Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies;
false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and
the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties,
implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided
is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever
arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.
Scan Information (
show all ):
dependency-check version : 6.1.1Report Generated On : Sun, 22 Jan 2023 17:14:48 +0100Dependencies Scanned : 92 (69 unique)Vulnerable Dependencies : 16 Vulnerabilities Found : 106Vulnerabilities Suppressed : 0... NVD CVE Checked : 2023-01-22T17:13:26NVD CVE Modified : 2023-01-22T16:00:01VersionCheckOn : 2023-01-15T14:18:40Summary Display:
Showing Vulnerable Dependencies (click to show all) Dependencies HikariCP-4.0.3.jarDescription:
Ultimate JDBC Connection Pool License:
The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/zaxxer/HikariCP/4.0.3/HikariCP-4.0.3.jar
MD5: e725642926105cd1bbf4ad7fdff5d5a9
SHA1: 107cbdf0db6780a065f895ae9d8fbf3bb0e1c21f
SHA256: 7c024aeff1c1063576d74453513f9de6447d8e624d17f8e27f30a2e97688c6c9
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom name HikariCP High Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor pom organization url brettwooldridge Medium Vendor Manifest originally-created-by Apache Maven Bundle Plugin Low Vendor pom groupid com.zaxxer Highest Vendor pom organization name Zaxxer.com High Vendor Manifest multi-release true Low Vendor pom artifactid HikariCP Low Vendor jar package name pool Highest Vendor Manifest bundle-docurl https://github.com/brettwooldridge Low Vendor file name HikariCP High Vendor pom groupid zaxxer Highest Vendor jar package name zaxxer Highest Vendor Manifest build-jdk-spec 11 Low Vendor Manifest bundle-symbolicname com.zaxxer.HikariCP Medium Vendor pom url brettwooldridge/HikariCP Highest Product pom name HikariCP High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest originally-created-by Apache Maven Bundle Plugin Low Product Manifest multi-release true Low Product pom organization name Zaxxer.com Low Product pom url brettwooldridge High Product jar package name pool Highest Product Manifest Bundle-Name HikariCP Medium Product pom url brettwooldridge/HikariCP High Product Manifest bundle-docurl https://github.com/brettwooldridge Low Product pom artifactid HikariCP Highest Product file name HikariCP High Product pom groupid zaxxer Highest Product jar package name zaxxer Highest Product Manifest build-jdk-spec 11 Low Product Manifest bundle-symbolicname com.zaxxer.HikariCP Medium Product jar package name 11 Highest Version file version 4.0.3 High Version pom version 4.0.3 Highest Version Manifest Bundle-Version 4.0.3 High
antlr-2.7.7.jarDescription:
A framework for constructing recognizers, compilers,
and translators from grammatical descriptions containing
Java, C#, C++, or Python actions.
License:
BSD License: http://www.antlr.org/license.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/antlr/antlr/2.7.7/antlr-2.7.7.jar
MD5: f8f1352c52a4c6a500b597596501fc64
SHA1: 83cd2cd674a217ade95a4bb83a8a14f351f48bd0
SHA256: 88fbda4b912596b9f56e8e12e580cc954bacfb51776ecfddd3e18fc1cf56dc4c
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom groupid antlr Highest Vendor pom url http://www.antlr.org/ Highest Vendor jar package name actions Highest Vendor jar package name antlr Highest Vendor jar package name python Highest Vendor pom artifactid antlr Low Vendor jar package name java Highest Vendor file name antlr High Vendor jar package name parser Highest Vendor pom name AntLR Parser Generator High Vendor jar package name antlr Low Product pom groupid antlr Highest Product jar package name actions Highest Product jar package name antlr Highest Product jar package name python Highest Product pom artifactid antlr Highest Product jar package name java Highest Product file name antlr High Product jar package name parser Highest Product pom name AntLR Parser Generator High Product pom url http://www.antlr.org/ Medium Version file version 2.7.7 High Version pom version 2.7.7 Highest
aspectjrt-1.9.6.jarDescription:
The runtime needed to execute a program using AspectJ License:
Eclipse Public License - v 1.0: http://www.eclipse.org/legal/epl-v10.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/aspectj/aspectjrt/1.9.6/aspectjrt-1.9.6.jar
MD5: 391f9257f19b84b45eb79a1878b9600a
SHA1: 1651849d48659e5703adc2599e694bf67b8c3fc4
SHA256: 20c785678cbb4ee045914daf83da25f98a16071177dfa0e3451326723dfb4705
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest automatic-module-name org.aspectj.runtime Medium Vendor file name aspectjrt High Vendor pom url https://www.eclipse.org/aspectj/ Highest Vendor pom groupid aspectj Highest Vendor jar package name runtime Highest Vendor jar package name aspectj Highest Vendor manifest: org/aspectj/lang/ Implementation-Vendor https://www.eclipse.org/aspectj/ Medium Vendor pom artifactid aspectjrt Low Vendor pom groupid org.aspectj Highest Vendor pom name AspectJ runtime High Product Manifest automatic-module-name org.aspectj.runtime Medium Product manifest: org/aspectj/lang/ Implementation-Title org.aspectj.runtime Medium Product file name aspectjrt High Product pom artifactid aspectjrt Highest Product pom groupid aspectj Highest Product jar package name runtime Highest Product pom url https://www.eclipse.org/aspectj/ Medium Product jar package name aspectj Highest Product manifest: org/aspectj/lang/ Specification-Title AspectJ Runtime Classes Medium Product pom name AspectJ runtime High Version pom version 1.9.6 Highest Version file version 1.9.6 High Version manifest: org/aspectj/lang/ Implementation-Version 1.9.6 Medium
betterbeansbinding-core-1.3.0.jarDescription:
Keeping JavaBeans in sync. License:
http://www.gnu.org/licenses/lgpl-2.1.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/betterbeansbinding/betterbeansbinding-core/1.3.0/betterbeansbinding-core-1.3.0.jar
MD5: a4ed4664612ece2fdff12bf5f21accc8
SHA1: ba454e7173845a67ba7f9e9478af4a9e43700b7b
SHA256: da366781ce264f2facefc922b858382dc1b82b551a777c6df6106a9349763080
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Swing:compile
Evidence Type Source Name Value Confidence Vendor file name betterbeansbinding-core High Vendor pom parent-artifactid betterbeansbinding Low Vendor pom name BetterBeansBinding Core High Vendor pom groupid it.tidalwave.betterbeansbinding Highest Vendor Manifest implementation-build unknown Low Vendor Manifest bundle-docurl http://www.tidalwave.it Low Vendor pom artifactid betterbeansbinding-core Low Vendor Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-core Medium Product file name betterbeansbinding-core High Product Manifest Bundle-Name BetterBeansBinding Core Medium Product pom name BetterBeansBinding Core High Product pom artifactid betterbeansbinding-core Highest Product pom parent-artifactid betterbeansbinding Medium Product Manifest implementation-build unknown Low Product pom groupid it.tidalwave.betterbeansbinding Highest Product Manifest bundle-docurl http://www.tidalwave.it Low Product Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-core Medium Version file version 1.3.0 High Version Manifest Bundle-Version 1.3.0 High Version pom version 1.3.0 Highest
betterbeansbinding-el-1.3.0.jarDescription:
Keeping JavaBeans in sync. License:
http://www.gnu.org/licenses/lgpl-2.1.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/betterbeansbinding/betterbeansbinding-el/1.3.0/betterbeansbinding-el-1.3.0.jar
MD5: 63cad21fb9a2b5a837b11e881eeeda22
SHA1: f285f3cd2b41cbde08a45095ca3be862d7ef7adf
SHA256: b19e603cc5e959f2bde777f9f992ea63e59fef211c650d3bf4bf707ed741a84f
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Swing:compile
Evidence Type Source Name Value Confidence Vendor pom name BetterBeansBinding EL High Vendor pom artifactid betterbeansbinding-el Low Vendor pom parent-artifactid betterbeansbinding Low Vendor file name betterbeansbinding-el High Vendor jar package name el Highest Vendor pom groupid it.tidalwave.betterbeansbinding Highest Vendor Manifest implementation-build unknown Low Vendor Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-el Medium Vendor Manifest bundle-docurl http://www.tidalwave.it Low Product Manifest Bundle-Name BetterBeansBinding EL Medium Product pom name BetterBeansBinding EL High Product file name betterbeansbinding-el High Product pom parent-artifactid betterbeansbinding Medium Product jar package name el Highest Product Manifest implementation-build unknown Low Product Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-el Medium Product pom groupid it.tidalwave.betterbeansbinding Highest Product Manifest bundle-docurl http://www.tidalwave.it Low Product pom artifactid betterbeansbinding-el Highest Version file version 1.3.0 High Version Manifest Bundle-Version 1.3.0 High Version pom version 1.3.0 Highest
betterbeansbinding-swingbinding-1.3.0.jarDescription:
Keeping JavaBeans in sync. License:
http://www.gnu.org/licenses/lgpl-2.1.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/betterbeansbinding/betterbeansbinding-swingbinding/1.3.0/betterbeansbinding-swingbinding-1.3.0.jar
MD5: 73e42607d80f5e24e9be17e4e3952184
SHA1: d865d0482b48bd900099fc5c84c02892766ff375
SHA256: 053cdb906c0d366df9e4851ce2528f200ba97fda2d7d6769dabe7012dcc83d29
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Swing:compile
