-3.2-ALPHA-13.jarDescription:
Miscellaneous utilities for testing.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-util-test/3.2-ALPHA-13/it-tidalwave-util-test-3.2-ALPHA-13.jarMD5: d6cec46f8079cb51c72a15ebc26b9d30SHA1: e3951a6dcec26e755d780ef526a8c4f064a4ab53SHA256: eb1f96397bfe1ffe99c7f34e850db6802b1a76880eb6e7931c0388338b208f88Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile Evidence Type Source Name Value Confidence Vendor Manifest build-jdk-spec 11 Low Vendor jar package name util Highest Vendor jar package name tidalwave Highest Vendor pom parent-artifactid modules Low Vendor pom name TheseFoolishThings :: Test Utilities High Vendor pom artifactid it-tidalwave-util-test Low Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor jar package name it Highest Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor jar package name test Highest Vendor file name it-tidalwave-util-test High Product Manifest build-jdk-spec 11 Low Product jar package name util Highest Product Manifest specification-title TheseFoolishThings :: Test Utilities Medium Product jar package name tidalwave Highest Product Manifest Implementation-Title TheseFoolishThings :: Test Utilities High Product pom parent-artifactid modules Medium Product pom name TheseFoolishThings :: Test Utilities High Product jar package name it Highest Product pom artifactid it-tidalwave-util-test Highest Product pom groupid it.tidalwave.thesefoolishthings Highest Product jar package name test Highest Product file name it-tidalwave-util-test High Version pom version 3.2-ALPHA-13 Highest
jakarta.activation-1.2.2.jarDescription:
Jakarta Activation License:
http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/sun/activation/jakarta.activation/1.2.2/jakarta.activation-1.2.2.jar
MD5: 0b8bee3bf29b9a015f8b992035581a7c
SHA1: 74548703f9851017ce2f556066659438019e7eb5
SHA256: 02156773e4ae9d048d14a56ad35d644bee9f1052a791d072df3ded3c656e6e1a
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:runtime TheseFoolishThings :: Examples :: DCI :: Persistence JPA:runtime Evidence Type Source Name Value Confidence Vendor jar package name activation Highest Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor pom parent-artifactid all Low Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=9.0))" Low Vendor pom name Jakarta Activation High Vendor Manifest Implementation-Vendor-Id com.sun Medium Vendor jar package name sun Highest Vendor pom parent-groupid com.sun.activation Medium Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor pom artifactid jakarta.activation Low Vendor pom groupid com.sun.activation Highest Vendor jar (hint) package name oracle Highest Vendor Manifest specification-vendor Eclipse Foundation Low Vendor Manifest bundle-symbolicname com.sun.activation.jakarta.activation Medium Vendor pom groupid sun.activation Highest Vendor file name jakarta.activation High Vendor Manifest extension-name jakarta.activation Medium Product jar package name activation Highest Product Manifest bundle-docurl https://www.eclipse.org Low Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=9.0))" Low Product pom name Jakarta Activation High Product Manifest specification-title Jakarta Activation Specification Medium Product jar package name javax Highest Product jar package name sun Highest Product pom parent-groupid com.sun.activation Medium Product Manifest Implementation-Title javax.activation High Product pom parent-artifactid all Medium Product pom artifactid jakarta.activation Highest Product Manifest bundle-symbolicname com.sun.activation.jakarta.activation Medium Product pom groupid sun.activation Highest Product Manifest Bundle-Name Jakarta Activation Medium Product file name jakarta.activation High Product Manifest extension-name jakarta.activation Medium Version pom version 1.2.2 Highest Version Manifest Bundle-Version 1.2.2 High Version Manifest Implementation-Version 1.2.2 High Version file version 1.2.2 High
jakarta.annotation-api-1.3.5.jarDescription:
Jakarta Annotations API License:
EPL 2.0: http://www.eclipse.org/legal/epl-2.0
GPL2 w/ CPE: https://www.gnu.org/software/classpath/license.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/jakarta/annotation/jakarta.annotation-api/1.3.5/jakarta.annotation-api-1.3.5.jar
MD5: 8b165cf58df5f8c2a222f637c0a07c97
SHA1: 59eb84ee0d616332ff44aba065f3888cf002cd2d
SHA256: 85fb03fc054cdf4efca8efd9b6712bbb418e1ab98241c4539c8585bbc23e1b8a
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor pom url https://projects.eclipse.org/projects/ee4j.ca Highest Vendor Manifest extension-name jakarta.annotation Medium Vendor pom parent-artifactid ca-parent Low Vendor pom groupid jakarta.annotation Highest Vendor file name jakarta.annotation-api High Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor pom artifactid jakarta.annotation-api Low Vendor jar package name annotation Highest Vendor Manifest specification-vendor Eclipse Foundation Low Vendor Manifest automatic-module-name java.annotation Medium Vendor Manifest bundle-symbolicname jakarta.annotation-api Medium Vendor pom name Jakarta Annotations API High Vendor Manifest Implementation-Vendor-Id org.glassfish Medium Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-docurl https://www.eclipse.org Low Product Manifest extension-name jakarta.annotation Medium Product pom groupid jakarta.annotation Highest Product file name jakarta.annotation-api High Product pom artifactid jakarta.annotation-api Highest Product pom url https://projects.eclipse.org/projects/ee4j.ca Medium Product Manifest Bundle-Name Jakarta Annotations API Medium Product jar package name annotation Highest Product Manifest automatic-module-name java.annotation Medium Product Manifest bundle-symbolicname jakarta.annotation-api Medium Product pom parent-artifactid ca-parent Medium Product pom name Jakarta Annotations API High Version Manifest Bundle-Version 1.3.5 High Version pom version 1.3.5 Highest Version Manifest Implementation-Version 1.3.5 High Version file version 1.3.5 High
jakarta.persistence-api-2.2.3.jarDescription:
Jakarta Persistence 2.2 API jar License:
Eclipse Public License v. 2.0: http://www.eclipse.org/legal/epl-2.0
Eclipse Distribution License v. 1.0: http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/jakarta/persistence/jakarta.persistence-api/2.2.3/jakarta.persistence-api-2.2.3.jar
MD5: e0a655f398f8e68e0afebb0f71fba4e5
SHA1: 8f6ea5daedc614f07a3654a455660145286f024e
SHA256: 0c2d73ab36ad24eeed6e0bea928e9d0ef771de8df689e23b7754d366dda27c53
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom name Jakarta Persistence API High Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor jar package name persistence Highest Vendor Manifest bundle-symbolicname jakarta.persistence-api Medium Vendor file name jakarta.persistence-api High Vendor pom parent-artifactid project Low Vendor pom url eclipse-ee4j/jpa-api Highest Vendor pom artifactid jakarta.persistence-api Low Vendor Manifest automatic-module-name java.persistence Medium Vendor Manifest specification-vendor Eclipse Foundation Low Vendor Manifest extension-name jakarta.persistence Medium Vendor pom groupid jakarta.persistence Highest Vendor pom parent-groupid org.eclipse.ee4j Medium Product pom name Jakarta Persistence API High Product Manifest bundle-docurl https://www.eclipse.org Low Product jar package name persistence Highest Product pom artifactid jakarta.persistence-api Highest Product Manifest bundle-symbolicname jakarta.persistence-api Medium Product file name jakarta.persistence-api High Product Manifest Bundle-Name Jakarta Persistence API jar Medium Product Manifest automatic-module-name java.persistence Medium Product Manifest extension-name jakarta.persistence Medium Product pom groupid jakarta.persistence Highest Product pom parent-artifactid project Medium Product pom parent-groupid org.eclipse.ee4j Medium Product pom url eclipse-ee4j/jpa-api High Version Manifest Implementation-Version 2.2.3 High Version Manifest Bundle-Version 2.2.3 High Version pom version 2.2.3 Highest Version pom parent-version 2.2.3 Low Version file version 2.2.3 High
jakarta.transaction-api-1.3.3.jarDescription:
Jakarta Transactions License:
EPL 2.0: http://www.eclipse.org/legal/epl-2.0
GPL2 w/ CPE: https://www.gnu.org/software/classpath/license.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/jakarta/transaction/jakarta.transaction-api/1.3.3/jakarta.transaction-api-1.3.3.jar
MD5: cc45726045cc9a0728f803f9db4c90c4
SHA1: c4179d48720a1e87202115fbed6089bdc4195405
SHA256: 0b02a194dd04ee2e192dc9da9579e10955dd6e8ac707adfc91d92f119b0e67ab
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor Manifest bundle-docurl https://github.com/eclipse-ee4j Low Vendor Manifest Implementation-Vendor EE4J Community High Vendor pom url https://projects.eclipse.org/projects/ee4j.jta Highest Vendor jar package name javax Highest Vendor pom artifactid jakarta.transaction-api Low Vendor Manifest extension-name javax.transaction Medium Vendor pom organization name EE4J Community High Vendor jar package name transaction Highest Vendor file name jakarta.transaction-api High Vendor pom parent-artifactid project Low Vendor pom organization url eclipse-ee4j Medium Vendor Manifest specification-vendor Oracle Corporation Low Vendor pom name ${extension.name} API High Vendor pom groupid jakarta.transaction Highest Vendor pom parent-groupid org.eclipse.ee4j Medium Vendor Manifest bundle-symbolicname jakarta.transaction-api Medium Vendor Manifest automatic-module-name java.transaction Medium Vendor Manifest Implementation-Vendor-Id org.glassfish Medium Product Manifest bundle-docurl https://github.com/eclipse-ee4j Low Product Manifest Bundle-Name javax.transaction API Medium Product pom artifactid jakarta.transaction-api Highest Product jar package name javax Highest Product Manifest extension-name javax.transaction Medium Product jar package name transaction Highest Product file name jakarta.transaction-api High Product pom organization name EE4J Community Low Product pom name ${extension.name} API High Product pom url https://projects.eclipse.org/projects/ee4j.jta Medium Product pom groupid jakarta.transaction Highest Product pom parent-artifactid project Medium Product pom parent-groupid org.eclipse.ee4j Medium Product pom url eclipse-ee4j High Product Manifest bundle-symbolicname jakarta.transaction-api Medium Product Manifest automatic-module-name java.transaction Medium Version Manifest Implementation-Version 1.3.3 High Version Manifest Bundle-Version 1.3.3 High Version pom version 1.3.3 Highest Version file version 1.3.3 High Version pom parent-version 1.3.3 Low
jakarta.xml.bind-api-2.3.3.jarDescription:
Jakarta XML Binding API 2.3 Design Specification License:
http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/jakarta/xml/bind/jakarta.xml.bind-api/2.3.3/jakarta.xml.bind-api-2.3.3.jar
MD5: 61286918ca0192e9f87d1358aef718dd
SHA1: 48e3b9cfc10752fba3521d6511f4165bea951801
SHA256: c04539f472e9a6dd0c7685ea82d677282269ab8e7baca2e14500e381e0c6cec5
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest build-jdk-spec 11 Low Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor pom artifactid jakarta.xml.bind-api Low Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor file name jakarta.xml.bind-api High Vendor jar package name xml Highest Vendor Manifest implementation-build-id 2.3.3-RELEASE-fd06b2b Low Vendor jar package name bind Highest Vendor Manifest extension-name jakarta.xml.bind Medium Vendor pom parent-artifactid jakarta.xml.bind-api-parent Low Vendor Manifest specification-vendor Eclipse Foundation Low Vendor pom name Jakarta XML Binding API High Vendor Manifest bundle-symbolicname jakarta.xml.bind-api Medium Vendor Manifest multi-release true Low Vendor pom groupid jakarta.xml.bind Highest Product Manifest build-jdk-spec 11 Low Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-docurl https://www.eclipse.org Low Product pom artifactid jakarta.xml.bind-api Highest Product pom parent-artifactid jakarta.xml.bind-api-parent Medium Product file name jakarta.xml.bind-api High Product jar package name xml Highest Product Manifest implementation-build-id 2.3.3-RELEASE-fd06b2b Low Product jar package name bind Highest Product Manifest extension-name jakarta.xml.bind Medium Product pom name Jakarta XML Binding API High Product Manifest bundle-symbolicname jakarta.xml.bind-api Medium Product Manifest multi-release true Low Product pom groupid jakarta.xml.bind Highest Product Manifest Bundle-Name Jakarta XML Binding API Medium Version file version 2.3.3 High Version pom version 2.3.3 Highest Version Manifest Implementation-Version 2.3.3 High Version Manifest Bundle-Version 2.3.3 High
jandex-2.2.3.Final.jarDescription:
Parent POM for JBoss projects. Provides default project build configuration. License:
Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/jboss/jandex/2.2.3.Final/jandex-2.2.3.Final.jar
MD5: 721b5868cfbb718dd97facc96929dde8
SHA1: d3865101f0666b63586683bd811d754517f331ab
SHA256: 0544d55ec0cb378fd8f3b20e66277f893f3094cb67e71a1ec0cce6ce150f83b3
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest bundle-symbolicname org.jboss.jandex Medium Vendor pom parent-artifactid jboss-parent Low Vendor jar package name indexer Highest Vendor pom groupid jboss Highest Vendor pom parent-groupid org.jboss Medium Vendor pom groupid org.jboss Highest Vendor Manifest build-timestamp Fri, 22 Jan 2021 15:14:59 -0600 Low Vendor Manifest java-vendor AdoptOpenJDK Medium Vendor file name jandex High Vendor Manifest implementation-url http://www.jboss.org/jandex Low Vendor Manifest automatic-module-name org.jboss.jandex Medium Vendor Manifest Implementation-Vendor-Id org.jboss Medium Vendor Manifest os-arch x86_64 Low Vendor pom artifactid jandex Low Vendor Manifest os-name Mac OS X Medium Vendor hint analyzer vendor redhat Highest Vendor Manifest specification-vendor JBoss by Red Hat Low Vendor Manifest Implementation-Vendor JBoss by Red Hat High Vendor pom name Java Annotation Indexer High Vendor jar package name jboss Highest Vendor jar package name jandex Highest Vendor Manifest bundle-docurl http://www.jboss.org Low Product jar package name indexer Highest Product Manifest bundle-symbolicname org.jboss.jandex Medium Product Manifest Implementation-Title Java Annotation Indexer High Product pom groupid jboss Highest Product Manifest specification-title Java Annotation Indexer Medium Product pom parent-groupid org.jboss Medium Product pom artifactid jandex Highest Product Manifest build-timestamp Fri, 22 Jan 2021 15:14:59 -0600 Low Product file name jandex High Product Manifest implementation-url http://www.jboss.org/jandex Low Product Manifest automatic-module-name org.jboss.jandex Medium Product Manifest os-arch x86_64 Low Product Manifest os-name Mac OS X Medium Product pom name Java Annotation Indexer High Product jar package name jboss Highest Product pom parent-artifactid jboss-parent Medium Product jar package name jandex Highest Product Manifest Bundle-Name Java Annotation Indexer Medium Product Manifest bundle-docurl http://www.jboss.org Low Version Manifest Implementation-Version 2.2.3.Final High Version Manifest Bundle-Version 2.2.3.Final High Version pom version 2.2.3.Final Highest Version pom parent-version 2.2.3.Final Low