Evidence Type Source Name Value Confidence Vendor file name betterbeansbinding-swingbinding High Vendor Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-swingbinding Medium Vendor pom name BetterBeansBinding SwingBinding High Vendor pom parent-artifactid betterbeansbinding Low Vendor jar package name swingbinding Highest Vendor pom groupid it.tidalwave.betterbeansbinding Highest Vendor Manifest implementation-build unknown Low Vendor Manifest bundle-docurl http://www.tidalwave.it Low Vendor pom artifactid betterbeansbinding-swingbinding Low Product file name betterbeansbinding-swingbinding High Product Manifest Bundle-Name BetterBeansBinding SwingBinding Medium Product Manifest bundle-symbolicname it.tidalwave.betterbeansbinding.betterbeansbinding-swingbinding Medium Product pom name BetterBeansBinding SwingBinding High Product pom artifactid betterbeansbinding-swingbinding Highest Product jar package name swingbinding Highest Product pom parent-artifactid betterbeansbinding Medium Product Manifest implementation-build unknown Low Product pom groupid it.tidalwave.betterbeansbinding Highest Product Manifest bundle-docurl http://www.tidalwave.it Low Version file version 1.3.0 High Version Manifest Bundle-Version 1.3.0 High Version pom version 1.3.0 Highest
bsh-2.0b4.jarDescription:
BeanShell File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/beanshell/bsh/2.0b4/bsh-2.0b4.jarMD5: a1c60aa83c9c9a6cb2391c1c1b85eb00SHA1: a05f0a0feefa8d8467ac80e16e7de071489f0d9cSHA256: 91395c07885839a8c6986d5b7c577cd9bacf01bf129c89141f35e8ea858427b6Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor hint analyzer vendor beanshell_project Highest Vendor file name bsh High Vendor pom groupid beanshell Highest Vendor Manifest specification-vendor http://www.beanshell.org/ Low Vendor jar package name bsh Highest Vendor pom parent-groupid org.beanshell Medium Vendor Manifest Implementation-Vendor Pat Niemeyer (pat@pat.net) High Vendor pom parent-artifactid beanshell Low Vendor pom artifactid bsh Low Vendor jar package name org Highest Vendor pom name BeanShell High Vendor pom groupid org.beanshell Highest Product file name bsh High Product pom parent-groupid org.beanshell Medium Product pom groupid beanshell Highest Product pom artifactid bsh Highest Product jar package name bsh Highest Product pom parent-artifactid beanshell Medium Product Manifest specification-title BeanShell Medium Product jar package name org Highest Product hint analyzer product beanshell Highest Product pom name BeanShell High Version pom version 2.0b4 Highest
Published Vulnerabilities CVE-2016-2510 suppress
BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler. CWE-19 Data Processing Errors
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
byte-buddy-1.10.20.jarDescription:
Byte Buddy is a Java library for creating Java classes at run time.
This artifact is a build of Byte Buddy with all ASM dependencies repackaged into its own name space.
License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy/1.10.20/byte-buddy-1.10.20.jar
MD5: d158464cbd647e92a6493f608bb3b985
SHA1: c5d2d12c75c5d52f8df33f4211e6dbd05a42b117
SHA256: 5fcad05da791e9a22811c255a4a74b7ea094b7243d9dbf3e6fc578c8c94290ac
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom parent-artifactid byte-buddy-parent Low Vendor jar package name build Highest Vendor Manifest bundle-symbolicname net.bytebuddy.byte-buddy Medium Vendor pom name Byte Buddy (without dependencies) High Vendor jar package name bytebuddy Highest Vendor file name byte-buddy High Vendor jar package name asm Highest Vendor pom groupid net.bytebuddy Highest Vendor jar package name net Highest Vendor Manifest multi-release true Low Vendor pom artifactid byte-buddy Low Product pom name Byte Buddy (without dependencies) High Product file name byte-buddy High Product jar package name asm Highest Product pom artifactid byte-buddy Highest Product jar package name net Highest Product Manifest multi-release true Low Product pom groupid net.bytebuddy Highest Product Manifest Bundle-Name Byte Buddy (without dependencies) Medium Product jar package name build Highest Product Manifest bundle-symbolicname net.bytebuddy.byte-buddy Medium Product jar package name bytebuddy Highest Product pom parent-artifactid byte-buddy-parent Medium Version pom version 1.10.20 Highest Version Manifest Bundle-Version 1.10.20 High Version file version 1.10.20 High
byte-buddy-1.10.20.jar (shaded: net.bytebuddy:byte-buddy-dep:1.10.20)Description:
Byte Buddy is a Java library for creating Java classes at run time.
This artifact is a build of Byte Buddy with a remaining dependency onto ASM.
You should never depend on this module without repackaging Byte Buddy and ASM into your own namespace.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy/1.10.20/byte-buddy-1.10.20.jar/META-INF/maven/net.bytebuddy/byte-buddy-dep/pom.xmlMD5: ff053762ee21489bdc49a39082536debSHA1: 180120a8eaf360c106ee4bf5bbe732a83a9376f3SHA256: a1a7b34c16b26ff06eaed38d9d16a712f3fe8b48a3d23567437daacac19557b0Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom parent-artifactid byte-buddy-parent Low Vendor pom artifactid byte-buddy-dep Low Vendor pom name Byte Buddy (with dependencies) High Vendor pom groupid net.bytebuddy Highest Product pom name Byte Buddy (with dependencies) High Product pom artifactid byte-buddy-dep Highest Product pom groupid net.bytebuddy Highest Product pom parent-artifactid byte-buddy-parent Medium Version pom version 1.10.20 Highest
byte-buddy-1.11.22.jarDescription:
Byte Buddy is a Java library for creating Java classes at run time.
This artifact is a build of Byte Buddy with all ASM dependencies repackaged into its own name space.
License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy/1.11.22/byte-buddy-1.11.22.jar
MD5: a3f78063338fae42edff11c2d7503a76
SHA1: 8b4c7fa5562a09da1c2a9ab0873cb51f5034d83f
SHA256: d95656262ebce2fbff31b8c041af7170ad8a3cee843cec8f75cdb21f20b4bd96
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom parent-artifactid byte-buddy-parent Low Vendor jar package name build Highest Vendor Manifest bundle-symbolicname net.bytebuddy.byte-buddy Medium Vendor pom name Byte Buddy (without dependencies) High Vendor jar package name bytebuddy Highest Vendor file name byte-buddy High Vendor jar package name asm Highest Vendor pom groupid net.bytebuddy Highest Vendor jar package name net Highest Vendor Manifest multi-release true Low Vendor pom artifactid byte-buddy Low Product pom name Byte Buddy (without dependencies) High Product file name byte-buddy High Product jar package name asm Highest Product pom artifactid byte-buddy Highest Product jar package name net Highest Product Manifest multi-release true Low Product pom groupid net.bytebuddy Highest Product Manifest Bundle-Name Byte Buddy (without dependencies) Medium Product jar package name build Highest Product Manifest bundle-symbolicname net.bytebuddy.byte-buddy Medium Product jar package name bytebuddy Highest Product pom parent-artifactid byte-buddy-parent Medium Version Manifest Bundle-Version 1.11.22 High Version file version 1.11.22 High Version pom version 1.11.22 Highest
byte-buddy-1.11.22.jar (shaded: net.bytebuddy:byte-buddy-dep:1.11.22)Description:
Byte Buddy is a Java library for creating Java classes at run time.
This artifact is a build of Byte Buddy with a remaining dependency onto ASM.
You should never depend on this module without repackaging Byte Buddy and ASM into your own namespace.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy/1.11.22/byte-buddy-1.11.22.jar/META-INF/maven/net.bytebuddy/byte-buddy-dep/pom.xmlMD5: 8855d3bb1ab593992da3a9a255b93031SHA1: d278d77d994f02da86d5216f5b7e4663915645cfSHA256: 814bae0b13923f8fea2e78128b044c862e9c61b83bfa42f72c25b4d34b81f4e5Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom parent-artifactid byte-buddy-parent Low Vendor pom artifactid byte-buddy-dep Low Vendor pom name Byte Buddy (with dependencies) High Vendor pom groupid net.bytebuddy Highest Product pom name Byte Buddy (with dependencies) High Product pom artifactid byte-buddy-dep Highest Product pom groupid net.bytebuddy Highest Product pom parent-artifactid byte-buddy-parent Medium Version pom version 1.11.22 Highest
byte-buddy-agent-1.10.20.jarDescription:
The Byte Buddy agent offers convenience for attaching an agent to the local or a remote VM. License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/net/bytebuddy/byte-buddy-agent/1.10.20/byte-buddy-agent-1.10.20.jar
MD5: 9a19e38d298603d085f175401702f725
SHA1: 8391bfea9da53fd92edd4a453571ef70b3aae09f
SHA256: b592a6c43e752bf41659717956c57fbb790394d2ee5f8941876659f9c5c0e7e8
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.5))" Low Vendor Manifest can-set-native-method-prefix true Low Vendor Manifest bundle-symbolicname net.bytebuddy.byte-buddy-agent Medium Vendor pom artifactid byte-buddy-agent Low Vendor pom name Byte Buddy agent High Vendor jar package name agent Highest Vendor pom groupid net.bytebuddy Highest Vendor jar package name net Highest Vendor Manifest multi-release true Low Vendor file name byte-buddy-agent High Vendor Manifest can-redefine-classes true Low Vendor pom parent-artifactid byte-buddy-parent Low Vendor jar package name bytebuddy Highest Vendor Manifest can-retransform-classes true Low Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.5))" Low Product Manifest can-set-native-method-prefix true Low Product Manifest bundle-symbolicname net.bytebuddy.byte-buddy-agent Medium Product pom name Byte Buddy agent High Product jar package name agent Highest Product jar package name net Highest Product Manifest multi-release true Low Product pom groupid net.bytebuddy Highest Product file name byte-buddy-agent High Product Manifest can-redefine-classes true Low Product pom artifactid byte-buddy-agent Highest Product jar package name bytebuddy Highest Product Manifest can-retransform-classes true Low Product pom parent-artifactid byte-buddy-parent Medium Product Manifest Bundle-Name Byte Buddy agent Medium Version pom version 1.10.20 Highest Version Manifest Bundle-Version 1.10.20 High Version file version 1.10.20 High
classmate-1.5.1.jarDescription:
Library for introspecting types with full generic information
including resolving of field and method types.