java-diff-utils-4.9.jarDescription:
The DiffUtils library for computing diffs, applying patches, generationg side-by-side view in Java. License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/io/github/java-diff-utils/java-diff-utils/4.9/java-diff-utils-4.9.jar
MD5: 6a4c9c3c4f2a61ff97b38c9f7bac91fa
SHA1: 3ec791c5aa74a72fb499ae8d9547abe27b637b0f
SHA256: 2dcf8710d0a453d8fa56c6d76bc4f16f86ec5de8eb7155f17ebff595c0c64aa0
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor pom parent-artifactid java-diff-utils-parent Low Vendor pom artifactid java-diff-utils Low Vendor pom name java-diff-utils High Vendor Manifest bundle-symbolicname io.github.java-diff-utils Medium Vendor pom groupid io.github.java-diff-utils Highest Vendor file name java-diff-utils High Vendor Manifest automatic-module-name io.github.javadiffutils Medium Vendor jar package name github Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest Bundle-Name java-diff-utils Medium Product pom parent-artifactid java-diff-utils-parent Medium Product pom name java-diff-utils High Product Manifest bundle-symbolicname io.github.java-diff-utils Medium Product pom groupid io.github.java-diff-utils Highest Product file name java-diff-utils High Product Manifest automatic-module-name io.github.javadiffutils Medium Product jar package name github Highest Product pom artifactid java-diff-utils Highest Product jar package name diffutils Highest Version pom version 4.9 Highest Version file version 4.9 High
Published Vulnerabilities CVE-2021-4277 suppress
A vulnerability, which was classified as problematic, has been found in fredsmith utils. This issue affects some unknown processing of the file screenshot_sync of the component Filename Handler. The manipulation leads to predictable from observable state. The name of the patch is dbab1b66955eeb3d76b34612b358307f5c4e3944. It is recommended to apply a patch to fix this issue. The identifier VDB-216749 was assigned to this vulnerability. CWE-330 Use of Insufficiently Random Values
CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N References:
Vulnerable Software & Versions:
javax.activation-api-1.2.0.jarDescription:
JavaBeans Activation Framework API jar License:
https://github.com/javaee/activation/blob/master/LICENSE.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/activation/javax.activation-api/1.2.0/javax.activation-api-1.2.0.jar
MD5: 5e50e56bcf4a3ef3bc758f69f7643c3b
SHA1: 85262acf3ca9816f9537ca47d5adeabaead7cb16
SHA256: 43fdef0b5b6ceb31b0424b208b930c74ab58fac2ceeb7b3f6fd3aeb8b5ca4393
Referenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile
Evidence Type Source Name Value Confidence Vendor jar package name activation Highest Vendor pom parent-artifactid all Low Vendor file name javax.activation-api High Vendor Manifest automatic-module-name java.activation Medium Vendor Manifest Implementation-Vendor-Id com.sun Medium Vendor Manifest extension-name javax.activation Medium Vendor jar package name javax Highest Vendor Manifest originally-created-by 1.8.0_141 (Oracle Corporation) Low Vendor pom artifactid javax.activation-api Low Vendor Manifest specification-vendor Oracle Low Vendor pom parent-groupid com.sun.activation Medium Vendor pom name JavaBeans Activation Framework API jar High Vendor Manifest bundle-docurl http://www.oracle.com Low Vendor pom groupid javax.activation Highest Vendor Manifest bundle-symbolicname javax.activation-api Medium Vendor Manifest Implementation-Vendor Oracle High Vendor Manifest (hint) specification-vendor sun Low Vendor Manifest (hint) Implementation-Vendor sun High Product jar package name activation Highest Product file name javax.activation-api High Product Manifest automatic-module-name java.activation Medium Product Manifest extension-name javax.activation Medium Product Manifest Implementation-Title javax.activation.javax.activation-api High Product jar package name javax Highest Product Manifest specification-title javax.activation.javax.activation-api Medium Product Manifest originally-created-by 1.8.0_141 (Oracle Corporation) Low Product pom parent-groupid com.sun.activation Medium Product pom artifactid javax.activation-api Highest Product pom name JavaBeans Activation Framework API jar High Product Manifest bundle-docurl http://www.oracle.com Low Product pom groupid javax.activation Highest Product Manifest bundle-symbolicname javax.activation-api Medium Product Manifest Bundle-Name JavaBeans Activation Framework API jar Medium Product pom parent-artifactid all Medium Version pom version 1.2.0 Highest Version Manifest Bundle-Version 1.2.0 High Version Manifest Implementation-Version 1.2.0 High Version file version 1.2.0 High
javax.annotation-api-1.3.2.jarDescription:
Common Annotations for the JavaTM Platform API License:
CDDL + GPLv2 with classpath exception: https://github.com/javaee/javax.annotation/blob/master/LICENSE File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/annotation/javax.annotation-api/1.3.2/javax.annotation-api-1.3.2.jar
MD5: 2ab1973eefffaa2aeec47d50b9e40b9d
SHA1: 934c04d3cfef185a8008e7bf34331b79730a9d43
SHA256: e04ba5195bcd555dc95650f7cc614d151e4bcd52d29a10b8aa2197f3ab89ab9b
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings (modules):compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: MessageBus:compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Utilities:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor pom organization url https://javaee.github.io/glassfish Medium Vendor Manifest bundle-symbolicname javax.annotation-api Medium Vendor jar package name javax Highest Vendor pom parent-artifactid jvnet-parent Low Vendor pom parent-groupid net.java Medium Vendor Manifest Implementation-Vendor GlassFish Community High Vendor pom groupid javax.annotation Highest Vendor Manifest extension-name javax.annotation Medium Vendor Manifest bundle-docurl https://javaee.github.io/glassfish Low Vendor jar package name annotation Highest Vendor Manifest specification-vendor Oracle Corporation Low Vendor pom organization name GlassFish Community High Vendor pom name ${extension.name} API High Vendor pom url http://jcp.org/en/jsr/detail?id=250 Highest Vendor Manifest automatic-module-name java.annotation Medium Vendor pom artifactid javax.annotation-api Low Vendor file name javax.annotation-api High Vendor Manifest Implementation-Vendor-Id org.glassfish Medium Product Manifest bundle-symbolicname javax.annotation-api Medium Product jar package name javax Highest Product pom url http://jcp.org/en/jsr/detail?id=250 Medium Product pom parent-groupid net.java Medium Product Manifest extension-name javax.annotation Medium Product pom groupid javax.annotation Highest Product pom parent-artifactid jvnet-parent Medium Product Manifest bundle-docurl https://javaee.github.io/glassfish Low Product jar package name annotation Highest Product pom name ${extension.name} API High Product pom organization url https://javaee.github.io/glassfish Low Product pom artifactid javax.annotation-api Highest Product Manifest Bundle-Name javax.annotation API Medium Product Manifest automatic-module-name java.annotation Medium Product file name javax.annotation-api High Product pom organization name GlassFish Community Low Version Manifest Bundle-Version 1.3.2 High Version pom version 1.3.2 Highest Version Manifest Implementation-Version 1.3.2 High Version file version 1.3.2 High Version pom parent-version 1.3.2 Low
javax.inject-1.jarDescription:
The javax.inject API License:
The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/inject/javax.inject/1/javax.inject-1.jar
MD5: 289075e48b909e9e74e6c915b3631d2e
SHA1: 6975da39a7040257bd51d21a231b76c915872d38
SHA256: 91c77044a50c481636c32d916fd89c9118a72195390452c81065080f957de7ff
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom groupid javax.inject Highest Vendor pom artifactid javax.inject Low Vendor file name javax.inject-1 High Vendor jar package name inject Highest Vendor jar package name javax Highest Vendor pom name javax.inject High Vendor pom url http://code.google.com/p/atinject/ Highest Vendor jar package name inject Low Vendor jar package name javax Low Product pom groupid javax.inject Highest Product file name javax.inject-1 High Product pom artifactid javax.inject Highest Product jar package name inject Highest Product jar package name javax Highest Product pom name javax.inject High Product pom url http://code.google.com/p/atinject/ Medium Product jar package name inject Low Version pom version 1 Highest Version file version 1 Medium
javax.persistence-api-2.2.jarDescription:
Java(TM) Persistence API License:
Eclipse Public License v1.0: http://www.eclipse.org/legal/epl-v10.html
Eclipse Distribution License v. 1.0: http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/persistence/javax.persistence-api/2.2/javax.persistence-api-2.2.jar
MD5: e6520b3435f5b6d58eee415b5542abf8
SHA1: 25665ac8c0b62f50e6488173233239120fc52c96
SHA256: 5578b71b37999a5eaed3fea0d14aa61c60c6ec6328256f2b63472f336318baf4
Referenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile
Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor file name javax.persistence-api High Vendor jar package name persistence Highest Vendor jar package name javax Highest Vendor pom parent-artifactid jvnet-parent Low Vendor pom parent-groupid net.java Medium Vendor pom artifactid javax.persistence-api Low Vendor pom url javaee/jpa-spec Highest Vendor Manifest Implementation-Vendor-Id com.oracle Medium Vendor Manifest specification-vendor Oracle Corporation Low Vendor Manifest automatic-module-name java.persistence Medium Vendor Manifest bundle-symbolicname javax.persistence-api Medium Vendor pom groupid javax.persistence Highest Vendor Manifest extension-name javax.persistence Medium Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product file name javax.persistence-api High Product pom artifactid javax.persistence-api Highest Product jar package name persistence Highest Product jar package name javax Highest Product pom parent-groupid net.java Medium Product jar package name version Highest Product pom parent-artifactid jvnet-parent Medium Product Manifest automatic-module-name java.persistence Medium Product Manifest bundle-symbolicname javax.persistence-api Medium Product pom groupid javax.persistence Highest Product Manifest Bundle-Name Java(TM) Persistence API jar Medium Product Manifest extension-name javax.persistence Medium Product pom url javaee/jpa-spec High Version file version 2.2 High Version pom version 2.2 Highest Version Manifest Bundle-Version 2.2 High Version Manifest Implementation-Version 2.2 High Version pom parent-version 2.2 Low
jaxb-api-2.3.1.jarDescription:
JAXB (JSR 222) API License:
https://oss.oracle.com/licenses/CDDL+GPL-1.1, https://oss.oracle.com/licenses/CDDL+GPL-1.1 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/xml/bind/jaxb-api/2.3.1/jaxb-api-2.3.1.jar
MD5: bcf270d320f645ad19f5edb60091e87f
SHA1: 8531ad5ac454cc2deb9d4d32c40c4d7451939b5d
SHA256: 88b955a0df57880a26a74708bc34f74dcaf8ebf4e78843a28b50eae945732b06
Referenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile
Evidence Type Source Name Value Confidence Vendor jar package name jaxb Highest Vendor Manifest bundle-symbolicname jaxb-api Medium Vendor jar package name javax Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version>=1.8))" Low Vendor pom artifactid jaxb-api Low Vendor Manifest bundle-docurl http://www.oracle.com/ Low Vendor Manifest implementation-build-id UNKNOWN-7de2ca118a0cfc4a373872915aef59148dff5f93, 2018-09-12T06:28:43-0700 Low Vendor jar package name xml Highest Vendor file name jaxb-api High Vendor Manifest Implementation-Vendor Oracle Corporation High Vendor jar package name bind Highest Vendor Manifest specification-vendor Oracle Corporation Low Vendor Manifest extension-name javax.xml.bind Medium Vendor pom groupid javax.xml.bind Highest Vendor Manifest multi-release true Low Vendor pom parent-artifactid jaxb-api-parent Low Vendor Manifest Implementation-Vendor-Id org.glassfish Medium Product jar package name jaxb Highest Product Manifest bundle-symbolicname jaxb-api Medium Product jar package name javax Highest Product pom artifactid jaxb-api Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version>=1.8))" Low Product Manifest bundle-docurl http://www.oracle.com/ Low Product pom parent-artifactid jaxb-api-parent Medium Product Manifest implementation-build-id UNKNOWN-7de2ca118a0cfc4a373872915aef59148dff5f93, 2018-09-12T06:28:43-0700 Low Product jar package name xml Highest Product file name jaxb-api High Product jar package name bind Highest Product Manifest Bundle-Name jaxb-api Medium Product Manifest extension-name javax.xml.bind Medium Product Manifest multi-release true Low Product pom groupid javax.xml.bind Highest Product Manifest specification-title jaxb-api Medium Version file version 2.3.1 High Version pom version 2.3.1 Highest Version Manifest Bundle-Version 2.3.1 High
jaxb-runtime-2.3.5.jarDescription:
JAXB (JSR 222) Reference Implementation License:
http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/glassfish/jaxb/jaxb-runtime/2.3.5/jaxb-runtime-2.3.5.jar
MD5: 2d3790292a30333a14b7fb1143864a9c
SHA1: a169a961a2bb9ac69517ec1005e451becf5cdfab
SHA256: 4a25453756d08be89c6537cc26fea237677ab99eea857ce1bcb84346715cfae4
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor Manifest implementation-build-id 2.3.5 - f01d8db Low Vendor Manifest git-revision f01d8db Low Vendor pom groupid org.glassfish.jaxb Highest Vendor pom parent-artifactid jaxb-runtime-parent Low Vendor jar package name sun Highest Vendor pom name JAXB Runtime High Vendor pom groupid glassfish.jaxb Highest Vendor Manifest bundle-symbolicname org.glassfish.jaxb.runtime Medium Vendor jar package name xml Highest Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor jar package name bind Highest Vendor pom url https://eclipse-ee4j.github.io/jaxb-ri/ Highest Vendor pom parent-groupid com.sun.xml.bind.mvn Medium Vendor jar (hint) package name oracle Highest Vendor jar package name com Highest Vendor Manifest Implementation-Vendor-Id org.glassfish.jaxb Medium Vendor Manifest multi-release true Low Vendor pom artifactid jaxb-runtime Low Vendor file name jaxb-runtime High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-docurl https://www.eclipse.org Low Product Manifest implementation-build-id 2.3.5 - f01d8db Low Product pom url https://eclipse-ee4j.github.io/jaxb-ri/ Medium Product Manifest git-revision f01d8db Low Product Manifest specification-title Jakarta XML Binding Medium Product pom artifactid jaxb-runtime Highest Product jar package name sun Highest Product pom name JAXB Runtime High Product pom groupid glassfish.jaxb Highest Product jar package name xml Highest Product Manifest bundle-symbolicname org.glassfish.jaxb.runtime Medium Product Manifest Bundle-Name JAXB Runtime Medium Product jar package name bind Highest Product Manifest Implementation-Title Jakarta XML Binding Implementation High Product pom parent-groupid com.sun.xml.bind.mvn Medium Product jar package name com Highest Product Manifest multi-release true Low Product file name jaxb-runtime High Product pom parent-artifactid jaxb-runtime-parent Medium Version file version 2.3.5 High Version pom version 2.3.5 Highest Version Manifest Implementation-Version 2.3.5 High Version Manifest implementation-build-id 2.3.5 Low Version Manifest Bundle-Version 2.3.5 High Version Manifest major-version 2.3.5 Medium Version Manifest build-id 2.3.5 Medium
jboss-logging-3.4.2.Final.jarDescription:
The JBoss Logging Framework License:
Apache License, version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/jboss/logging/jboss-logging/3.4.2.Final/jboss-logging-3.4.2.Final.jar
MD5: b050c93a9bfbcd28546cec7511a82e9a
SHA1: e517b8a93dd9962ed5481345e4d262fdd47c4217
SHA256: 804d824c9144561ef85a626e453b90a9ce81c103c3910851e057d79ed84c2e38
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor pom parent-artifactid jboss-parent Low Vendor pom parent-groupid org.jboss Medium Vendor pom groupid org.jboss.logging Highest Vendor Manifest automatic-module-name org.jboss.logging Medium Vendor Manifest Implementation-Vendor-Id org.jboss.logging Medium Vendor pom groupid jboss.logging Highest Vendor jar package name logging Highest Vendor Manifest os-name Linux Medium Vendor Manifest implementation-url http://www.jboss.org Low Vendor hint analyzer vendor redhat Highest Vendor Manifest specification-vendor JBoss by Red Hat Low Vendor pom artifactid jboss-logging Low Vendor file name jboss-logging High Vendor Manifest Implementation-Vendor JBoss by Red Hat High Vendor Manifest build-jdk-spec 1.8 Low Vendor Manifest os-arch amd64 Low Vendor pom url http://www.jboss.org Highest Vendor jar package name jboss Highest Vendor Manifest bundle-symbolicname org.jboss.logging.jboss-logging Medium Vendor Manifest bundle-docurl http://www.jboss.org Low Vendor Manifest java-vendor Red Hat, Inc. Medium Vendor pom name JBoss Logging 3 High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest Bundle-Name JBoss Logging 3 Medium Product pom parent-groupid org.jboss Medium Product pom url http://www.jboss.org Medium Product Manifest automatic-module-name org.jboss.logging Medium Product Manifest Implementation-Title JBoss Logging 3 High Product pom groupid jboss.logging Highest Product jar package name logging Highest Product Manifest os-name Linux Medium Product Manifest implementation-url http://www.jboss.org Low Product pom artifactid jboss-logging Highest Product file name jboss-logging High Product Manifest build-jdk-spec 1.8 Low Product Manifest os-arch amd64 Low Product jar package name jboss Highest Product pom parent-artifactid jboss-parent Medium Product Manifest bundle-symbolicname org.jboss.logging.jboss-logging Medium Product Manifest specification-title JBoss Logging 3 Medium Product Manifest bundle-docurl http://www.jboss.org Low Product pom name JBoss Logging 3 High Version Manifest Bundle-Version 3.4.2.Final High Version pom version 3.4.2.Final Highest Version Manifest Implementation-Version 3.4.2.Final High Version pom parent-version 3.4.2.Final Low
jboss-transaction-api_1.2_spec-1.1.1.Final.jarDescription:
The Java Transaction 1.2 API classes License:
Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/jboss/spec/javax/transaction/jboss-transaction-api_1.2_spec/1.1.1.Final/jboss-transaction-api_1.2_spec-1.1.1.Final.jar
MD5: 1e633c47138aba999d39692a31a1a124
SHA1: a8485cab9484dda36e9a8c319e76b5cc18797b58
SHA256: a310a50b9bdc44aaf36362dc9bb212235a147ffa8ef72dc9544a39c329eabbc3
Referenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile
Evidence Type Source Name Value Confidence Vendor pom parent-artifactid jboss-parent Low Vendor pom name Java Transaction API High Vendor Manifest os-arch x86 Low Vendor pom groupid org.jboss.spec.javax.transaction Highest Vendor pom parent-groupid org.jboss Medium Vendor jar package name javax Highest Vendor jar package name transaction Highest Vendor pom artifactid jboss-transaction-api_1.2_spec Low Vendor Manifest implementation-url http://www.jboss.org/jboss-transaction-api_1.2_spec Low Vendor hint analyzer vendor redhat Highest Vendor Manifest java-vendor Oracle Corporation Medium Vendor Manifest Implementation-Vendor JBoss by Red Hat High Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.7))" Low Vendor Manifest Implementation-Vendor-Id org.jboss.spec.javax.transaction Medium Vendor Manifest bundle-symbolicname org.jboss.spec.javax.transaction.jboss-transaction-api_1.2_spec Medium Vendor pom groupid jboss.spec.javax.transaction Highest Vendor Manifest bundle-docurl http://www.jboss.org Low Vendor file name jboss-transaction-api_1.2_spec-1.1.1.Final High Vendor Manifest automatic-module-name java.transaction Medium Vendor Manifest os-name Windows 10 Medium Product pom name Java Transaction API High Product Manifest os-arch x86 Low Product pom parent-groupid org.jboss Medium Product jar package name javax Highest Product jar package name transaction Highest Product pom artifactid jboss-transaction-api_1.2_spec Highest Product Manifest Implementation-Title Java Transaction API High Product Manifest implementation-url http://www.jboss.org/jboss-transaction-api_1.2_spec Low Product Manifest Bundle-Name Java Transaction API Medium Product Manifest specification-title JSR 907: Java Transaction API (JTA) Medium Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.7))" Low Product pom parent-artifactid jboss-parent Medium Product Manifest bundle-symbolicname org.jboss.spec.javax.transaction.jboss-transaction-api_1.2_spec Medium Product pom groupid jboss.spec.javax.transaction Highest Product Manifest bundle-docurl http://www.jboss.org Low Product file name jboss-transaction-api_1.2_spec-1.1.1.Final High Product Manifest automatic-module-name java.transaction Medium Product Manifest os-name Windows 10 Medium Version pom parent-version 1.1.1.Final Low Version Manifest Implementation-Version 1.1.1.Final High Version Manifest Bundle-Version 1.1.1.Final High Version pom version 1.1.1.Final Highest
jcl-over-slf4j-1.7.30.jarDescription:
JCL 1.2 implemented over SLF4J License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/slf4j/jcl-over-slf4j/1.7.30/jcl-over-slf4j-1.7.30.jar
MD5: 69ad224b2feb6f86554fe8997b9c3d4b
SHA1: cd92524ea19d27e5b94ecd251e1af729cffdfe15
SHA256: 71e9ee37b9e4eb7802a2acc5f41728a4cf3915e7483d798db3b4ff2ec8847c50
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom name JCL 1.2 implemented over SLF4J High Vendor jar package name apache Highest Vendor pom parent-groupid org.slf4j Medium Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Vendor Manifest automatic-module-name org.apache.commons.logging Medium Vendor file name jcl-over-slf4j High Vendor jar package name commons Highest Vendor jar package name logging Highest Vendor Manifest bundle-symbolicname jcl.over.slf4j Medium Vendor pom parent-artifactid slf4j-parent Low Vendor pom url http://www.slf4j.org Highest Vendor pom groupid org.slf4j Highest Vendor pom artifactid jcl-over-slf4j Low Vendor pom groupid slf4j Highest Product pom url http://www.slf4j.org Medium Product Manifest Implementation-Title jcl-over-slf4j High Product pom name JCL 1.2 implemented over SLF4J High Product jar package name apache Highest Product pom parent-groupid org.slf4j Medium Product Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Product Manifest automatic-module-name org.apache.commons.logging Medium Product file name jcl-over-slf4j High Product jar package name commons Highest Product Manifest Bundle-Name jcl-over-slf4j Medium Product jar package name logging Highest Product Manifest bundle-symbolicname jcl.over.slf4j Medium Product pom artifactid jcl-over-slf4j Highest Product pom parent-artifactid slf4j-parent Medium Product pom groupid slf4j Highest Version Manifest Bundle-Version 1.7.30 High Version Manifest Implementation-Version 1.7.30 High Version pom version 1.7.30 Highest Version file version 1.7.30 High
Published Vulnerabilities CVE-2021-37533 suppress
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711. CWE-20 Improper Input Validation
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions:
jcommander-1.48.jarDescription:
A Java framework to parse command line options with annotations. License:
The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/beust/jcommander/1.48/jcommander-1.48.jar
MD5: 7a84fb4b01f46c904bd549e67e6c48a1
SHA1: bfcb96281ea3b59d626704f74bc6d625ff51cbce
SHA256: a7313fcfde070930e40ec79edf3c5948cf34e4f0d25cb3a09f9963d8bdd84113
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom groupid beust Highest Vendor Manifest bundle-symbolicname com.beust.jcommander Medium Vendor jar package name jcommander Highest Vendor pom artifactid jcommander Low Vendor pom name JCommander High Vendor file name jcommander High Vendor pom url http://beust.com/jcommander Highest Vendor jar package name beust Highest Vendor pom groupid com.beust Highest Product pom artifactid jcommander Highest Product pom groupid beust Highest Product Manifest bundle-symbolicname com.beust.jcommander Medium Product jar package name jcommander Highest Product pom name JCommander High Product pom url http://beust.com/jcommander Medium Product file name jcommander High Product jar package name beust Highest Product Manifest Bundle-Name JCommander Medium Version pom version 1.48 Highest Version file version 1.48 High
joda-time-1.6.2.jarDescription:
Date and time library to replace JDK date handling License:
Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/joda-time/joda-time/1.6.2/joda-time-1.6.2.jar
MD5: 6442e992dedaddadd8b9e3c87a38bfb8
SHA1: 7a0525fe460ef5b99ea3152e6d2c0e4f24f04c51
SHA256: 442ffc099aaa8e1907dcf8806104c1640acba906f68988f9c5a2e1442e0fb8e5
Referenced In Project/Scope: TheseFoolishThings :: Actors:compile
Evidence Type Source Name Value Confidence Vendor Manifest specification-vendor Joda.org Low Vendor Manifest Implementation-Vendor Joda.org High Vendor pom organization url http://www.joda.org Medium Vendor pom organization name Joda.org High Vendor pom groupid joda-time Highest Vendor Manifest bundle-symbolicname joda-time Medium Vendor pom name Joda time High Vendor Manifest bundle-docurl http://joda-time.sourceforge.net/ Low Vendor Manifest Implementation-Vendor-Id org.joda Medium Vendor Manifest extension-name joda-time Medium Vendor jar package name joda Highest Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.3 Low Vendor file name joda-time High Vendor jar package name time Highest Vendor pom artifactid joda-time Low Vendor pom url http://joda-time.sourceforge.net Highest Product Manifest Implementation-Title org.joda.time High Product pom url http://joda-time.sourceforge.net Medium Product pom artifactid joda-time Highest Product Manifest bundle-symbolicname joda-time Medium Product pom groupid joda-time Highest Product pom organization url http://www.joda.org Low Product pom name Joda time High Product Manifest specification-title Joda-Time Medium Product Manifest bundle-docurl http://joda-time.sourceforge.net/ Low Product pom organization name Joda.org Low Product Manifest Bundle-Name Joda-Time Medium Product Manifest extension-name joda-time Medium Product jar package name joda Highest Product Manifest bundle-requiredexecutionenvironment J2SE-1.3 Low Product file name joda-time High Product jar package name time Highest Version Manifest Bundle-Version 1.6.2 High Version pom version 1.6.2 Highest Version Manifest Implementation-Version 1.6.2 High Version file version 1.6.2 High
jsr305-3.0.2.jarDescription:
JSR305 Annotations for Findbugs License:
The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.jar
MD5: dd83accb899363c32b07d7a1b2e4ce40
SHA1: 25ea2e8b0c338a877313bd4672d3fe056ea78f0d
SHA256: 766ad2a0783f2687962c8ad74ceecc38a28b9f72a2d085ee438b7813e928d0c7
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings (modules):compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: MessageBus:compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Utilities:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor pom url http://findbugs.sourceforge.net/ Highest Vendor file name jsr305 High Vendor Manifest bundle-symbolicname org.jsr-305 Medium Vendor pom groupid google.code.findbugs Highest Vendor pom groupid com.google.code.findbugs Highest Vendor pom artifactid jsr305 Low Vendor pom name FindBugs-jsr305 High Product pom url http://findbugs.sourceforge.net/ Medium Product file name jsr305 High Product pom artifactid jsr305 Highest Product Manifest bundle-symbolicname org.jsr-305 Medium Product Manifest Bundle-Name FindBugs-jsr305 Medium Product pom groupid google.code.findbugs Highest Product pom name FindBugs-jsr305 High Version file version 3.0.2 High Version Manifest Bundle-Version 3.0.2 High Version pom version 3.0.2 Highest