License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/fasterxml/classmate/1.5.1/classmate-1.5.1.jar
MD5: e91fcd30ba329fd1b0b6dc5321fd067c
SHA1: 3fe0bed568c62df5e89f4f174c101eab25345b6c
SHA256: aab4de3006808c09d25dd4ff4a3611cfb63c95463cfd99e73d2e1680d229a33b
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor jar package name fasterxml Highest Vendor file name classmate High Vendor pom parent-artifactid oss-parent Low Vendor Manifest bundle-docurl https://github.com/FasterXML/java-classmate Low Vendor pom organization url https://fasterxml.com Medium Vendor jar package name classmate Highest Vendor Manifest Implementation-Vendor-Id com.fasterxml Medium Vendor Manifest specification-vendor fasterxml.com Low Vendor pom organization name fasterxml.com High Vendor Manifest bundle-symbolicname com.fasterxml.classmate Medium Vendor Manifest Implementation-Vendor fasterxml.com High Vendor pom groupid fasterxml Highest Vendor pom name ClassMate High Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.6))" Low Vendor pom parent-groupid com.fasterxml Medium Vendor pom url FasterXML/java-classmate Highest Vendor Manifest implementation-build-date 2019-10-19 22:46:35+0000 Low Vendor jar package name types Highest Vendor pom groupid com.fasterxml Highest Vendor Manifest automatic-module-name com.fasterxml.classmate Medium Vendor pom artifactid classmate Low Product jar package name fasterxml Highest Product jar package name filter Highest Product pom artifactid classmate Highest Product pom organization url https://fasterxml.com Low Product Manifest Implementation-Title ClassMate High Product pom url FasterXML/java-classmate High Product file name classmate High Product Manifest Bundle-Name ClassMate Medium Product pom organization name fasterxml.com Low Product Manifest bundle-docurl https://github.com/FasterXML/java-classmate Low Product jar package name classmate Highest Product Manifest bundle-symbolicname com.fasterxml.classmate Medium Product pom groupid fasterxml Highest Product pom name ClassMate High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.6))" Low Product Manifest specification-title ClassMate Medium Product pom parent-groupid com.fasterxml Medium Product jar package name types Highest Product Manifest implementation-build-date 2019-10-19 22:46:35+0000 Low Product pom parent-artifactid oss-parent Medium Product Manifest automatic-module-name com.fasterxml.classmate Medium Version file version 1.5.1 High Version pom version 1.5.1 Highest Version pom parent-version 1.5.1 Low Version Manifest Bundle-Version 1.5.1 High Version Manifest Implementation-Version 1.5.1 High
h2-2.1.214.jarDescription:
H2 Database Engine License:
MPL 2.0: https://www.mozilla.org/en-US/MPL/2.0/
EPL 1.0: https://opensource.org/licenses/eclipse-1.0.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/h2database/h2/2.1.214/h2-2.1.214.jar
MD5: 93628fb706e682dd989f697394039025
SHA1: d5c2005c9e3279201e12d4776c948578b16bf8b2
SHA256: d623cdc0f61d218cf549a8d09f1c391ff91096116b22e2475475fce4fbe72bd0
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest implementation-url https://h2database.com Low Vendor Manifest automatic-module-name com.h2database Medium Vendor Manifest provide-capability osgi.service;objectClass:List=org.osgi.service.jdbc.DataSourceFactory Low Vendor Manifest bundle-symbolicname com.h2database Medium Vendor jar package name database Highest Vendor pom name H2 Database Engine High Vendor Manifest multi-release true Low Vendor pom groupid h2database Highest Vendor pom artifactid h2 Low Vendor Manifest bundle-category jdbc Low Vendor file name h2 High Vendor jar package name engine Highest Vendor pom url https://h2database.com Highest Vendor pom groupid com.h2database Highest Vendor jar package name h2 Highest Product Manifest implementation-url https://h2database.com Low Product Manifest automatic-module-name com.h2database Medium Product Manifest provide-capability osgi.service;objectClass:List=org.osgi.service.jdbc.DataSourceFactory Low Product Manifest bundle-symbolicname com.h2database Medium Product jar package name database Highest Product pom name H2 Database Engine High Product jar package name jdbc Highest Product Manifest multi-release true Low Product pom groupid h2database Highest Product Manifest bundle-category jdbc Low Product pom url https://h2database.com Medium Product file name h2 High Product jar package name engine Highest Product pom artifactid h2 Highest Product Manifest Bundle-Name H2 Database Engine Medium Product jar package name org Highest Product jar package name service Highest Product Manifest Implementation-Title H2 Database Engine High Product jar package name h2 Highest Version file version 2.1.214 High Version pom version 2.1.214 Highest Version Manifest Bundle-Version 2.1.214 High Version Manifest Implementation-Version 2.1.214 High
Published Vulnerabilities CVE-2022-45868 suppress
The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that." CWE-312 Cleartext Storage of Sensitive Information
CVSSv3:
Base Score: HIGH (7.8) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
h2-2.1.214.jar: data.zip: table.jsFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/h2database/h2/2.1.214/h2-2.1.214.jar/org/h2/util/data.zip/org/h2/server/web/res/table.jsMD5: 1c37e9e03787c821410ce684efa8feb7SHA1: 3377bc4afb4fa0aeaa4fff9098ebb4446fa5be99SHA256: 07e1b3fc6feb8a8713b6659fc047cd9177d85b22f4bb0fa857be1c81786db701Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence
h2-2.1.214.jar: data.zip: tree.jsFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/h2database/h2/2.1.214/h2-2.1.214.jar/org/h2/util/data.zip/org/h2/server/web/res/tree.jsMD5: 4303428a5a49c1ae6c87a5dde9b4c9c3SHA1: 9bca06117ddee5657dbe89eea197372128fe56e9SHA256: 1d5c4ba3b1a5dfcfe250fba716b55a9a7d0ffe624fc480713ff782c4d671836fReferenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence
hamcrest-core-1.3.jarDescription:
This is the core API of hamcrest matcher framework to be used by third-party framework providers. This includes the a foundation set of matcher implementations for common operations.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jarMD5: 6393363b47ddcbba82321110c3e07519SHA1: 42a25dc3219429f0e5d060061f71acb49bf010a0SHA256: 66fdef91e9739348df7a096aa384a5685f4e875584cce89386a7a47251c4d8e9Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom groupid hamcrest Highest Vendor pom parent-groupid org.hamcrest Medium Vendor pom parent-artifactid hamcrest-parent Low Vendor Manifest built-date 2012-07-09 19:49:34 Low Vendor file name hamcrest-core High Vendor jar package name core Highest Vendor jar package name matcher Highest Vendor Manifest Implementation-Vendor hamcrest.org High Vendor pom groupid org.hamcrest Highest Vendor pom artifactid hamcrest-core Low Vendor jar package name hamcrest Highest Vendor pom name Hamcrest Core High Product pom parent-artifactid hamcrest-parent Medium Product pom groupid hamcrest Highest Product pom parent-groupid org.hamcrest Medium Product Manifest built-date 2012-07-09 19:49:34 Low Product file name hamcrest-core High Product jar package name core Highest Product jar package name hamcrest Highest Product jar package name matcher Highest Product pom artifactid hamcrest-core Highest Product pom name Hamcrest Core High Product Manifest Implementation-Title hamcrest-core High Version pom version 1.3 Highest Version file version 1.3 High Version Manifest Implementation-Version 1.3 High
hibernate-commons-annotations-5.1.2.Final.jarDescription:
Common reflection code used in support of annotation processing License:
GNU Library General Public License v2.1 or later: http://www.opensource.org/licenses/LGPL-2.1 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/hibernate/common/hibernate-commons-annotations/5.1.2.Final/hibernate-commons-annotations-5.1.2.Final.jar
MD5: 2a2490b3eb8e7585a6a899d27d7ed43f
SHA1: e59ffdbc6ad09eeb33507b39ffcf287679a498c8
SHA256: 1c7ce712b2679fea0a5441eb02a04144297125b768944819be0765befb996275
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom organization name Hibernate.org High Vendor Manifest implementation-url http://hibernate.org Low Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor pom name Hibernate Commons Annotations High Vendor jar package name annotations Highest Vendor Manifest Implementation-Vendor-Id org.hibernate Medium Vendor pom organization url http://hibernate.org Medium Vendor Manifest bundle-symbolicname org.hibernate.common.hibernate-commons-annotations Medium Vendor jar package name reflection Highest Vendor Manifest automatic-module-name org.hibernate.commons.annotations Medium Vendor file name hibernate-commons-annotations High Vendor jar package name common Highest Vendor hint analyzer vendor redhat Highest Vendor Manifest Implementation-Vendor Hibernate.org High Vendor pom url http://hibernate.org Highest Vendor pom groupid org.hibernate.common Highest Vendor jar package name hibernate Highest Vendor pom groupid hibernate.common Highest Vendor pom artifactid hibernate-commons-annotations Low Product Manifest implementation-url http://hibernate.org Low Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product pom name Hibernate Commons Annotations High Product jar package name annotations Highest Product pom organization url http://hibernate.org Low Product Manifest bundle-symbolicname org.hibernate.common.hibernate-commons-annotations Medium Product jar package name reflection Highest Product pom url http://hibernate.org Medium Product Manifest automatic-module-name org.hibernate.commons.annotations Medium Product pom organization name Hibernate.org Low Product file name hibernate-commons-annotations High Product Manifest Bundle-Name hibernate-commons-annotations Medium Product jar package name common Highest Product pom artifactid hibernate-commons-annotations Highest Product jar package name version Highest Product jar package name hibernate Highest Product pom groupid hibernate.common Highest Version pom version 5.1.2.Final Highest Version Manifest Bundle-Version 5.1.2.Final High Version Manifest Implementation-Version 5.1.2.Final High