jul-to-slf4j-1.7.30.jarDescription:
JUL to SLF4J bridge File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/slf4j/jul-to-slf4j/1.7.30/jul-to-slf4j-1.7.30.jarMD5: f2c78cb93d70dc5dea0c50f36ace09c1SHA1: d58bebff8cbf70ff52b59208586095f467656c30SHA256: bbcbfdaa72572255c4f85207a9bfdb24358dc993e41252331bd4d0913e4988b9Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom artifactid jul-to-slf4j Low Vendor pom parent-groupid org.slf4j Medium Vendor file name jul-to-slf4j High Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Vendor jar package name slf4j Highest Vendor pom parent-artifactid slf4j-parent Low Vendor pom url http://www.slf4j.org Highest Vendor pom groupid org.slf4j Highest Vendor pom name JUL to SLF4J bridge High Vendor Manifest bundle-symbolicname jul.to.slf4j Medium Vendor pom groupid slf4j Highest Vendor jar package name bridge Highest Product pom artifactid jul-to-slf4j Highest Product pom url http://www.slf4j.org Medium Product pom parent-groupid org.slf4j Medium Product file name jul-to-slf4j High Product Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Product jar package name slf4j Highest Product Manifest Bundle-Name jul-to-slf4j Medium Product pom name JUL to SLF4J bridge High Product Manifest bundle-symbolicname jul.to.slf4j Medium Product pom parent-artifactid slf4j-parent Medium Product jar package name bridge Highest Product pom groupid slf4j Highest Version Manifest Bundle-Version 1.7.30 High Version Manifest Implementation-Version 1.7.30 High Version pom version 1.7.30 Highest Version file version 1.7.30 High
junit-4.12.jarDescription:
JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck. License:
Eclipse Public License 1.0: http://www.eclipse.org/legal/epl-v10.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/junit/junit/4.12/junit-4.12.jar
MD5: 5b38c40c97fbd0adee29f91e60405584
SHA1: 2973d150c0dc1fefe998f834810d68f278ea58ec
SHA256: 59721f0805e223d84b90677887d9ff567dc534d7c502ca903c0c2b17f05c116a
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom groupid junit Highest Vendor file name junit High Vendor Manifest Implementation-Vendor JUnit High Vendor pom name JUnit High Vendor jar package name junit Highest Vendor pom url http://junit.org Highest Vendor Manifest Implementation-Vendor-Id junit Medium Vendor jar package name framework Highest Vendor pom organization name JUnit High Vendor pom organization url http://www.junit.org Medium Vendor pom artifactid junit Low Product pom groupid junit Highest Product file name junit High Product pom name JUnit High Product jar package name junit Highest Product Manifest Implementation-Title JUnit High Product pom url http://junit.org Medium Product jar package name framework Highest Product pom organization name JUnit Low Product pom organization url http://www.junit.org Low Product pom artifactid junit Highest Version file version 4.12 High Version pom version 4.12 Highest Version Manifest Implementation-Version 4.12 High
Published Vulnerabilities CVE-2020-15250 (OSSINDEX) suppress
In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory. CWE-732 Incorrect Permission Assignment for Critical Resource
CVSSv2:
Base Score: MEDIUM (5.5) Vector: /AV:L/AC:L/Au:/C:H/I:N/A:N References:
Vulnerable Software & Versions (OSSINDEX):
cpe:2.3:a:junit:junit:4.12:*:*:*:*:*:*:* log4j-api-2.17.0.jarDescription:
The Apache Log4j API License:
https://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/apache/logging/log4j/log4j-api/2.17.0/log4j-api-2.17.0.jar
MD5: 935fcbd8c8273c0a4f1652de53493050
SHA1: bbd791e9c8c9421e45337c4fe0a10851c086e36c
SHA256: ab9cadc80e234580e3f3c8c18644314fccd4b3cd3f7085d4e934866cb561b95d
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest Implementation-Vendor-Id org.apache.logging.log4j Medium Vendor jar package name apache Highest Vendor pom groupid apache.logging.log4j Highest Vendor Manifest bundle-docurl https://www.apache.org/ Low Vendor file name log4j-api High Vendor Manifest implementation-url https://logging.apache.org/log4j/2.x/log4j-api/ Low Vendor pom artifactid log4j-api Low Vendor Manifest specification-vendor The Apache Software Foundation Low Vendor pom groupid org.apache.logging.log4j Highest Vendor jar package name logging Highest Vendor pom name Apache Log4j API High Vendor Manifest Implementation-Vendor The Apache Software Foundation High Vendor Manifest log4jreleasekey B3D8E1BA Low Vendor Manifest bundle-symbolicname org.apache.logging.log4j.api Medium Vendor jar package name org Highest Vendor Manifest log4jreleasemanager Ralph Goers Low Vendor Manifest multi-release true Low Vendor pom parent-artifactid log4j Low Vendor jar package name log4j Highest Vendor pom parent-groupid org.apache.logging.log4j Medium Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest specification-title Apache Log4j API Medium Product jar package name apache Highest Product pom groupid apache.logging.log4j Highest Product Manifest bundle-docurl https://www.apache.org/ Low Product file name log4j-api High Product Manifest Bundle-Name Apache Log4j API Medium Product Manifest implementation-url https://logging.apache.org/log4j/2.x/log4j-api/ Low Product Manifest Implementation-Title Apache Log4j API High Product jar package name logging Highest Product pom name Apache Log4j API High Product Manifest log4jreleasekey B3D8E1BA Low Product pom artifactid log4j-api Highest Product pom parent-artifactid log4j Medium Product Manifest bundle-symbolicname org.apache.logging.log4j.api Medium Product jar package name org Highest Product Manifest log4jreleasemanager Ralph Goers Low Product Manifest multi-release true Low Product jar package name log4j Highest Product pom parent-groupid org.apache.logging.log4j Medium Version pom version 2.17.0 Highest Version file version 2.17.0 High Version Manifest Implementation-Version 2.17.0 High Version Manifest Bundle-Version 2.17.0 High Version Manifest log4jreleaseversion 2.17.0 Medium
Related Dependencies log4j-to-slf4j-2.17.0.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/apache/logging/log4j/log4j-to-slf4j/2.17.0/log4j-to-slf4j-2.17.0.jar MD5: a0ff4b3bd7936ca313dc29033e85bbd6 SHA1: e50b82411b9ce9c204c938509f914b2bb887168b SHA256: df8a9a9d06368a87abd04051597310cc7a501762ab0cd7492ba106df92862c78 pkg:maven/org.apache.logging.log4j/log4j-to-slf4j@2.17.0 Published Vulnerabilities CVE-2021-44832 suppress
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. CWE-20 Improper Input Validation
CVSSv2:
Base Score: HIGH (8.5) Vector: /AV:N/AC:M/Au:S/C:C/I:C/A:C CVSSv3:
Base Score: MEDIUM (6.6) Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
logback-core-1.2.3.jarDescription:
logback-core module License:
http://www.eclipse.org/legal/epl-v10.html, http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/ch/qos/logback/logback-core/1.2.3/logback-core-1.2.3.jar
MD5: 841fc80c6edff60d947a3872a2db4d45
SHA1: 864344400c3d4d92dfeb0a305dc87d953677c03c
SHA256: 5946d837fe6f960c02a53eda7a6926ecc3c758bbdd69aa453ee429f858217f22
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:runtime TheseFoolishThings :: Examples :: DCI :: Swing:runtime TheseFoolishThings :: Examples :: Data:runtime TheseFoolishThings :: Examples :: DCI :: Marshal XStream:runtime TheseFoolishThings :: Examples :: DCI :: Displayable:runtime TheseFoolishThings :: Examples :: Finder :: In-memory Finder:runtime TheseFoolishThings :: Examples :: DCI :: Persistence JPA:runtime TheseFoolishThings :: Examples (master):runtime TheseFoolishThings :: Examples :: Finder :: Extended Finder:runtime Evidence Type Source Name Value Confidence Vendor file name logback-core High Vendor pom artifactid logback-core Low Vendor pom parent-artifactid logback-parent Low Vendor jar package name logback Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.6))" Low Vendor pom name Logback Core Module High Vendor Manifest bundle-symbolicname ch.qos.logback.core Medium Vendor jar package name qos Highest Vendor Manifest bundle-requiredexecutionenvironment JavaSE-1.6 Low Vendor Manifest bundle-docurl http://www.qos.ch Low Vendor jar package name ch Highest Vendor Manifest originally-created-by Apache Maven Bundle Plugin Low Vendor pom groupid ch.qos.logback Highest Vendor jar package name core Highest Product file name logback-core High Product jar package name logback Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.6))" Low Product pom name Logback Core Module High Product Manifest bundle-symbolicname ch.qos.logback.core Medium Product jar package name qos Highest Product pom parent-artifactid logback-parent Medium Product Manifest Bundle-Name Logback Core Module Medium Product Manifest bundle-requiredexecutionenvironment JavaSE-1.6 Low Product Manifest bundle-docurl http://www.qos.ch Low Product pom artifactid logback-core Highest Product jar package name ch Highest Product Manifest originally-created-by Apache Maven Bundle Plugin Low Product pom groupid ch.qos.logback Highest Product jar package name core Highest Version pom version 1.2.3 Highest Version Manifest Bundle-Version 1.2.3 High Version file version 1.2.3 High
Related Dependencies logback-classic-1.2.3.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/ch/qos/logback/logback-classic/1.2.3/logback-classic-1.2.3.jar MD5: 64f7a68f931aed8e5ad8243470440f0b SHA1: 7c4f3c474fb2c041d8028740440937705ebb473a SHA256: fb53f8539e7fcb8f093a56e138112056ec1dc809ebb020b59d8a36a5ebac37e0 pkg:maven/ch.qos.logback/logback-classic@1.2.3 Published Vulnerabilities CVE-2021-42550 suppress
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (8.5) Vector: /AV:N/AC:M/Au:S/C:C/I:C/A:C CVSSv3:
Base Score: MEDIUM (6.6) Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
lombok-1.18.22.jarDescription:
Spice up your java: Automatic Resource Management, automatic generation of getters, setters, equals, hashCode and toString, and more! License:
The MIT License: https://projectlombok.org/LICENSE File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/projectlombok/lombok/1.18.22/lombok-1.18.22.jar
MD5: 30905901647fe0ebb06fb20ee8a638bf
SHA1: 9c08ea24c6eb714e2d6170e8122c069a0ba9aacf
SHA256: ecef1581411d7a82cc04281667ee0bac5d7c0a5aae74cfc38430396c91c31831
Referenced In Projects/Scopes: TheseFoolishThings :: Roles:provided TheseFoolishThings :: MessageBus:provided TheseFoolishThings :: Examples :: DCI :: Swing:provided TheseFoolishThings :: Test Utilities:provided TheseFoolishThings :: Examples :: DCI :: Marshal XStream:provided TheseFoolishThings :: MessageBus :: Spring:provided TheseFoolishThings :: Examples :: Finder :: Extended Finder:provided TheseFoolishThings :: Roles :: Spring:provided TheseFoolishThings :: Examples (master):provided TheseFoolishThings :: Examples :: Data:provided TheseFoolishThings :: Examples :: Finder :: JPA Finder:provided TheseFoolishThings :: Examples :: DCI :: Persistence JPA:provided TheseFoolishThings (modules):provided TheseFoolishThings :: Examples :: Finder :: In-memory Finder:provided TheseFoolishThings :: Utilities:provided TheseFoolishThings :: Examples :: DCI :: Displayable:provided TheseFoolishThings :: Actors:provided Evidence Type Source Name Value Confidence Vendor pom groupid org.projectlombok Highest Vendor jar package name java Highest Vendor Manifest can-redefine-classes true Low Vendor jar package name tostring Highest Vendor pom groupid projectlombok Highest Vendor pom artifactid lombok Low Vendor jar package name lombok Highest Vendor file name lombok High Vendor Manifest automatic-module-name lombok Medium Vendor pom url https://projectlombok.org Highest Vendor pom name Project Lombok High Product jar package name java Highest Product Manifest can-redefine-classes true Low Product jar package name tostring Highest Product pom groupid projectlombok Highest Product jar package name lombok Highest Product pom url https://projectlombok.org Medium Product pom artifactid lombok Highest Product file name lombok High Product Manifest automatic-module-name lombok Medium Product pom name Project Lombok High Version pom version 1.18.22 Highest Version file version 1.18.22 High Version Manifest lombok-version 1.18.22 Medium
mockito-core-3.8.0.jarDescription:
Mockito mock objects library core API and implementation License:
The MIT License: https://github.com/mockito/mockito/blob/release/3.x/LICENSE File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/mockito/mockito-core/3.8.0/mockito-core-3.8.0.jar
MD5: 181eb3008ed533261c9afb1efd1ea332
SHA1: a3f5ed0745e4d76aa880136ab514412cd50b6246
SHA256: e8a6113e5ba2fcadc22ad5da712ce60ce85db48efb8bfc1cbac4802eb36b559f
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor file name mockito-core High Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest bundle-symbolicname org.mockito.mockito-core Medium Vendor pom url mockito/mockito Highest Vendor pom groupid mockito Highest Vendor pom artifactid mockito-core Low Vendor jar package name and Highest Vendor jar package name mockito Highest Vendor pom name mockito-core High Vendor jar package name api Highest Vendor pom groupid org.mockito Highest Vendor Manifest automatic-module-name org.mockito Medium Product file name mockito-core High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-symbolicname org.mockito.mockito-core Medium Product pom groupid mockito Highest Product jar package name and Highest Product jar package name mockito Highest Product pom name mockito-core High Product jar package name api Highest Product pom url mockito/mockito High Product pom artifactid mockito-core Highest Product Manifest automatic-module-name org.mockito Medium Product Manifest Bundle-Name Mockito Mock Library for Java. Core bundle requires Byte Buddy and Objenesis. Medium Version pom version 3.8.0 Highest Version Manifest Bundle-Version 3.8.0 High Version file version 3.8.0 High
mxparser-1.2.2.jarDescription:
MXParser is a fork of xpp3_min 1.1.7 containing only the parser with merged changes of the Plexus fork.