hibernate-core-5.6.3.Final.jarDescription:
Hibernate's core ORM functionality License:
GNU Library General Public License v2.1 or later: https://www.opensource.org/licenses/LGPL-2.1 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/hibernate/hibernate-core/5.6.3.Final/hibernate-core-5.6.3.Final.jar
MD5: 7f938eeda4bf347377081bb556c0632f
SHA1: a2420e0a2c9c168c029584aecf6a5b9a2475cd10
SHA256: e535a9df6892d3fe5abf696490b3b0781e9fa2c0c9d0d1f9b8c88ad38d2000c5
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom organization name Hibernate.org High Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest specification-vendor Hibernate.org Low Vendor Manifest bundle-docurl https://hibernate.org/orm/5.6 Low Vendor pom artifactid hibernate-core Low Vendor pom groupid hibernate Highest Vendor Manifest Implementation-Vendor-Id org.hibernate Medium Vendor Manifest implementation-url https://hibernate.org/orm Low Vendor pom organization url https://hibernate.org Medium Vendor Manifest automatic-module-name org.hibernate.orm.core Medium Vendor Manifest bundle-symbolicname org.hibernate.orm.core Medium Vendor hint analyzer vendor redhat Highest Vendor pom groupid org.hibernate Highest Vendor Manifest Implementation-Vendor Hibernate.org High Vendor file name hibernate-core High Vendor pom name Hibernate ORM - hibernate-core High Vendor jar package name hibernate Highest Vendor pom url https://hibernate.org/orm Highest Product jar package name filter Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-docurl https://hibernate.org/orm/5.6 Low Product pom groupid hibernate Highest Product Manifest implementation-url https://hibernate.org/orm Low Product Manifest specification-title hibernate-core Medium Product Manifest automatic-module-name org.hibernate.orm.core Medium Product pom organization url https://hibernate.org Low Product pom artifactid hibernate-core Highest Product Manifest Implementation-Title hibernate-core High Product pom url https://hibernate.org/orm Medium Product pom organization name Hibernate.org Low Product Manifest bundle-symbolicname org.hibernate.orm.core Medium Product file name hibernate-core High Product hint analyzer product orm Highest Product Manifest Bundle-Name hibernate-core Medium Product pom name Hibernate ORM - hibernate-core High Product jar package name version Highest Product jar package name hibernate Highest Version pom version 5.6.3.Final Highest Version Manifest Implementation-Version 5.6.3.Final High Version Manifest Bundle-Version 5.6.3.Final High
Related Dependencies hibernate-entitymanager-5.6.3.Final.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/hibernate/hibernate-entitymanager/5.6.3.Final/hibernate-entitymanager-5.6.3.Final.jar MD5: 1a5cdf4ccfe544aab46d165a5cb65d05 SHA1: 82fcf63c6dae61a03f5c54fd61e62804659a396d SHA256: d4ff808134addbfe7fa17a64408d3903f22901dfcd64dd42b33396e32e414978 pkg:maven/org.hibernate/hibernate-entitymanager@5.6.3.Final istack-commons-runtime-3.0.12.jarDescription:
istack common utility code License:
http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/sun/istack/istack-commons-runtime/3.0.12/istack-commons-runtime-3.0.12.jar
MD5: 1952bd76321f8580cfaa57e332a68287
SHA1: cbbe1a62b0cc6c85972e99d52aaee350153dc530
SHA256: 27d85fc134c9271d5c79d3300fc4669668f017e72409727c428f54f2417f04cd
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor pom artifactid istack-commons-runtime Low Vendor jar (hint) package name oracle Highest Vendor pom parent-artifactid istack-commons Low Vendor pom parent-groupid com.sun.istack Medium Vendor pom name istack common utility code runtime High Vendor file name istack-commons-runtime High Vendor Manifest Implementation-Vendor-Id com.sun.istack Medium Vendor jar package name sun Highest Vendor Manifest multi-release true Low Vendor pom groupid sun.istack Highest Vendor jar package name com Highest Vendor pom groupid com.sun.istack Highest Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor Manifest bundle-symbolicname com.sun.istack.commons-runtime Medium Vendor jar package name istack Highest Vendor Manifest implementation-build-id 3.0.12 - 7ed1368 Low Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-docurl https://www.eclipse.org Low Product pom parent-groupid com.sun.istack Medium Product pom name istack common utility code runtime High Product pom parent-artifactid istack-commons Medium Product file name istack-commons-runtime High Product jar package name sun Highest Product Manifest multi-release true Low Product pom groupid sun.istack Highest Product jar package name com Highest Product Manifest Bundle-Name istack common utility code runtime Medium Product pom artifactid istack-commons-runtime Highest Product Manifest bundle-symbolicname com.sun.istack.commons-runtime Medium Product jar package name istack Highest Product Manifest implementation-build-id 3.0.12 - 7ed1368 Low Version file version 3.0.12 High Version pom version 3.0.12 Highest Version Manifest implementation-build-id 3.0.12 Low Version Manifest Bundle-Version 3.0.12 High
it-tidalwave-messagebus-3.2-ALPHA-15.jarDescription:
An abstract description of a simple message bus to be used within an application.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-messagebus/3.2-ALPHA-15/it-tidalwave-messagebus-3.2-ALPHA-15.jarMD5: 14246d49f8d266b34b4fdb8840f32cb3SHA1: a77833e4b7bfdd8d48fde4c60f418ebddb51b465SHA256: 8269499db1699ec37fe7f64bc7375641728fa172d8e5a87afe4861828a382cc1Referenced In Projects/Scopes:
TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile Evidence Type Source Name Value Confidence Vendor pom name TheseFoolishThings :: MessageBus High Vendor file name it-tidalwave-messagebus High Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor pom parent-artifactid modules Low Vendor Manifest build-jdk-spec 11 Low Vendor jar package name tidalwave Highest Vendor jar package name messagebus Highest Vendor pom artifactid it-tidalwave-messagebus Low Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor jar package name it Highest Product pom name TheseFoolishThings :: MessageBus High Product pom artifactid it-tidalwave-messagebus Highest Product Manifest Implementation-Title TheseFoolishThings :: MessageBus High Product file name it-tidalwave-messagebus High Product pom groupid it.tidalwave.thesefoolishthings Highest Product Manifest specification-title TheseFoolishThings :: MessageBus Medium Product pom parent-artifactid modules Medium Product Manifest build-jdk-spec 11 Low Product jar package name messagebus Highest Product jar package name tidalwave Highest Product jar package name it Highest Version pom version 3.2-ALPHA-15 Highest
it-tidalwave-role-3.2-ALPHA-15.jarDescription:
Roles are a powerful way for designing complex behaviours while keeping good practices such as Single Responsibility, Dependency Inversion and
Interface Segregation.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-role/3.2-ALPHA-15/it-tidalwave-role-3.2-ALPHA-15.jarMD5: e260f5f90e9387cd1f2c4fde7f5e16f1SHA1: affd3b2e8d9d5fd591fbdfd19729591f125d2e4aSHA256: 26a051accc4c46134877141e4a69fd67175b3e3df1b34962c462f1df6d57e5c6Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom artifactid it-tidalwave-role Low Vendor pom name TheseFoolishThings :: Roles High Vendor file name it-tidalwave-role High Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor pom parent-artifactid modules Low Vendor jar package name role Highest Vendor Manifest build-jdk-spec 11 Low Vendor jar package name tidalwave Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor jar package name it Highest Product Manifest Implementation-Title TheseFoolishThings :: Roles High Product pom name TheseFoolishThings :: Roles High Product pom artifactid it-tidalwave-role Highest Product file name it-tidalwave-role High Product pom groupid it.tidalwave.thesefoolishthings Highest Product jar package name role Highest Product Manifest specification-title TheseFoolishThings :: Roles Medium Product pom parent-artifactid modules Medium Product Manifest build-jdk-spec 11 Low Product jar package name tidalwave Highest Product jar package name it Highest Version pom version 3.2-ALPHA-15 Highest
it-tidalwave-role-spring-3.2-ALPHA-15.jarDescription:
Specific Spring support for DCI roles.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-role-spring/3.2-ALPHA-15/it-tidalwave-role-spring-3.2-ALPHA-15.jarMD5: 9a0e754d537ea3a42b97cd8774dfe538SHA1: bd2201a3df2e583023e6237d01b8e204cc8cdcfeSHA256: 8c11804303b97fd9cce9c237818b768781e155105594dbe6157ca77b2e286ac8Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor jar package name spring Highest Vendor pom name TheseFoolishThings :: Roles :: Spring High Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor jar package name role Highest Vendor file name it-tidalwave-role-spring High Vendor jar package name tidalwave Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor jar package name it Highest Vendor pom artifactid it-tidalwave-role-spring Low Vendor pom parent-artifactid modules Low Vendor Manifest build-jdk-spec 11 Low Product jar package name spring Highest Product pom name TheseFoolishThings :: Roles :: Spring High Product pom groupid it.tidalwave.thesefoolishthings Highest Product jar package name role Highest Product file name it-tidalwave-role-spring High Product pom parent-artifactid modules Medium Product jar package name tidalwave Highest Product pom artifactid it-tidalwave-role-spring Highest Product jar package name it Highest Product Manifest Implementation-Title TheseFoolishThings :: Roles :: Spring High Product Manifest build-jdk-spec 11 Low Product Manifest specification-title TheseFoolishThings :: Roles :: Spring Medium Version pom version 3.2-ALPHA-15 Highest
it-tidalwave-thesefoolishthings-examples-data-3.2-ALPHA-15.jarDescription:
This module provides sample data structures used by other examples.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-thesefoolishthings-examples-data/3.2-ALPHA-15/it-tidalwave-thesefoolishthings-examples-data-3.2-ALPHA-15.jarMD5: ba91ab4898c1830f63349e650e031503SHA1: 7f93e4da998b4e3a621916a096a3ed566f927a32SHA256: 3dce557e5b5637da2dfb3ba12cc54c7cc6caf4ceba64a8a616d47318a92e80b3Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor jar package name examples Highest Vendor jar package name thesefoolishthings Highest Vendor pom name TheseFoolishThings :: Examples :: Data High Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor pom artifactid it-tidalwave-thesefoolishthings-examples-data Low Vendor jar package name tidalwave Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor jar package name it Highest Vendor file name it-tidalwave-thesefoolishthings-examples-data High Vendor pom parent-artifactid thesefoolishthings-examples Low Vendor Manifest build-jdk-spec 11 Low Product jar package name examples Highest Product jar package name thesefoolishthings Highest Product pom name TheseFoolishThings :: Examples :: Data High Product pom groupid it.tidalwave.thesefoolishthings Highest Product Manifest specification-title TheseFoolishThings :: Examples :: Data Medium Product jar package name tidalwave Highest Product jar package name it Highest Product file name it-tidalwave-thesefoolishthings-examples-data High Product Manifest Implementation-Title TheseFoolishThings :: Examples :: Data High Product pom parent-artifactid thesefoolishthings-examples Medium Product pom artifactid it-tidalwave-thesefoolishthings-examples-data Highest Product Manifest build-jdk-spec 11 Low Version pom version 3.2-ALPHA-15 Highest
it-tidalwave-thesefoolishthings-examples-finderexample1-3.2-ALPHA-15.jarDescription:
A simple example of Finder usage.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-thesefoolishthings-examples-finderexample1/3.2-ALPHA-15/it-tidalwave-thesefoolishthings-examples-finderexample1-3.2-ALPHA-15.jarMD5: 694f36b5562995f06a867238ffe6003fSHA1: 62299c4b1bc09ef87b836dfcdeb1f4ca25c990a2SHA256: b2cc7cd03063df69a4f887eb44550d5fc9a29981ba7559e4f1906b6c8a58608dReferenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile
Evidence Type Source Name Value Confidence Vendor pom artifactid it-tidalwave-thesefoolishthings-examples-finderexample1 Low Vendor jar package name examples Highest Vendor jar package name thesefoolishthings Highest Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor pom name TheseFoolishThings :: Examples :: Finder :: In-memory Finder High Vendor jar package name tidalwave Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor jar package name it Highest Vendor file name it-tidalwave-thesefoolishthings-examples-finderexample1 High Vendor pom parent-artifactid thesefoolishthings-examples Low Vendor Manifest build-jdk-spec 11 Low Product jar package name examples Highest Product jar package name thesefoolishthings Highest Product pom groupid it.tidalwave.thesefoolishthings Highest Product pom name TheseFoolishThings :: Examples :: Finder :: In-memory Finder High Product jar package name tidalwave Highest Product jar package name it Highest Product Manifest specification-title TheseFoolishThings :: Examples :: Finder :: In-memory Finder Medium Product pom artifactid it-tidalwave-thesefoolishthings-examples-finderexample1 Highest Product file name it-tidalwave-thesefoolishthings-examples-finderexample1 High Product pom parent-artifactid thesefoolishthings-examples Medium Product Manifest Implementation-Title TheseFoolishThings :: Examples :: Finder :: In-memory Finder High Product Manifest build-jdk-spec 11 Low Version pom version 3.2-ALPHA-15 Highest
it-tidalwave-util-3.2-ALPHA-15.jarDescription:
A collection of common utilities.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-util/3.2-ALPHA-15/it-tidalwave-util-3.2-ALPHA-15.jarMD5: 9ade695f2052c7ae7b93fe8e81c611a1SHA1: 137730418473d62260e4d61e256bd0952579fe10SHA256: 7c46053fd5c6c4a94ecdda3f1e61e8da3811c00ff58c2d8c931deb521e6eac53Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor file name it-tidalwave-util High Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor pom artifactid it-tidalwave-util Low Vendor jar package name util Highest Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor pom parent-artifactid modules Low Vendor Manifest build-jdk-spec 11 Low Vendor jar package name tidalwave Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor jar package name it Highest Vendor pom name TheseFoolishThings :: Utilities High Product file name it-tidalwave-util High Product Manifest Implementation-Title TheseFoolishThings :: Utilities High Product jar package name util Highest Product pom groupid it.tidalwave.thesefoolishthings Highest Product pom artifactid it-tidalwave-util Highest Product pom parent-artifactid modules Medium Product Manifest build-jdk-spec 11 Low Product jar package name tidalwave Highest Product Manifest specification-title TheseFoolishThings :: Utilities Medium Product jar package name it Highest Product pom name TheseFoolishThings :: Utilities High Version pom version 3.2-ALPHA-15 Highest
it-tidalwave-util-test-3.2-ALPHA-15.jarDescription:
Miscellaneous utilities for testing.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/it/tidalwave/thesefoolishthings/it-tidalwave-util-test/3.2-ALPHA-15/it-tidalwave-util-test-3.2-ALPHA-15.jarMD5: ed143036fab5e4c5fd8c7eb3992aeee5SHA1: a977e08e5db7a59341ebc381cc1e00f3f84fbf5dSHA256: 13634e99ba472d7f35ec3da6794c22ed3a0a766cd66c4bf64851027897a246e4Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile Evidence Type Source Name Value Confidence Vendor Manifest Implementation-Vendor Tidalwave s.a.s. High Vendor pom groupid it.tidalwave.thesefoolishthings Highest Vendor jar package name tidalwave Highest Vendor jar package name test Highest Vendor Manifest specification-vendor Tidalwave s.a.s. Low Vendor jar package name it Highest Vendor pom artifactid it-tidalwave-util-test Low Vendor jar package name util Highest Vendor pom parent-artifactid modules Low Vendor pom name TheseFoolishThings :: Test Utilities High Vendor Manifest build-jdk-spec 11 Low Vendor file name it-tidalwave-util-test High Product pom artifactid it-tidalwave-util-test Highest Product Manifest specification-title TheseFoolishThings :: Test Utilities Medium Product Manifest Implementation-Title TheseFoolishThings :: Test Utilities High Product pom groupid it.tidalwave.thesefoolishthings Highest Product pom parent-artifactid modules Medium Product jar package name test Highest Product jar package name tidalwave Highest Product jar package name it Highest Product jar package name util Highest Product pom name TheseFoolishThings :: Test Utilities High Product Manifest build-jdk-spec 11 Low Product file name it-tidalwave-util-test High Version pom version 3.2-ALPHA-15 Highest
jakarta.activation-1.2.2.jarDescription:
Jakarta Activation License:
http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/sun/activation/jakarta.activation/1.2.2/jakarta.activation-1.2.2.jar
MD5: 0b8bee3bf29b9a015f8b992035581a7c
SHA1: 74548703f9851017ce2f556066659438019e7eb5
SHA256: 02156773e4ae9d048d14a56ad35d644bee9f1052a791d072df3ded3c656e6e1a