License:
Indiana University Extreme! Lab Software License: https://raw.githubusercontent.com/x-stream/mxparser/master/LICENSE.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar
MD5: 9d7e42409dfdcee9bd17903015bdeae2
SHA1: 476fb3b3bb3716cad797cd054ce45f89445794e9
SHA256: aeeee23a3303d811bca8790ea7f25b534314861c03cff36dafdcc2180969eb97
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor Manifest automatic-module-name io.github.xstream.mxparser Medium Vendor Manifest x-build-os Linux Low Vendor jar package name xstream Highest Vendor pom url http://x-stream.github.io/mxparser Highest Vendor file name mxparser High Vendor Manifest java_1_5_home /opt/sun-jdk-1.5.0.22 Low Vendor pom artifactid mxparser Low Vendor Manifest java_1_4_home /opt/blackdown-jdk-1.4.2.03 Low Vendor jar package name io Highest Vendor Manifest java_1_8_home /opt/oracle-jdk-bin-1.8.0.202 Low Vendor pom groupid io.github.x-stream Highest Vendor Manifest bundle-symbolicname mxparser Medium Vendor Manifest build-jdk-spec 1.8 Low Vendor Manifest java_1_6_home /opt/sun-jdk-1.6.0.45 Low Vendor Manifest x-compile-source 1.4 Low Vendor pom name MXParser High Vendor Manifest x-compile-target 1.4 Low Vendor Manifest java_1_7_home /opt/oracle-jdk-bin-1.7.0.80 Low Vendor jar package name mxparser Highest Vendor Manifest x-build-time 2021-08-18T22:35:34Z Low Vendor jar package name github Highest Vendor Manifest x-builder Maven 3.8.1 Low Vendor Manifest java_9_home /opt/oracle-jdk-bin-9.0.4 Low Product Manifest automatic-module-name io.github.xstream.mxparser Medium Product Manifest specification-title MXParser Medium Product jar package name xstream Highest Product file name mxparser High Product Manifest java_1_4_home /opt/blackdown-jdk-1.4.2.03 Low Product Manifest java_1_8_home /opt/oracle-jdk-bin-1.8.0.202 Low Product Manifest bundle-symbolicname mxparser Medium Product Manifest x-compile-source 1.4 Low Product Manifest java_1_7_home /opt/oracle-jdk-bin-1.7.0.80 Low Product jar package name github Highest Product Manifest java_9_home /opt/oracle-jdk-bin-9.0.4 Low Product Manifest Bundle-Name MXParser Medium Product Manifest x-build-os Linux Low Product Manifest Implementation-Title MXParser High Product Manifest java_1_5_home /opt/sun-jdk-1.5.0.22 Low Product jar package name io Highest Product pom artifactid mxparser Highest Product Manifest build-jdk-spec 1.8 Low Product pom groupid io.github.x-stream Highest Product Manifest java_1_6_home /opt/sun-jdk-1.6.0.45 Low Product pom name MXParser High Product Manifest x-compile-target 1.4 Low Product pom url http://x-stream.github.io/mxparser Medium Product jar package name mxparser Highest Product Manifest x-build-time 2021-08-18T22:35:34Z Low Product Manifest x-builder Maven 3.8.1 Low Version pom version 1.2.2 Highest Version Manifest Bundle-Version 1.2.2 High Version Manifest Implementation-Version 1.2.2 High Version file version 1.2.2 High
Published Vulnerabilities CVE-2013-7285 suppress
Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2016-3674 suppress
Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document. CWE-200 Information Exposure
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions:
CVE-2017-7957 suppress
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call. CWE-20 Improper Input Validation
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2020-26217 suppress
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14. CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVSSv2:
Base Score: HIGH (9.3) Vector: /AV:N/AC:M/Au:N/C:C/I:C/A:C CVSSv3:
Base Score: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2020-26258 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories. CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.7) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N References:
Vulnerable Software & Versions:
CVE-2020-26259 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories. CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVSSv2:
Base Score: MEDIUM (6.4) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:P CVSSv3:
Base Score: MEDIUM (6.8) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N References:
Vulnerable Software & Versions:
CVE-2021-21341 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion'), CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.1) Vector: /AV:N/AC:M/Au:N/C:N/I:N/A:C CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21342 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-502 Deserialization of Untrusted Data, CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (5.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:N CVSSv3:
Base Score: CRITICAL (9.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2021-21343 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-502 Deserialization of Untrusted Data, CWE-73 External Control of File Name or Path
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2021-21344 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21345 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVSSv2:
Base Score: MEDIUM (6.5) Vector: /AV:N/AC:L/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.9) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21346 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21347 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21348 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
CVSSv2:
Base Score: HIGH (7.8) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:C CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21349 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-502 Deserialization of Untrusted Data, CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (8.6) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2021-21350 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21351 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.5) Vector: /AV:N/AC:L/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.1) Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-29505 suppress
XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17. CWE-502 Deserialization of Untrusted Data, CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: MEDIUM (6.5) Vector: /AV:N/AC:L/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39139 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.5) Vector: /AV:N/AC:L/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39140 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-502 Deserialization of Untrusted Data, CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')
CVSSv2:
Base Score: MEDIUM (6.3) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:C CVSSv3:
Base Score: MEDIUM (6.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39141 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39144 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-502 Deserialization of Untrusted Data, CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39145 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39146 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39147 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39148 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39149 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39150 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. CWE-502 Deserialization of Untrusted Data, CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39151 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39152 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. CWE-502 Deserialization of Untrusted Data, CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39153 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39154 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-43859 suppress
XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-40151 suppress
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-40152 suppress
Those using Woodstox to parse XML data may be vulnerable to Denial of Service attacks (DOS) if DTD support is enabled. If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-40153 suppress
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-41966 suppress
XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable. CWE-502 Deserialization of Untrusted Data, CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), CWE-121 Stack-based Buffer Overflow
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
objenesis-3.1.jarDescription:
A library for instantiating Java objects License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/objenesis/objenesis/3.1/objenesis-3.1.jar
MD5: 712a73c2f496ab26736fd3f8029bac20
SHA1: 48f12deaae83a8dfc3775d830c9fd60ea59bbbca
SHA256: cdb3d038c188de6f46ffd5cd930be2d5e5dba59c53b26437995d534e3db2fb80
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest bundle-symbolicname org.objenesis Medium Vendor pom parent-groupid org.objenesis Medium Vendor pom url http://objenesis.org Highest Vendor pom groupid org.objenesis Highest Vendor Manifest specification-vendor Joe Walnes, Henri Tremblay, Leonardo Mesquita Low Vendor Manifest Implementation-Vendor-Id org.objenesis Medium Vendor Manifest automatic-module-name org.objenesis Medium Vendor Manifest implementation-url http://objenesis.org Low Vendor pom groupid objenesis Highest Vendor pom parent-artifactid objenesis-parent Low Vendor pom artifactid objenesis Low Vendor file name objenesis High Vendor Manifest build-jdk-spec 1.8 Low Vendor pom name Objenesis High Vendor Manifest Implementation-Vendor Joe Walnes, Henri Tremblay, Leonardo Mesquita High Vendor jar package name objenesis Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest Bundle-Name Objenesis Medium Product Manifest bundle-symbolicname org.objenesis Medium Product pom parent-groupid org.objenesis Medium Product Manifest automatic-module-name org.objenesis Medium Product Manifest implementation-url http://objenesis.org Low Product pom groupid objenesis Highest Product pom parent-artifactid objenesis-parent Medium Product Manifest Implementation-Title Objenesis High Product file name objenesis High Product Manifest build-jdk-spec 1.8 Low Product pom url http://objenesis.org Medium Product pom artifactid objenesis Highest Product pom name Objenesis High Product jar package name objenesis Highest Product Manifest specification-title Objenesis Medium Version pom version 3.1 Highest Version Manifest Implementation-Version 3.1 High Version file version 3.1 High
slf4j-api-1.7.30.jarDescription:
The slf4j API File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/slf4j/slf4j-api/1.7.30/slf4j-api-1.7.30.jarMD5: f8be00da99bc4ab64c79ab1e2be7cb7cSHA1: b5a4b6d16ab13e34a88fae84c35cd5d68cac922cSHA256: cdba07964d1bb40a0761485c6b1e8c2f8fd9eb1d19c53928ac0d7f9510105c57Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: MessageBus:compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Utilities:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor Manifest bundle-symbolicname slf4j.api Medium Vendor pom parent-groupid org.slf4j Medium Vendor file name slf4j-api High Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Vendor jar package name slf4j Highest Vendor pom name SLF4J API Module High Vendor pom parent-artifactid slf4j-parent Low Vendor pom url http://www.slf4j.org Highest Vendor pom groupid org.slf4j Highest Vendor pom artifactid slf4j-api Low Vendor Manifest automatic-module-name org.slf4j Medium Vendor pom groupid slf4j Highest Product pom url http://www.slf4j.org Medium Product Manifest bundle-symbolicname slf4j.api Medium Product pom parent-groupid org.slf4j Medium Product file name slf4j-api High Product Manifest Implementation-Title slf4j-api High Product Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Product jar package name slf4j Highest Product Manifest Bundle-Name slf4j-api Medium Product pom name SLF4J API Module High Product pom parent-artifactid slf4j-parent Medium Product pom artifactid slf4j-api Highest Product Manifest automatic-module-name org.slf4j Medium Product pom groupid slf4j Highest Version Manifest Bundle-Version 1.7.30 High Version Manifest Implementation-Version 1.7.30 High Version pom version 1.7.30 Highest Version file version 1.7.30 High
snakeyaml-1.29.jarDescription:
YAML 1.1 parser and emitter for Java License:
Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/yaml/snakeyaml/1.29/snakeyaml-1.29.jar
MD5: 5bdf841bc5abda0507fa5ce91c44cc86
SHA1: 6d0cdafb2010f1297e574656551d7145240f6e25
SHA256: 89c5f029811b08c878f0b81dbb05e9626624c1fda4087a26871101e499a217ab
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom groupid org.yaml Highest Vendor Manifest bundle-symbolicname org.yaml.snakeyaml Medium Vendor pom name SnakeYAML High Vendor Manifest automatic-module-name org.yaml.snakeyaml Medium Vendor pom groupid yaml Highest Vendor jar package name parser Highest Vendor pom url http://www.snakeyaml.org Highest Vendor pom artifactid snakeyaml Low Vendor file name snakeyaml High Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.7))" Low Vendor jar package name snakeyaml Highest Vendor jar package name emitter Highest Vendor jar package name yaml Highest Product Manifest bundle-symbolicname org.yaml.snakeyaml Medium Product pom name SnakeYAML High Product Manifest automatic-module-name org.yaml.snakeyaml Medium Product pom groupid yaml Highest Product jar package name parser Highest Product Manifest Bundle-Name SnakeYAML Medium Product pom url http://www.snakeyaml.org Medium Product pom artifactid snakeyaml Highest Product file name snakeyaml High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.7))" Low Product jar package name snakeyaml Highest Product jar package name emitter Highest Product jar package name yaml Highest Version file version 1.29 High Version pom version 1.29 Highest
Published Vulnerabilities CVE-2021-4235 suppress
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector. NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-1471 (OSSINDEX) suppress
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (9.8) Vector: /AV:N/AC:L/Au:/C:H/I:H/A:H References:
Vulnerable Software & Versions (OSSINDEX):
cpe:2.3:a:org.yaml:snakeyaml:1.29:*:*:*:*:*:*:* CVE-2022-25857 suppress
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-3064 suppress
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-38749 suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-38750 suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-38751 suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-38752 suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-41854 suppress
Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
spotbugs-annotations-3.1.9.jarDescription:
Annotations the SpotBugs tool supports License:
GNU LESSER GENERAL PUBLIC LICENSE, Version 2.1: https://www.gnu.org/licenses/old-licenses/lgpl-2.1.en.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/github/spotbugs/spotbugs-annotations/3.1.9/spotbugs-annotations-3.1.9.jar
MD5: 56a1a81d69b6a111161bbce0e6dea26a
SHA1: 2ef5127efcc1a899aab8c66d449a631c9a99c469
SHA256: 68c7c46b4299e94837e236ae742f399901a950fe910fe3ca710026753b5dd2e1
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings (modules):compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: MessageBus:compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Utilities:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor file name spotbugs-annotations High Vendor pom groupid com.github.spotbugs Highest Vendor pom artifactid spotbugs-annotations Low Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Vendor pom url https://spotbugs.github.io/ Highest Vendor Manifest automatic-module-name com.github.spotbugs.annotations Medium Vendor Manifest bundle-symbolicname spotbugs-annotations Medium Vendor pom groupid github.spotbugs Highest Vendor pom name SpotBugs Annotations High Product file name spotbugs-annotations High Product Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Product Manifest Bundle-Name spotbugs-annotations Medium Product pom url https://spotbugs.github.io/ Medium Product Manifest automatic-module-name com.github.spotbugs.annotations Medium Product pom artifactid spotbugs-annotations Highest Product Manifest bundle-symbolicname spotbugs-annotations Medium Product pom groupid github.spotbugs Highest Product pom name SpotBugs Annotations High Version file version 3.1.9 High Version Manifest Bundle-Version 3.1.9 High Version pom version 3.1.9 Highest