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:runtime TheseFoolishThings :: Examples :: DCI :: Persistence JPA:runtime Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=9.0))" Low Vendor pom parent-artifactid all Low Vendor Manifest Implementation-Vendor-Id com.sun Medium Vendor pom groupid com.sun.activation Highest Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor jar (hint) package name oracle Highest Vendor jar package name sun Highest Vendor pom name Jakarta Activation High Vendor jar package name activation Highest Vendor pom groupid sun.activation Highest Vendor Manifest extension-name jakarta.activation Medium Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor pom artifactid jakarta.activation Low Vendor pom parent-groupid com.sun.activation Medium Vendor file name jakarta.activation High Vendor Manifest bundle-symbolicname com.sun.activation.jakarta.activation Medium Vendor Manifest specification-vendor Eclipse Foundation Low Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=9.0))" Low Product Manifest specification-title Jakarta Activation Specification Medium Product Manifest bundle-docurl https://www.eclipse.org Low Product jar package name sun Highest Product pom name Jakarta Activation High Product jar package name activation Highest Product pom groupid sun.activation Highest Product Manifest extension-name jakarta.activation Medium Product Manifest Implementation-Title javax.activation High Product jar package name javax Highest Product pom parent-artifactid all Medium Product pom parent-groupid com.sun.activation Medium Product file name jakarta.activation High Product Manifest bundle-symbolicname com.sun.activation.jakarta.activation Medium Product pom artifactid jakarta.activation Highest Product Manifest Bundle-Name Jakarta Activation Medium Version pom version 1.2.2 Highest Version file version 1.2.2 High Version Manifest Bundle-Version 1.2.2 High Version Manifest Implementation-Version 1.2.2 High
jakarta.annotation-api-1.3.5.jarDescription:
Jakarta Annotations API License:
EPL 2.0: http://www.eclipse.org/legal/epl-2.0
GPL2 w/ CPE: https://www.gnu.org/software/classpath/license.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/jakarta/annotation/jakarta.annotation-api/1.3.5/jakarta.annotation-api-1.3.5.jar
MD5: 8b165cf58df5f8c2a222f637c0a07c97
SHA1: 59eb84ee0d616332ff44aba065f3888cf002cd2d
SHA256: 85fb03fc054cdf4efca8efd9b6712bbb418e1ab98241c4539c8585bbc23e1b8a
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor jar package name annotation Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest extension-name jakarta.annotation Medium Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor pom groupid jakarta.annotation Highest Vendor pom parent-artifactid ca-parent Low Vendor file name jakarta.annotation-api High Vendor pom artifactid jakarta.annotation-api Low Vendor pom url https://projects.eclipse.org/projects/ee4j.ca Highest Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor Manifest automatic-module-name java.annotation Medium Vendor Manifest Implementation-Vendor-Id org.glassfish Medium Vendor Manifest bundle-symbolicname jakarta.annotation-api Medium Vendor Manifest specification-vendor Eclipse Foundation Low Vendor pom name Jakarta Annotations API High Product pom artifactid jakarta.annotation-api Highest Product jar package name annotation Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest extension-name jakarta.annotation Medium Product Manifest bundle-docurl https://www.eclipse.org Low Product pom groupid jakarta.annotation Highest Product file name jakarta.annotation-api High Product Manifest Bundle-Name Jakarta Annotations API Medium Product pom url https://projects.eclipse.org/projects/ee4j.ca Medium Product Manifest automatic-module-name java.annotation Medium Product Manifest bundle-symbolicname jakarta.annotation-api Medium Product pom parent-artifactid ca-parent Medium Product pom name Jakarta Annotations API High Version Manifest Implementation-Version 1.3.5 High Version Manifest Bundle-Version 1.3.5 High Version file version 1.3.5 High Version pom version 1.3.5 Highest
jakarta.persistence-api-2.2.3.jarDescription:
Jakarta Persistence 2.2 API jar License:
Eclipse Public License v. 2.0: http://www.eclipse.org/legal/epl-2.0
Eclipse Distribution License v. 1.0: http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/jakarta/persistence/jakarta.persistence-api/2.2.3/jakarta.persistence-api-2.2.3.jar
MD5: e0a655f398f8e68e0afebb0f71fba4e5
SHA1: 8f6ea5daedc614f07a3654a455660145286f024e
SHA256: 0c2d73ab36ad24eeed6e0bea928e9d0ef771de8df689e23b7754d366dda27c53
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor pom artifactid jakarta.persistence-api Low Vendor Manifest extension-name jakarta.persistence Medium Vendor pom parent-groupid org.eclipse.ee4j Medium Vendor Manifest automatic-module-name java.persistence Medium Vendor pom url eclipse-ee4j/jpa-api Highest Vendor file name jakarta.persistence-api High Vendor pom parent-artifactid project Low Vendor pom groupid jakarta.persistence Highest Vendor Manifest bundle-symbolicname jakarta.persistence-api Medium Vendor pom name Jakarta Persistence API High Vendor jar package name persistence Highest Vendor Manifest specification-vendor Eclipse Foundation Low Product Manifest bundle-docurl https://www.eclipse.org Low Product Manifest extension-name jakarta.persistence Medium Product pom parent-groupid org.eclipse.ee4j Medium Product Manifest Bundle-Name Jakarta Persistence API jar Medium Product pom artifactid jakarta.persistence-api Highest Product Manifest automatic-module-name java.persistence Medium Product file name jakarta.persistence-api High Product pom url eclipse-ee4j/jpa-api High Product pom groupid jakarta.persistence Highest Product pom parent-artifactid project Medium Product Manifest bundle-symbolicname jakarta.persistence-api Medium Product pom name Jakarta Persistence API High Product jar package name persistence Highest Version pom parent-version 2.2.3 Low Version Manifest Bundle-Version 2.2.3 High Version pom version 2.2.3 Highest Version file version 2.2.3 High Version Manifest Implementation-Version 2.2.3 High
jakarta.transaction-api-1.3.3.jarDescription:
Jakarta Transactions License:
EPL 2.0: http://www.eclipse.org/legal/epl-2.0
GPL2 w/ CPE: https://www.gnu.org/software/classpath/license.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/jakarta/transaction/jakarta.transaction-api/1.3.3/jakarta.transaction-api-1.3.3.jar
MD5: cc45726045cc9a0728f803f9db4c90c4
SHA1: c4179d48720a1e87202115fbed6089bdc4195405
SHA256: 0b02a194dd04ee2e192dc9da9579e10955dd6e8ac707adfc91d92f119b0e67ab
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom artifactid jakarta.transaction-api Low Vendor pom organization name EE4J Community High Vendor Manifest extension-name javax.transaction Medium Vendor pom parent-groupid org.eclipse.ee4j Medium Vendor Manifest bundle-docurl https://github.com/eclipse-ee4j Low Vendor jar package name transaction Highest Vendor Manifest Implementation-Vendor EE4J Community High Vendor file name jakarta.transaction-api High Vendor pom url https://projects.eclipse.org/projects/ee4j.jta Highest Vendor jar package name javax Highest Vendor pom organization url eclipse-ee4j Medium Vendor Manifest specification-vendor Oracle Corporation Low Vendor pom parent-artifactid project Low Vendor pom name ${extension.name} API High Vendor Manifest bundle-symbolicname jakarta.transaction-api Medium Vendor Manifest Implementation-Vendor-Id org.glassfish Medium Vendor pom groupid jakarta.transaction Highest Vendor Manifest automatic-module-name java.transaction Medium Product Manifest Bundle-Name javax.transaction API Medium Product Manifest extension-name javax.transaction Medium Product pom parent-groupid org.eclipse.ee4j Medium Product Manifest bundle-docurl https://github.com/eclipse-ee4j Low Product jar package name transaction Highest Product file name jakarta.transaction-api High Product pom artifactid jakarta.transaction-api Highest Product pom url https://projects.eclipse.org/projects/ee4j.jta Medium Product jar package name javax Highest Product pom organization name EE4J Community Low Product pom name ${extension.name} API High Product Manifest bundle-symbolicname jakarta.transaction-api Medium Product pom parent-artifactid project Medium Product pom url eclipse-ee4j High Product Manifest automatic-module-name java.transaction Medium Product pom groupid jakarta.transaction Highest Version Manifest Bundle-Version 1.3.3 High Version Manifest Implementation-Version 1.3.3 High Version pom parent-version 1.3.3 Low Version pom version 1.3.3 Highest Version file version 1.3.3 High
jakarta.xml.bind-api-2.3.3.jarDescription:
Jakarta XML Binding API 2.3 Design Specification License:
http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/jakarta/xml/bind/jakarta.xml.bind-api/2.3.3/jakarta.xml.bind-api-2.3.3.jar
MD5: 61286918ca0192e9f87d1358aef718dd
SHA1: 48e3b9cfc10752fba3521d6511f4165bea951801
SHA256: c04539f472e9a6dd0c7685ea82d677282269ab8e7baca2e14500e381e0c6cec5
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor jar package name bind Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor pom artifactid jakarta.xml.bind-api Low Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor pom name Jakarta XML Binding API High Vendor Manifest multi-release true Low Vendor Manifest extension-name jakarta.xml.bind Medium Vendor pom parent-artifactid jakarta.xml.bind-api-parent Low Vendor pom groupid jakarta.xml.bind Highest Vendor jar package name xml Highest Vendor Manifest bundle-symbolicname jakarta.xml.bind-api Medium Vendor file name jakarta.xml.bind-api High Vendor Manifest implementation-build-id 2.3.3-RELEASE-fd06b2b Low Vendor Manifest build-jdk-spec 11 Low Vendor Manifest specification-vendor Eclipse Foundation Low Product jar package name bind Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-docurl https://www.eclipse.org Low Product pom parent-artifactid jakarta.xml.bind-api-parent Medium Product pom name Jakarta XML Binding API High Product Manifest multi-release true Low Product Manifest extension-name jakarta.xml.bind Medium Product pom groupid jakarta.xml.bind Highest Product jar package name xml Highest Product pom artifactid jakarta.xml.bind-api Highest Product Manifest bundle-symbolicname jakarta.xml.bind-api Medium Product file name jakarta.xml.bind-api High Product Manifest implementation-build-id 2.3.3-RELEASE-fd06b2b Low Product Manifest Bundle-Name Jakarta XML Binding API Medium Product Manifest build-jdk-spec 11 Low Version Manifest Bundle-Version 2.3.3 High Version Manifest Implementation-Version 2.3.3 High Version file version 2.3.3 High Version pom version 2.3.3 Highest