spring-boot-2.6.2.jarDescription:
Spring Boot License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot/2.6.2/spring-boot-2.6.2.jar
MD5: fb8e372b32de62fcb54e31bad9272b43
SHA1: bbf59f411320da665411692359ff511315d0ff91
SHA256: 7e3071eb3f944ae041beff9dcfec3b8b4792c39a4c54868fb874d2e91cfd21f9
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom groupid springframework.boot Highest Vendor pom organization name Pivotal Software, Inc. High Vendor pom groupid org.springframework.boot Highest Vendor pom name spring-boot High Vendor hint analyzer vendor pivotal software Highest Vendor pom artifactid spring-boot Low Vendor Manifest build-jdk-spec 1.8 Low Vendor hint analyzer vendor vmware Highest Vendor jar package name boot Highest Vendor jar package name springframework Highest Vendor pom organization url https://spring.io Medium Vendor Manifest automatic-module-name spring.boot Medium Vendor hint analyzer vendor SpringSource Highest Vendor file name spring-boot High Vendor pom url https://spring.io/projects/spring-boot Highest Product pom groupid springframework.boot Highest Product pom name spring-boot High Product pom organization name Pivotal Software, Inc. Low Product Manifest build-jdk-spec 1.8 Low Product Manifest Implementation-Title Spring Boot High Product jar package name boot Highest Product jar package name springframework Highest Product pom artifactid spring-boot Highest Product Manifest automatic-module-name spring.boot Medium Product pom organization url https://spring.io Low Product pom url https://spring.io/projects/spring-boot Medium Product file name spring-boot High Version file version 2.6.2 High Version pom version 2.6.2 Highest Version Manifest Implementation-Version 2.6.2 High
Related Dependencies spring-boot-starter-aop-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter-aop/2.6.2/spring-boot-starter-aop-2.6.2.jar MD5: b69e33c490d506dc959d1ab801c3b85f SHA1: af16c0de56462ef8a6a9ac63cff30bf5120fc5b3 SHA256: c5bf05e42fc25a8c0fa4c77a7a48fa6d86495d20191019f6552458cde052ab46 pkg:maven/org.springframework.boot/spring-boot-starter-aop@2.6.2 spring-boot-starter-data-jpa-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter-data-jpa/2.6.2/spring-boot-starter-data-jpa-2.6.2.jar MD5: fd565de75209a0b0dee01536a556ae6e SHA1: 3eb637ccd03194f1d639b9efed1ff7d73c8592e3 SHA256: 40825d0ca4b51968542a77cf8e78774fb27de4502895852c185700e873bf94f6 pkg:maven/org.springframework.boot/spring-boot-starter-data-jpa@2.6.2 spring-boot-starter-logging-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter-logging/2.6.2/spring-boot-starter-logging-2.6.2.jar MD5: ab53f3d4beb515ac9a39d3b0e3fdc047 SHA1: 58d4896c606b6ff07b9bd8e46c87eac5a51255de SHA256: d749ad8e12022609ba4510bcbf4b716f86d8be16d0d3eddd46bf3498ee192094 pkg:maven/org.springframework.boot/spring-boot-starter-logging@2.6.2 spring-boot-starter-jdbc-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter-jdbc/2.6.2/spring-boot-starter-jdbc-2.6.2.jar MD5: d5f22a2954c767fb530df0b4e9eea452 SHA1: ff853babf286bf913d73197d0f0b521343d5e8aa SHA256: 6679bcec14437bed15f293091faaa0dfbe9fd53acab29ad3c505fdd41ff53fd6 pkg:maven/org.springframework.boot/spring-boot-starter-jdbc@2.6.2 spring-boot-autoconfigure-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-autoconfigure/2.6.2/spring-boot-autoconfigure-2.6.2.jar MD5: 75c98cd9186a3e4fe0d3a0fa6afacdd9 SHA1: 7c91bce101d3f796cccbc1a6744c1ea389fff73f SHA256: 2b99caf9783b520bd2fe46d7e4cf810d60b49a93564fcb3d18e4a38904396086 pkg:maven/org.springframework.boot/spring-boot-autoconfigure@2.6.2 spring-boot-starter-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter/2.6.2/spring-boot-starter-2.6.2.jar MD5: e7dd83e12342cdea36446589f3140b5c SHA1: c36f1f6886cdbedc5347fdea62b97b44b053b0ba SHA256: 98fe30d08ff475b9724acf3c3a23945f3c32c5561cb1f922f37a2cfe7b5c6b96 pkg:maven/org.springframework.boot/spring-boot-starter@2.6.2 Published Vulnerabilities CVE-2013-4152 suppress
The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2013-7315 suppress
The Spring MVC in Spring Framework before 3.2.4 and 4.0.0.M1 through 4.0.0.M2 does not disable external entity resolution for the StAX XMLInputFactory, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML with JAXB, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152. NOTE: this issue was SPLIT from CVE-2013-4152 due to different affected versions. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2014-0054 suppress
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4152, CVE-2013-7315, and CVE-2013-6429. CWE-352 Cross-Site Request Forgery (CSRF)
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2018-11039 suppress
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-11040 suppress
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. CWE-829 Inclusion of Functionality from Untrusted Control Sphere
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-1257 suppress
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2020-5421 suppress
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. NVD-CWE-noinfo
CVSSv2:
Base Score: LOW (3.6) Vector: /AV:N/AC:H/Au:S/C:P/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
spring-core-4.3.30.RELEASE.jarDescription:
Spring Core License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-core/4.3.30.RELEASE/spring-core-4.3.30.RELEASE.jar
MD5: e34fafcb6ea7a2c9db80a686af31a27e
SHA1: b255bb7389e582d24574f75bc0c880ffb8103dfa
SHA256: 94a64b38e9dfa22df3c67664aea08aed559110bed386a736cb02a01d0254b236
Referenced In Projects/Scopes: TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: MessageBus :: Spring:compile Evidence Type Source Name Value Confidence Vendor pom name Spring Core High Vendor pom artifactid spring-core Low Vendor jar package name io Highest Vendor hint analyzer vendor pivotal software Highest Vendor file name spring-core High Vendor hint analyzer vendor vmware Highest Vendor pom url spring-projects/spring-framework Highest Vendor jar package name springframework Highest Vendor pom organization name Spring IO High Vendor pom groupid org.springframework Highest Vendor hint analyzer vendor SpringSource Highest Vendor pom groupid springframework Highest Vendor jar package name core Highest Vendor pom organization url https://projects.spring.io/spring-framework Medium Product hint analyzer product springsource_spring_framework Highest Product pom name Spring Core High Product pom organization url https://projects.spring.io/spring-framework Low Product pom artifactid spring-core Highest Product pom organization name Spring IO Low Product pom url spring-projects/spring-framework High Product jar package name io Highest Product file name spring-core High Product jar package name springframework Highest Product Manifest Implementation-Title spring-core High Product pom groupid springframework Highest Product jar package name core Highest Version pom version 4.3.30.RELEASE Highest Version Manifest Implementation-Version 4.3.30.RELEASE High
Related Dependencies spring-aspects-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-aspects/4.3.30.RELEASE/spring-aspects-4.3.30.RELEASE.jar MD5: f283d9dff89caca6475f7a651e030291 SHA1: 49080b05d93bb927e489d0d0b90dcb181b670dfd SHA256: af1fa23633ee8ee60ee879467ecb21fbdf135aacce47350f1fb38c7b446dd8bc pkg:maven/org.springframework/spring-aspects@4.3.30.RELEASE spring-aop-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-aop/4.3.30.RELEASE/spring-aop-4.3.30.RELEASE.jar MD5: e718caefc0083dd07f9c5b69d878d193 SHA1: 0b2a6f86ea659114df66cc5d5763667c96336efd SHA256: 717129d1a0dc19f12c923eacbcf0d4efd45d33a326c6655c3279297afa30ee0b pkg:maven/org.springframework/spring-aop@4.3.30.RELEASE spring-expression-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-expression/4.3.30.RELEASE/spring-expression-4.3.30.RELEASE.jar MD5: e9959f3eadbef7006c2721f27b324627 SHA1: 6ce0709c6899dde41a7213ccccfe2535e34c80fe SHA256: 21f6d95c15e1b93675b958c69cd9309754c6909dd25c01f120a3934de7e37749 pkg:maven/org.springframework/spring-expression@4.3.30.RELEASE spring-beans-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-beans/4.3.30.RELEASE/spring-beans-4.3.30.RELEASE.jar MD5: b07f7e509363f40654543bdab520dffd SHA1: fd6d361c817081ef9d2101e912b2cd9825c9f02a SHA256: 31575e38cbb0da38e88b166215d42b6024c6df08b29c21fa89361d15c533a741 pkg:maven/org.springframework/spring-beans@4.3.30.RELEASE spring-context-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-context/4.3.30.RELEASE/spring-context-4.3.30.RELEASE.jar MD5: 490f15abc264678f2ef1e6f9d3a55926 SHA1: 6a66a573322d555fb97ce44419f032d266f94cc4 SHA256: 27b5bab0d84670d21cbcaeec53bfa323031d1bbfc22b01afbe8f136b825309b0 pkg:maven/org.springframework/spring-context@4.3.30.RELEASE Published Vulnerabilities CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
spring-core-5.3.14.jarDescription:
Spring Core License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-core/5.3.14/spring-core-5.3.14.jar
MD5: b9d1f2454c4b7d94c058026d272dfc3c
SHA1: d87ad19f9d8b9a3f1a143db5a2be34c61751aaa2
SHA256: 00ffcfb2671e0c8cab33f75939c97e04127fcfd2e0670032c59b6f48d791b772
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom name Spring Core High Vendor Manifest automatic-module-name spring.core Medium Vendor pom artifactid spring-core Low Vendor pom organization url https://spring.io/projects/spring-framework Medium Vendor jar package name io Highest Vendor hint analyzer vendor pivotal software Highest Vendor file name spring-core High Vendor hint analyzer vendor vmware Highest Vendor pom url spring-projects/spring-framework Highest Vendor jar package name springframework Highest Vendor pom organization name Spring IO High Vendor pom groupid org.springframework Highest Vendor hint analyzer vendor SpringSource Highest Vendor pom groupid springframework Highest Vendor jar package name core Highest Product hint analyzer product springsource_spring_framework Highest Product pom name Spring Core High Product pom artifactid spring-core Highest Product Manifest automatic-module-name spring.core Medium Product pom organization name Spring IO Low Product pom url spring-projects/spring-framework High Product jar package name io Highest Product file name spring-core High Product pom organization url https://spring.io/projects/spring-framework Low Product jar package name springframework Highest Product Manifest Implementation-Title spring-core High Product pom groupid springframework Highest Product jar package name core Highest Version file version 5.3.14 High Version pom version 5.3.14 Highest Version Manifest Implementation-Version 5.3.14 High
Related Dependencies spring-context-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-context/5.3.14/spring-context-5.3.14.jar MD5: 731eee1b78fa01375de10fd95b84455d SHA1: ce6042492f042131f602bdc83fcb412b142bdac5 SHA256: 25efd823c10f3afbe1b65efe97370def475d202dd91477f66eb5685e746e2819 pkg:maven/org.springframework/spring-context@5.3.14 spring-jcl-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-jcl/5.3.14/spring-jcl-5.3.14.jar MD5: dd81ad7cd0aa5b6f0225d6a0341edd9a SHA1: ffcf745ed5ba32930771378316fd08e97986bec2 SHA256: b522a60d1f37b8f8b3b6ab58617df850b55fee6d82011b879a62574e068946aa pkg:maven/org.springframework/spring-jcl@5.3.14 spring-aspects-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-aspects/5.3.14/spring-aspects-5.3.14.jar MD5: f41ab1c45453af3f6ff97f24c9886fe9 SHA1: bf5de7c1338c2684d834bef8f389ef3d747f9f56 SHA256: 876dedec1983351faa5c65e07487b8ea70da36c2472ac789810f461561610cee pkg:maven/org.springframework/spring-aspects@5.3.14 spring-beans-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-beans/5.3.14/spring-beans-5.3.14.jar MD5: 04f9dc60a62319c97f140b8ebc98f797 SHA1: 24cc27af89edc1581a57bb15bc160d2353f40a0e SHA256: b354f54923139b8d86bc594452a6f53329da7b1e0c2a6402f9d9ca24837091ad pkg:maven/org.springframework/spring-beans@5.3.14 spring-expression-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-expression/5.3.14/spring-expression-5.3.14.jar MD5: 1d268dba90b89964d97254bae133a431 SHA1: 5cd4c568522b7084afac5d2ac6cb945b797b3f16 SHA256: f196833d5bca28b12fbb4ae3265c0f0c4dc9fb4c726b3bfc4cabcc129cd21cf7 pkg:maven/org.springframework/spring-expression@5.3.14 spring-jdbc-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-jdbc/5.3.14/spring-jdbc-5.3.14.jar MD5: 3ef2deb22cb6dbfb75f903c6ea72710f SHA1: f209e8d165dbcfc018aa4f741fbe75844eb45ff8 SHA256: dfe9b62359e6c1558a107c1d4aca02560d0d0e81e025e80c26e1b60b0ba3098d pkg:maven/org.springframework/spring-jdbc@5.3.14 spring-aop-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-aop/5.3.14/spring-aop-5.3.14.jar MD5: 953a41d016a5bc9d9e8ace3d90d499c9 SHA1: f049146a55991e89c0f04b9624f1f69e1763d80f SHA256: 1f6bb90bc78fa69506841c24c33f29790650e092dab96a35e56441f045ae216d pkg:maven/org.springframework/spring-aop@5.3.14 spring-tx-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-tx/5.3.14/spring-tx-5.3.14.jar MD5: 0b2bacf1b32bbdd73753aafb4136f192 SHA1: 03d80a1e051f071e9cd42fc99698bf9022862b5c SHA256: 816c0e855f8e8f58bb0d2c3083f4bc0505f602e25597da18fdd61584f84156fc pkg:maven/org.springframework/spring-tx@5.3.14 spring-orm-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-orm/5.3.14/spring-orm-5.3.14.jar MD5: 13fb3663deac6f4a60d25c16981a55f7 SHA1: 5ec15c098a56205ff77c7792e9dad30f5be16b5a SHA256: c74dc10593c7f0961127befaf02be62d0d0b974970b056a0bc89ec4924d80627 pkg:maven/org.springframework/spring-orm@5.3.14 Published Vulnerabilities CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22971 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
spring-data-commons-2.6.0.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/data/spring-data-commons/2.6.0/spring-data-commons-2.6.0.jarMD5: bcf27a3e9c58cf484184ae6dda921b55SHA1: 5a9afaa6e0a4cd74183a794f467c9b4a546b4cbeSHA256: 2d784e87491b762789a7d77969e61603902e77033d9b526d8898ebc84fe8f0a1Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom name Spring Data Core High Vendor pom groupid org.springframework.data Highest Vendor pom artifactid spring-data-commons Low Vendor file name spring-data-commons High Vendor pom parent-artifactid spring-data-parent Low Vendor pom groupid springframework.data Highest Vendor hint analyzer vendor pivotal software Highest Vendor Manifest automatic-module-name spring.data.commons Medium Vendor jar package name data Highest Vendor Manifest build-jdk-spec 1.8 Low Vendor hint analyzer vendor vmware Highest Vendor jar package name springframework Highest Vendor hint analyzer vendor SpringSource Highest Vendor pom parent-groupid org.springframework.data.build Medium Vendor jar package name core Highest Product pom name Spring Data Core High Product file name spring-data-commons High Product pom parent-artifactid spring-data-parent Medium Product pom groupid springframework.data Highest Product jar package name data Highest Product Manifest automatic-module-name spring.data.commons Medium Product Manifest build-jdk-spec 1.8 Low Product jar package name springframework Highest Product pom artifactid spring-data-commons Highest Product Manifest Implementation-Title Spring Data Core High Product jar package name core Highest Product pom parent-groupid org.springframework.data.build Medium Version file version 2.6.0 High Version pom version 2.6.0 Highest Version Manifest Implementation-Version 2.6.0 High
Published Vulnerabilities CVE-2013-4152 suppress
The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2013-7315 suppress
The Spring MVC in Spring Framework before 3.2.4 and 4.0.0.M1 through 4.0.0.M2 does not disable external entity resolution for the StAX XMLInputFactory, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML with JAXB, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152. NOTE: this issue was SPLIT from CVE-2013-4152 due to different affected versions. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2014-0054 suppress