jandex-2.2.3.Final.jarDescription:
Parent POM for JBoss projects. Provides default project build configuration. License:
Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/jboss/jandex/2.2.3.Final/jandex-2.2.3.Final.jar
MD5: 721b5868cfbb718dd97facc96929dde8
SHA1: d3865101f0666b63586683bd811d754517f331ab
SHA256: 0544d55ec0cb378fd8f3b20e66277f893f3094cb67e71a1ec0cce6ce150f83b3
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest bundle-symbolicname org.jboss.jandex Medium Vendor Manifest java-vendor AdoptOpenJDK Medium Vendor pom artifactid jandex Low Vendor pom parent-artifactid jboss-parent Low Vendor Manifest bundle-docurl http://www.jboss.org Low Vendor Manifest automatic-module-name org.jboss.jandex Medium Vendor file name jandex High Vendor Manifest os-name Mac OS X Medium Vendor Manifest build-timestamp Fri, 22 Jan 2021 15:14:59 -0600 Low Vendor Manifest Implementation-Vendor-Id org.jboss Medium Vendor jar package name indexer Highest Vendor Manifest os-arch x86_64 Low Vendor Manifest specification-vendor JBoss by Red Hat Low Vendor pom name Java Annotation Indexer High Vendor hint analyzer vendor redhat Highest Vendor jar package name jandex Highest Vendor pom groupid jboss Highest Vendor Manifest Implementation-Vendor JBoss by Red Hat High Vendor Manifest implementation-url http://www.jboss.org/jandex Low Vendor pom groupid org.jboss Highest Vendor pom parent-groupid org.jboss Medium Vendor jar package name jboss Highest Product Manifest Bundle-Name Java Annotation Indexer Medium Product Manifest specification-title Java Annotation Indexer Medium Product Manifest bundle-symbolicname org.jboss.jandex Medium Product Manifest bundle-docurl http://www.jboss.org Low Product Manifest automatic-module-name org.jboss.jandex Medium Product pom artifactid jandex Highest Product file name jandex High Product Manifest os-name Mac OS X Medium Product Manifest build-timestamp Fri, 22 Jan 2021 15:14:59 -0600 Low Product jar package name indexer Highest Product Manifest os-arch x86_64 Low Product pom name Java Annotation Indexer High Product pom parent-artifactid jboss-parent Medium Product jar package name jandex Highest Product pom groupid jboss Highest Product Manifest implementation-url http://www.jboss.org/jandex Low Product Manifest Implementation-Title Java Annotation Indexer High Product pom parent-groupid org.jboss Medium Product jar package name jboss Highest Version Manifest Bundle-Version 2.2.3.Final High Version pom parent-version 2.2.3.Final Low Version pom version 2.2.3.Final Highest Version Manifest Implementation-Version 2.2.3.Final High
java-diff-utils-4.9.jarDescription:
The DiffUtils library for computing diffs, applying patches, generationg side-by-side view in Java. License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/io/github/java-diff-utils/java-diff-utils/4.9/java-diff-utils-4.9.jar
MD5: 6a4c9c3c4f2a61ff97b38c9f7bac91fa
SHA1: 3ec791c5aa74a72fb499ae8d9547abe27b637b0f
SHA256: 2dcf8710d0a453d8fa56c6d76bc4f16f86ec5de8eb7155f17ebff595c0c64aa0
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor file name java-diff-utils High Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor pom parent-artifactid java-diff-utils-parent Low Vendor pom name java-diff-utils High Vendor pom groupid io.github.java-diff-utils Highest Vendor Manifest bundle-symbolicname io.github.java-diff-utils Medium Vendor jar package name github Highest Vendor Manifest automatic-module-name io.github.javadiffutils Medium Vendor pom artifactid java-diff-utils Low Product pom parent-artifactid java-diff-utils-parent Medium Product file name java-diff-utils High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest Bundle-Name java-diff-utils Medium Product pom artifactid java-diff-utils Highest Product jar package name diffutils Highest Product pom name java-diff-utils High Product pom groupid io.github.java-diff-utils Highest Product Manifest bundle-symbolicname io.github.java-diff-utils Medium Product jar package name github Highest Product Manifest automatic-module-name io.github.javadiffutils Medium Version file version 4.9 High Version pom version 4.9 Highest
Published Vulnerabilities CVE-2021-4277 suppress
A vulnerability, which was classified as problematic, has been found in fredsmith utils. This issue affects some unknown processing of the file screenshot_sync of the component Filename Handler. The manipulation leads to predictable from observable state. The name of the patch is dbab1b66955eeb3d76b34612b358307f5c4e3944. It is recommended to apply a patch to fix this issue. The identifier VDB-216749 was assigned to this vulnerability. CWE-330 Use of Insufficiently Random Values
CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N References:
Vulnerable Software & Versions:
javax.activation-api-1.2.0.jarDescription:
JavaBeans Activation Framework API jar License:
https://github.com/javaee/activation/blob/master/LICENSE.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/activation/javax.activation-api/1.2.0/javax.activation-api-1.2.0.jar
MD5: 5e50e56bcf4a3ef3bc758f69f7643c3b
SHA1: 85262acf3ca9816f9537ca47d5adeabaead7cb16
SHA256: 43fdef0b5b6ceb31b0424b208b930c74ab58fac2ceeb7b3f6fd3aeb8b5ca4393
Referenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile
Evidence Type Source Name Value Confidence Vendor pom parent-artifactid all Low Vendor Manifest automatic-module-name java.activation Medium Vendor Manifest Implementation-Vendor-Id com.sun Medium Vendor file name javax.activation-api High Vendor pom groupid javax.activation Highest Vendor Manifest extension-name javax.activation Medium Vendor Manifest bundle-docurl http://www.oracle.com Low Vendor pom name JavaBeans Activation Framework API jar High Vendor Manifest originally-created-by 1.8.0_141 (Oracle Corporation) Low Vendor jar package name activation Highest Vendor Manifest bundle-symbolicname javax.activation-api Medium Vendor jar package name javax Highest Vendor Manifest Implementation-Vendor Oracle High Vendor pom parent-groupid com.sun.activation Medium Vendor Manifest (hint) specification-vendor sun Low Vendor Manifest specification-vendor Oracle Low Vendor Manifest (hint) Implementation-Vendor sun High Vendor pom artifactid javax.activation-api Low Product Manifest automatic-module-name java.activation Medium Product Manifest Implementation-Title javax.activation.javax.activation-api High Product file name javax.activation-api High Product pom groupid javax.activation Highest Product Manifest extension-name javax.activation Medium Product Manifest bundle-docurl http://www.oracle.com Low Product pom name JavaBeans Activation Framework API jar High Product Manifest originally-created-by 1.8.0_141 (Oracle Corporation) Low Product jar package name activation Highest Product jar package name javax Highest Product Manifest bundle-symbolicname javax.activation-api Medium Product pom parent-artifactid all Medium Product pom parent-groupid com.sun.activation Medium Product pom artifactid javax.activation-api Highest Product Manifest specification-title javax.activation.javax.activation-api Medium Product Manifest Bundle-Name JavaBeans Activation Framework API jar Medium Version pom version 1.2.0 Highest Version Manifest Bundle-Version 1.2.0 High Version Manifest Implementation-Version 1.2.0 High Version file version 1.2.0 High
javax.annotation-api-1.3.2.jarDescription:
Common Annotations for the JavaTM Platform API License:
CDDL + GPLv2 with classpath exception: https://github.com/javaee/javax.annotation/blob/master/LICENSE File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/annotation/javax.annotation-api/1.3.2/javax.annotation-api-1.3.2.jar
MD5: 2ab1973eefffaa2aeec47d50b9e40b9d
SHA1: 934c04d3cfef185a8008e7bf34331b79730a9d43
SHA256: e04ba5195bcd555dc95650f7cc614d151e4bcd52d29a10b8aa2197f3ab89ab9b
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings (modules):compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: MessageBus:compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Utilities:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor Manifest bundle-symbolicname javax.annotation-api Medium Vendor Manifest Implementation-Vendor GlassFish Community High Vendor jar package name annotation Highest Vendor Manifest bundle-docurl https://javaee.github.io/glassfish Low Vendor pom organization name GlassFish Community High Vendor Manifest extension-name javax.annotation Medium Vendor pom organization url https://javaee.github.io/glassfish Medium Vendor jar package name javax Highest Vendor Manifest specification-vendor Oracle Corporation Low Vendor Manifest automatic-module-name java.annotation Medium Vendor pom groupid javax.annotation Highest Vendor pom parent-artifactid jvnet-parent Low Vendor pom name ${extension.name} API High Vendor pom parent-groupid net.java Medium Vendor pom artifactid javax.annotation-api Low Vendor Manifest Implementation-Vendor-Id org.glassfish Medium Vendor pom url http://jcp.org/en/jsr/detail?id=250 Highest Vendor file name javax.annotation-api High Product Manifest bundle-symbolicname javax.annotation-api Medium Product jar package name annotation Highest Product pom organization name GlassFish Community Low Product Manifest bundle-docurl https://javaee.github.io/glassfish Low Product pom url http://jcp.org/en/jsr/detail?id=250 Medium Product pom parent-artifactid jvnet-parent Medium Product Manifest extension-name javax.annotation Medium Product Manifest Bundle-Name javax.annotation API Medium Product pom organization url https://javaee.github.io/glassfish Low Product jar package name javax Highest Product Manifest automatic-module-name java.annotation Medium Product pom groupid javax.annotation Highest Product pom name ${extension.name} API High Product pom parent-groupid net.java Medium Product pom artifactid javax.annotation-api Highest Product file name javax.annotation-api High Version Manifest Implementation-Version 1.3.2 High Version Manifest Bundle-Version 1.3.2 High Version pom parent-version 1.3.2 Low Version pom version 1.3.2 Highest Version file version 1.3.2 High