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4152, CVE-2013-7315, and CVE-2013-6429. CWE-352 Cross-Site Request Forgery (CSRF)
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2018-11039 suppress
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-11040 suppress
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. CWE-829 Inclusion of Functionality from Untrusted Control Sphere
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-1257 suppress
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2020-5421 suppress
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. NVD-CWE-noinfo
CVSSv2:
Base Score: LOW (3.6) Vector: /AV:N/AC:H/Au:S/C:P/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
spring-data-jpa-2.6.0.jarDescription:
Spring Data module for JPA repositories. File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/data/spring-data-jpa/2.6.0/spring-data-jpa-2.6.0.jarMD5: 50ddb96bd3bc08acf0376939595c6a9aSHA1: bd08ea8db76c7c82397307dda2e253180c31b7ecSHA256: 4107be1cca55f9a1ac60959354db1ede4c33587c223a22303ee4e48187d4a415Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom groupid org.springframework.data Highest Vendor pom parent-artifactid spring-data-parent Low Vendor pom groupid springframework.data Highest Vendor hint analyzer vendor pivotal software Highest Vendor jar package name data Highest Vendor Manifest build-jdk-spec 1.8 Low Vendor hint analyzer vendor vmware Highest Vendor pom name Spring Data JPA High Vendor jar package name springframework Highest Vendor file name spring-data-jpa High Vendor hint analyzer vendor SpringSource Highest Vendor jar package name jpa Highest Vendor Manifest automatic-module-name spring.data.jpa Medium Vendor pom parent-groupid org.springframework.data.build Medium Vendor pom artifactid spring-data-jpa Low Vendor pom url https://projects.spring.io/spring-data-jpa Highest Product pom artifactid spring-data-jpa Highest Product pom parent-artifactid spring-data-parent Medium Product pom groupid springframework.data Highest Product jar package name data Highest Product pom url https://projects.spring.io/spring-data-jpa Medium Product Manifest build-jdk-spec 1.8 Low Product pom name Spring Data JPA High Product jar package name springframework Highest Product Manifest Implementation-Title Spring Data JPA High Product file name spring-data-jpa High Product jar package name jpa Highest Product Manifest automatic-module-name spring.data.jpa Medium Product pom parent-groupid org.springframework.data.build Medium Version file version 2.6.0 High Version pom version 2.6.0 Highest Version Manifest Implementation-Version 2.6.0 High
Published Vulnerabilities CVE-2013-4152 suppress
The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2013-7315 suppress
The Spring MVC in Spring Framework before 3.2.4 and 4.0.0.M1 through 4.0.0.M2 does not disable external entity resolution for the StAX XMLInputFactory, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML with JAXB, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152. NOTE: this issue was SPLIT from CVE-2013-4152 due to different affected versions. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2014-0054 suppress
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4152, CVE-2013-7315, and CVE-2013-6429. CWE-352 Cross-Site Request Forgery (CSRF)
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2018-11039 suppress
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-11040 suppress
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. CWE-829 Inclusion of Functionality from Untrusted Control Sphere
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-1257 suppress
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2020-5421 suppress
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. NVD-CWE-noinfo
CVSSv2:
Base Score: LOW (3.6) Vector: /AV:N/AC:H/Au:S/C:P/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
testng-6.9.10.jarDescription:
Testing framework for Java License:
Apache Version 2.0, January 2004 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/testng/testng/6.9.10/testng-6.9.10.jar
MD5: 83e26cb672a81f5bbda139436ef4d8d0
SHA1: 6feb3e964aeb7097aff30c372aac3ec0f8d87ede
SHA256: 240ae7bbcf066aadff967b42a27a697693bf5a4e6a5ff4bf339b6bfe371288e4
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor Manifest build-time 01:14:26.500+0400 Low Vendor pom name testng High Vendor file name testng High Vendor jar package name testng Highest Vendor pom artifactid testng Low Vendor pom url http://github.com/cbeust/testng Highest Vendor Manifest build-date 2015-12-16 Low Vendor Manifest bundle-symbolicname org.testng Medium Vendor pom groupid testng Highest Vendor pom groupid org.testng Highest Product Manifest build-time 01:14:26.500+0400 Low Product Manifest specification-title testng Medium Product pom name testng High Product file name testng High Product jar package name testng Highest Product pom artifactid testng Highest Product pom url http://github.com/cbeust/testng Medium Product Manifest build-date 2015-12-16 Low Product Manifest bundle-symbolicname org.testng Medium Product Manifest Bundle-Name testng Medium Product pom groupid testng Highest Version Manifest specification-version 6.9.10 High Version Manifest Bundle-Version 6.9.10 High Version pom version 6.9.10 Highest Version file version 6.9.10 High
Published Vulnerabilities CVE-2019-11358 (OSSINDEX) suppress
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2019-11358 for details CWE-1321
CVSSv2:
Base Score: MEDIUM (6.1) Vector: /AV:N/AC:L/Au:/C:L/I:L/A:N References:
Vulnerable Software & Versions (OSSINDEX):
cpe:2.3:a:org.testng:testng:6.9.10:*:*:*:*:*:*:* testng-6.9.10.jar: jquery-1.7.1.min.jsFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/testng/testng/6.9.10/testng-6.9.10.jar/jquery-1.7.1.min.jsMD5: ddb84c1587287b2df08966081ef063bfSHA1: 9eb9ac595e9b5544e2dc79fff7cd2d0b4b5ef71fSHA256: 88171413fc76dda23ab32baa17b11e4fff89141c633ece737852445f1ba6c1bdReferenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor file name jquery High Product file name jquery High Version file version 1.7.1.min High
Published Vulnerabilities CVE-2012-6708 suppress
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions up to (excluding) 1.9.0 CVE-2015-9251 suppress
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:oracle:utilities_mobile_workforce_management:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_operations_monitor:4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_interactive_session_recorder:6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.6 cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_reporting_and_analytics:9.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_sales_audit:15.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_workforce_management_software:1.64.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:real-time_scheduler:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_operations_monitor:3.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:jdeveloper:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:17.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:* versions from (including) 4.3.0.1; versions up to (including) 4.3.0.4 cpe:2.3:a:oracle:healthcare_foundation:7.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:*:*:*:*:*:*:*:* versions from (including) 8.0.2; versions up to (including) 8.0.7 cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:endeca_information_discovery_studio:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions up to (excluding) 3.0.0 cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 7.3.3; versions up to (including) 7.3.5 cpe:2.3:a:oracle:hospitality_cruise_fleet_management:9.0.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:*:*:*:*:*:*:*:* versions from (including) 8.0.5; versions up to (including) 8.0.7 cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_invoice_matching:15.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:* versions from (including) 17.1; versions up to (including) 17.12 cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_allocation:15.0.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:* versions up to (excluding) 7.2 cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:*:*:*:*:*:*:*:* versions from (including) 8.0.2; versions up to (including) 8.0.6 cpe:2.3:a:oracle:siebel_ui_framework:18.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 8.0.0; versions up to (including) 8.0.7 cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_services_gatekeeper:*:*:*:*:*:*:*:* versions up to (excluding) 6.1.0.4.0 cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_process_management_suite:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_process_management_suite:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_reconciliation_framework:8.0.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_interactive_session_recorder:6.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:* versions up to (excluding) 7.0.0.1 cpe:2.3:a:oracle:retail_workforce_management_software:1.60.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_asset_liability_management:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_interactive_session_recorder:6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_reconciliation_framework:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:oss_support_tools:19.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_ui_framework:18.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:* CVE-2019-11358 suppress
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. CWE-1321
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_back_office:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation_for_mobile_devices:*:*:*:*:*:*:*:* versions from (including) 12.2.0; versions up to (including) 12.2.15 cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper_and_adf:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:transportation_management:1.4.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:18c:*:*:*:-:*:*:* cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:* versions up to (excluding) 19.1 cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_us_federal_reserve:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:* versions from (including) 16.1.0; versions up to (including) 16.4.0 cpe:2.3:a:oracle:healthcare_foundation:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 19.12.0; versions up to (including) 19.12.4 cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:* versions from (including) 5.0.0.0; versions up to (including) 5.6.0.0 cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:* versions from (including) 17.7; versions up to (including) 17.12 cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.5.0; versions up to (excluding) 8.5.15 cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 8.0.2; versions up to (including) 8.1.0 cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:* versions from (including) 3.0; versions up to (including) 3.1.3 cpe:2.3:a:oracle:jdeveloper_and_adf:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 7.0; versions up to (excluding) 7.66 cpe:2.3:a:oracle:knowledge:*:*:*:*:*:*:*:* versions from (including) 8.6.0; versions up to (including) 8.6.3 cpe:2.3:a:oracle:diagnostic_assistant:2.12.36:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:* cpe:2.3:a:backdropcms:backdrop:*:*:*:*:*:*:*:* versions from (including) 1.12.0; versions up to (excluding) 1.12.6 cpe:2.3:a:oracle:jdeveloper_and_adf:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_retail_customer_analytics:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.6 cpe:2.3:a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_governance_for_us_regulatory_reporting:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.9 cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:19c:*:*:*:-:*:*:* cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.4.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:tape_library_acsls:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_asset_liability_management:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:retail_returns_management:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_central_office:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_european_banking_authority:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.0.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:* cpe:2.3:a:redhat:cloudforms:4.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation:12.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_interactive_session_recorder:*:*:*:*:*:*:*:* versions from (including) 6.0; versions up to (including) 6.4 cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:12.1.0.2:*:*:*:-:*:*:* cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.4.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_unified_inventory_management:7.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:*:*:*:*:*:*:*:* versions from (including) 8.0.2; versions up to (including) 8.0.7 cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 7.3.3; versions up to (including) 7.3.5 cpe:2.3:a:oracle:insurance_ifrs_17_analyzer:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* versions from (including) 3.0.0; versions up to (including) 3.9.4 cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_retail_performance_analytics:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_enterprise_financial_performance_analytics:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.5.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:financial_services_data_foundation:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.8 cpe:2.3:a:oracle:financial_services_profitability_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_application_session_controller:3.8m0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_performance_insight:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:*:*:*:*:*:*:*:* versions from (including) 19.1.0; versions up to (including) 19.1.2 cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions up to (excluding) 3.4.0 cpe:2.3:a:oracle:siebel_ui_framework:20.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:18.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.6.0; versions up to (excluding) 8.6.15 cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_service_level_management:13.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:* versions from (including) 12.2.0; versions up to (including) 12.2.15 cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_retail_performance_analytics:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_point-of-service:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 17.12.0; versions up to (including) 17.12.7 cpe:2.3:a:oracle:financial_services_asset_liability_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:* versions from (including) 2.4.0; versions up to (including) 2.10.0 cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:11.2.0.4:*:*:*:-:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:4.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:15.2.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_european_banking_authority:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 18.8.0; versions up to (including) 18.8.9 cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:system_utilities:19.1:*:*:*:*:*:*:* cpe:2.3:a:backdropcms:backdrop:*:*:*:*:*:*:*:* versions from (including) 1.11.0; versions up to (excluding) 1.11.9 cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_enterprise_collections:*:*:*:*:*:*:*:* versions from (including) 2.7.0; versions up to (including) 2.8.0 cpe:2.3:a:oracle:financial_services_profitability_management:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:application_service_level_management:13.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:big_data_discovery:1.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_de_nederlandsche_bank:8.0.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:12.2.0.1:*:*:*:-:*:*:* cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation:10.4.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:bi_publisher:5.5.0.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:identity_manager:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.4.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:real-time_scheduler:*:*:*:*:*:*:*:* versions from (including) 2.3.0.1; versions up to (including) 2.3.0.3 cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_ifrs_17_analyzer:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_enterprise_financial_performance_analytics:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:*:*:*:*:*:*:*:* versions from (including) 8.0.5; versions up to (including) 8.0.7 cpe:2.3:a:oracle:policy_automation:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 16.2.0; versions up to (including) 16.2.11 cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_accounting_analyzer:8.0.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_mobile_applications:*:*:*:*:*:*:*:* versions up to (including) 19.8 cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_data_foundation:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:healthcare_translational_research:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:utilities_mobile_workforce_management:*:*:*:*:*:*:*:* versions from (including) 2.3.0.1; versions up to (including) 2.3.0.3 cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:*:*:*:*:*:*:*:* versions from (including) 4.1; versions up to (including) 4.3 cpe:2.3:a:oracle:financial_services_balance_sheet_planning:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:tape_library_acsls:8.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:8.1.0:*:*:*:*:*:*:* CVE-2020-11022 suppress
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_back_office:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\::*:*:*:*:*:*:*:* versions from (including) 8.0.0; versions up to (including) 8.2.2 cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:* versions up to (excluding) 21.1.2 cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.8.0; versions up to (excluding) 8.8.6 cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_asset_liability_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:* versions from (including) 16.1.0; versions up to (including) 16.4.0 cpe:2.3:a:oracle:healthcare_foundation:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_data_foundation:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.1.0 cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:* versions from (including) 5.0.0.0; versions up to (including) 5.6.0.0 cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.1.0 cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_us_federal_reserve:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.9 cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:* versions from (including) 3.0; versions up to (including) 3.1.3 cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:19.1.0-19.1.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_supplier_collaboration_for_process:6.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_governance_for_us_regulatory_reporting:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.9 cpe:2.3:a:oracle:insurance_data_foundation:8.0.6-8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:* cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_returns_management:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 8.0.6.0.0; versions up to (including) 8.1.0.0.0 cpe:2.3:a:oracle:healthcare_foundation:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 7.0; versions up to (excluding) 7.70 cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_asset_liability_management:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:* versions from (including) 12.2.0; versions up to (including) 12.2.20 cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation_for_mobile_devices:*:*:*:*:*:*:*:* versions from (including) 12.2.0; versions up to (including) 12.2.20 cpe:2.3:a:oracle:banking_digital_experience:*:*:*:*:*:*:*:* versions from (including) 18.1; versions up to (including) 20.1 cpe:2.3:a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_european_banking_authority:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.1.0 cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:* versions up to (excluding) 6.0.9 cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_asset_liability_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_accounting_analyzer:8.0.9:*:*:*:*:*:*:* cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:* cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions from (including) 1.2; versions up to (excluding) 3.5.0 cpe:2.3:a:oracle:financial_services_data_integration_hub:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_application_session_controller:3.8m0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.7.0; versions up to (excluding) 8.7.14 cpe:2.3:a:oracle:hospitality_simphony:*:*:*:*:*:*:*:* versions from (including) 19.1.0; versions up to (including) 19.1.2 cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_foundation:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.1.0 cpe:2.3:a:oracle:financial_services_balance_sheet_planning:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_ui_framework:20.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:18.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:8.1.0:*:*:*:*:*:*:* CVE-2020-11023 suppress
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_de_nederlandsche_bank:8.0.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:12.2.0.1:*:*:*:-:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 7.0; versions up to (excluding) 7.70 cpe:2.3:a:oracle:communications_interactive_session_recorder:*:*:*:*:*:*:*:* versions from (including) 6.1; versions up to (including) 6.4 cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* versions up to (excluding) 9.2.5.0 cpe:2.3:a:oracle:rest_data_services:12.1.0.2:*:*:*:-:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:health_sciences_inform:6.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:18c:*:*:*:-:*:*:* cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:hyperion_financial_reporting:11.1.2.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.8.0; versions up to (excluding) 8.8.6 cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:* versions up to (excluding) 6.0.9 cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 17.12.0; versions up to (including) 17.12.7 cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:* versions from (including) 2.4.0; versions up to (including) 2.10.0 cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:* versions up to (excluding) 9.2.5.0 cpe:2.3:a:oracle:rest_data_services:11.2.0.4:*:*:*:-:*:*:* cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions from (including) 1.0.3; versions up to (excluding) 3.5.0 cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:* versions from (including) 16.1.0; versions up to (including) 16.4.0 cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 19.12.0; versions up to (including) 19.12.4 cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:oss_support_tools:*:*:*:*:*:*:*:* versions up to (excluding) 2.12.41 cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_mobile:*:*:*:*:*:*:*:* versions up to (including) 20.12 cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:* versions from (including) 3.0; versions up to (including) 3.1.3 cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 18.8.0; versions up to (including) 18.8.9 cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 16.2; versions up to (including) 16.2.11 cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management_resources:9.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:19c:*:*:*:-:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.7.0; versions up to (excluding) 8.7.14 cpe:2.3:a:oracle:healthcare_translational_research:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:*:*:*:*:*:*:*:* versions from (including) 4.1; versions up to (including) 4.3 cpe:2.3:a:oracle:banking_enterprise_collections:*:*:*:*:*:*:*:* versions from (including) 2.7.0; versions up to (including) 2.8.0 cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:* versions up to (excluding) 20.2 cpe:2.3:a:netapp:snapcenter_server:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.3.1:*:*:*:*:*:*:* testng-6.9.10.jar: testng-reports.jsFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/testng/testng/6.9.10/testng-6.9.10.jar/testng-reports.jsMD5: 4311beca6e78e253ebd35f4f8c46166dSHA1: f40c090d15e2e6eb179b4eb3919c365afe882adeSHA256: 45616558165413f0bc3f315e6bd52f7f4238d384169b3355e2e0465a611642cbReferenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence
txw2-2.3.5.jarDescription:
TXW is a library that allows you to write XML documents.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/glassfish/jaxb/txw2/2.3.5/txw2-2.3.5.jarMD5: 67005a4cf5ee9cfd82edec1bdbecb32bSHA1: ec8930fa62e7b1758b1664d135f50c7abe86a4a3SHA256: 7d75ea1151367fb66287011d9941715f645922932554acba0c5ac3aec67fb01fReferenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor jar package name txw2 Highest Vendor Manifest git-revision f01d8db Low Vendor pom artifactid txw2 Low Vendor pom groupid org.glassfish.jaxb Highest Vendor jar package name sun Highest Vendor pom name TXW2 Runtime High Vendor file name txw2 High Vendor pom groupid glassfish.jaxb Highest Vendor pom parent-artifactid jaxb-txw-parent Low Vendor jar package name xml Highest Vendor Manifest Implementation-Vendor-Id org.eclipse Medium Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor pom url https://eclipse-ee4j.github.io/jaxb-ri/ Highest Vendor pom parent-groupid com.sun.xml.bind.mvn Medium Vendor jar (hint) package name oracle Highest Vendor jar package name txw Highest Product pom url https://eclipse-ee4j.github.io/jaxb-ri/ Medium Product pom artifactid txw2 Highest Product jar package name txw2 Highest Product Manifest git-revision f01d8db Low Product Manifest specification-title Jakarta XML Binding Medium Product jar package name sun Highest Product pom name TXW2 Runtime High Product file name txw2 High Product pom groupid glassfish.jaxb Highest Product jar package name xml Highest Product pom parent-artifactid jaxb-txw-parent Medium Product Manifest Implementation-Title Jakarta XML Binding Implementation High Product pom parent-groupid com.sun.xml.bind.mvn Medium Product jar package name txw Highest Version file version 2.3.5 High Version pom version 2.3.5 Highest Version Manifest Implementation-Version 2.3.5 High Version Manifest major-version 2.3.5 Medium Version Manifest build-id 2.3.5 Medium
uuid-2.1.5.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/eaio/uuid/2.1.5/uuid-2.1.5.jarMD5: aec8f2716d5e9abd040afb744bf4f32bSHA1: 69f75f7ff06261b00bcd77408bb457e5f80d29fdSHA256: d4cf42667d4f314931fb7a7fc8ea19ad3001764d769a174e78284a58677ec248Referenced In Project/Scope: TheseFoolishThings :: Actors:compile
Evidence Type Source Name Value Confidence Vendor jar package name uuid Highest Vendor pom groupid eaio Highest Vendor file name uuid High Vendor manifest: com/eaio/uuid Implementation-Vendor eaio (<http://eaio.com>) Medium Vendor jar package name eaio Highest Vendor pom artifactid uuid Low Vendor pom groupid com.eaio Highest Product jar package name uuid Highest Product pom artifactid uuid Highest Product manifest: com/eaio/uuid Implementation-Title eaio: UUID - generate UUIDs (or GUIDs) in Java Medium Product pom groupid eaio Highest Product file name uuid High Product jar package name eaio Highest Version pom version 2.1.5 Highest Version file version 2.1.5 High
xmlpull-1.1.3.1.jarLicense:
Public Domain: http://www.xmlpull.org/v1/download/unpacked/LICENSE.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar
MD5: cc57dacc720eca721a50e78934b822d2
SHA1: 2b8e230d2ab644e4ecaa94db7cdedbc40c805dfa
SHA256: 34e08ee62116071cbb69c0ed70d15a7a5b208d62798c59f2120bb8929324cb63
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor file name xmlpull High Vendor pom groupid xmlpull Highest Vendor jar package name xmlpull Low Vendor pom name XML Pull Parsing API High Vendor pom url http://www.xmlpull.org Highest Vendor jar package name v1 Low Vendor jar package name xmlpull Highest Vendor pom artifactid xmlpull Low Product file name xmlpull High Product pom groupid xmlpull Highest Product pom name XML Pull Parsing API High Product pom url http://www.xmlpull.org Medium Product pom artifactid xmlpull Highest Product jar package name v1 Low Product jar package name xmlpull Highest Version pom version 1.1.3.1 Highest Version file version 1.1.3.1 High
xstream-1.4.20.jarDescription:
XStream is a serialization library from Java objects to XML and back. License:
BSD-3-Clause File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar
MD5: 1e816f33b1eb780a309789478051faeb
SHA1: 0e2315b8b2e95e9f21697833c8e56cdd9c98a5ee
SHA256: 87df0f0be57c92037d0110fbb225a30b651702dc275653d285afcfef31bc2e81
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor Manifest Implementation-Vendor XStream High Vendor jar package name xstream Highest Vendor Manifest bundle-docurl http://x-stream.github.io Low Vendor pom groupid thoughtworks.xstream Highest Vendor pom parent-artifactid xstream-parent Low Vendor Manifest java_1_4_home /opt/blackdown-jdk-1.4.2.03 Low Vendor Manifest Implementation-Vendor-Id com.thoughtworks.xstream Medium Vendor pom name XStream Core High Vendor Manifest bundle-symbolicname xstream Medium Vendor Manifest java_1_8_home /opt/oracle-jdk-bin-1.8.0.202 Low Vendor Manifest x-compile-source 1.4 Low Vendor Manifest java_1_7_home /opt/oracle-jdk-bin-1.7.0.80 Low Vendor pom parent-groupid com.thoughtworks.xstream Medium Vendor Manifest specification-vendor XStream Low Vendor Manifest java_9_home /opt/oracle-jdk-bin-9.0.4 Low Vendor Manifest x-builder Maven 3.8.6 Low Vendor file name xstream High Vendor jar package name thoughtworks Highest Vendor Manifest x-build-os Linux Low Vendor pom artifactid xstream Low Vendor Manifest java_1_5_home /opt/sun-jdk-1.5.0.22 Low Vendor Manifest x-build-time 2022-12-23T23:21:05Z Low Vendor pom groupid com.thoughtworks.xstream Highest Vendor Manifest java_1_6_home /opt/sun-jdk-1.6.0.45 Low Vendor Manifest x-compile-target 1.4 Low Vendor jar package name core Highest Product jar package name xstream Highest Product Manifest bundle-docurl http://x-stream.github.io Low Product pom groupid thoughtworks.xstream Highest Product Manifest java_1_4_home /opt/blackdown-jdk-1.4.2.03 Low Product pom artifactid xstream Highest Product pom name XStream Core High Product Manifest bundle-symbolicname xstream Medium Product Manifest java_1_8_home /opt/oracle-jdk-bin-1.8.0.202 Low Product Manifest Bundle-Name XStream Core Medium Product Manifest x-compile-source 1.4 Low Product Manifest java_1_7_home /opt/oracle-jdk-bin-1.7.0.80 Low Product pom parent-groupid com.thoughtworks.xstream Medium Product Manifest java_9_home /opt/oracle-jdk-bin-9.0.4 Low Product Manifest x-builder Maven 3.8.6 Low Product file name xstream High Product Manifest x-build-os Linux Low Product jar package name thoughtworks Highest Product Manifest java_1_5_home /opt/sun-jdk-1.5.0.22 Low Product Manifest x-build-time 2022-12-23T23:21:05Z Low Product jar package name xml Highest Product jar package name io Highest Product pom parent-artifactid xstream-parent Medium Product Manifest specification-title XStream Core Medium Product Manifest java_1_6_home /opt/sun-jdk-1.6.0.45 Low Product Manifest x-compile-target 1.4 Low Product Manifest Implementation-Title XStream Core High Product jar package name core Highest Version Manifest Bundle-Version 1.4.20 High Version pom version 1.4.20 Highest Version Manifest Implementation-Version 1.4.20 High Version file version 1.4.20 High