javax.inject-1.jarDescription:
The javax.inject API License:
The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/inject/javax.inject/1/javax.inject-1.jar
MD5: 289075e48b909e9e74e6c915b3631d2e
SHA1: 6975da39a7040257bd51d21a231b76c915872d38
SHA256: 91c77044a50c481636c32d916fd89c9118a72195390452c81065080f957de7ff
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom groupid javax.inject Highest Vendor jar package name javax Highest Vendor jar package name javax Low Vendor jar package name inject Low Vendor pom name javax.inject High Vendor file name javax.inject-1 High Vendor pom url http://code.google.com/p/atinject/ Highest Vendor pom artifactid javax.inject Low Vendor jar package name inject Highest Product pom groupid javax.inject Highest Product jar package name javax Highest Product jar package name inject Low Product pom name javax.inject High Product file name javax.inject-1 High Product pom artifactid javax.inject Highest Product jar package name inject Highest Product pom url http://code.google.com/p/atinject/ Medium Version file version 1 Medium Version pom version 1 Highest
javax.persistence-api-2.2.jarDescription:
Java(TM) Persistence API License:
Eclipse Public License v1.0: http://www.eclipse.org/legal/epl-v10.html
Eclipse Distribution License v. 1.0: http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/persistence/javax.persistence-api/2.2/javax.persistence-api-2.2.jar
MD5: e6520b3435f5b6d58eee415b5542abf8
SHA1: 25665ac8c0b62f50e6488173233239120fc52c96
SHA256: 5578b71b37999a5eaed3fea0d14aa61c60c6ec6328256f2b63472f336318baf4
Referenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile
Evidence Type Source Name Value Confidence Vendor pom url javaee/jpa-spec Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest extension-name javax.persistence Medium Vendor pom artifactid javax.persistence-api Low Vendor file name javax.persistence-api High Vendor pom groupid javax.persistence Highest Vendor Manifest automatic-module-name java.persistence Medium Vendor Manifest bundle-symbolicname javax.persistence-api Medium Vendor jar package name javax Highest Vendor Manifest specification-vendor Oracle Corporation Low Vendor Manifest Implementation-Vendor-Id com.oracle Medium Vendor pom parent-artifactid jvnet-parent Low Vendor pom parent-groupid net.java Medium Vendor jar package name persistence Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest extension-name javax.persistence Medium Product file name javax.persistence-api High Product pom groupid javax.persistence Highest Product pom parent-artifactid jvnet-parent Medium Product pom artifactid javax.persistence-api Highest Product Manifest automatic-module-name java.persistence Medium Product Manifest bundle-symbolicname javax.persistence-api Medium Product jar package name javax Highest Product Manifest Bundle-Name Java(TM) Persistence API jar Medium Product pom parent-groupid net.java Medium Product jar package name version Highest Product jar package name persistence Highest Product pom url javaee/jpa-spec High Version pom version 2.2 Highest Version Manifest Implementation-Version 2.2 High Version Manifest Bundle-Version 2.2 High Version pom parent-version 2.2 Low Version file version 2.2 High
jaxb-api-2.3.1.jarDescription:
JAXB (JSR 222) API License:
https://oss.oracle.com/licenses/CDDL+GPL-1.1, https://oss.oracle.com/licenses/CDDL+GPL-1.1 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/javax/xml/bind/jaxb-api/2.3.1/jaxb-api-2.3.1.jar
MD5: bcf270d320f645ad19f5edb60091e87f
SHA1: 8531ad5ac454cc2deb9d4d32c40c4d7451939b5d
SHA256: 88b955a0df57880a26a74708bc34f74dcaf8ebf4e78843a28b50eae945732b06
Referenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile
Evidence Type Source Name Value Confidence Vendor jar package name bind Highest Vendor pom artifactid jaxb-api Low Vendor Manifest multi-release true Low Vendor Manifest Implementation-Vendor Oracle Corporation High Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version>=1.8))" Low Vendor file name jaxb-api High Vendor jar package name jaxb Highest Vendor jar package name javax Highest Vendor Manifest extension-name javax.xml.bind Medium Vendor Manifest specification-vendor Oracle Corporation Low Vendor jar package name xml Highest Vendor pom groupid javax.xml.bind Highest Vendor Manifest bundle-docurl http://www.oracle.com/ Low Vendor Manifest implementation-build-id UNKNOWN-7de2ca118a0cfc4a373872915aef59148dff5f93, 2018-09-12T06:28:43-0700 Low Vendor Manifest Implementation-Vendor-Id org.glassfish Medium Vendor pom parent-artifactid jaxb-api-parent Low Vendor Manifest bundle-symbolicname jaxb-api Medium Product jar package name bind Highest Product Manifest multi-release true Low Product pom parent-artifactid jaxb-api-parent Medium Product pom artifactid jaxb-api Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version>=1.8))" Low Product file name jaxb-api High Product Manifest Bundle-Name jaxb-api Medium Product jar package name jaxb Highest Product jar package name javax Highest Product Manifest extension-name javax.xml.bind Medium Product jar package name xml Highest Product pom groupid javax.xml.bind Highest Product Manifest bundle-docurl http://www.oracle.com/ Low Product Manifest implementation-build-id UNKNOWN-7de2ca118a0cfc4a373872915aef59148dff5f93, 2018-09-12T06:28:43-0700 Low Product Manifest specification-title jaxb-api Medium Product Manifest bundle-symbolicname jaxb-api Medium Version Manifest Bundle-Version 2.3.1 High Version file version 2.3.1 High Version pom version 2.3.1 Highest
jaxb-runtime-2.3.5.jarDescription:
JAXB (JSR 222) Reference Implementation License:
http://www.eclipse.org/org/documents/edl-v10.php File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/glassfish/jaxb/jaxb-runtime/2.3.5/jaxb-runtime-2.3.5.jar
MD5: 2d3790292a30333a14b7fb1143864a9c
SHA1: a169a961a2bb9ac69517ec1005e451becf5cdfab
SHA256: 4a25453756d08be89c6537cc26fea237677ab99eea857ce1bcb84346715cfae4
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor jar package name bind Highest Vendor pom url https://eclipse-ee4j.github.io/jaxb-ri/ Highest Vendor Manifest git-revision f01d8db Low Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest bundle-docurl https://www.eclipse.org Low Vendor Manifest implementation-build-id 2.3.5 - f01d8db Low Vendor jar (hint) package name oracle Highest Vendor pom groupid glassfish.jaxb Highest Vendor jar package name sun Highest Vendor Manifest multi-release true Low Vendor pom groupid org.glassfish.jaxb Highest Vendor jar package name com Highest Vendor Manifest bundle-symbolicname org.glassfish.jaxb.runtime Medium Vendor pom parent-artifactid jaxb-runtime-parent Low Vendor pom name JAXB Runtime High Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor jar package name xml Highest Vendor pom parent-groupid com.sun.xml.bind.mvn Medium Vendor Manifest Implementation-Vendor-Id org.glassfish.jaxb Medium Vendor pom artifactid jaxb-runtime Low Vendor file name jaxb-runtime High Product Manifest specification-title Jakarta XML Binding Medium Product jar package name bind Highest Product Manifest git-revision f01d8db Low Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-docurl https://www.eclipse.org Low Product Manifest implementation-build-id 2.3.5 - f01d8db Low Product pom groupid glassfish.jaxb Highest Product jar package name sun Highest Product Manifest multi-release true Low Product pom url https://eclipse-ee4j.github.io/jaxb-ri/ Medium Product jar package name com Highest Product Manifest bundle-symbolicname org.glassfish.jaxb.runtime Medium Product pom name JAXB Runtime High Product Manifest Implementation-Title Jakarta XML Binding Implementation High Product jar package name xml Highest Product pom artifactid jaxb-runtime Highest Product pom parent-groupid com.sun.xml.bind.mvn Medium Product Manifest Bundle-Name JAXB Runtime Medium Product pom parent-artifactid jaxb-runtime-parent Medium Product file name jaxb-runtime High Version pom version 2.3.5 Highest Version Manifest major-version 2.3.5 Medium Version Manifest build-id 2.3.5 Medium Version Manifest Implementation-Version 2.3.5 High Version Manifest Bundle-Version 2.3.5 High Version file version 2.3.5 High Version Manifest implementation-build-id 2.3.5 Low
jboss-logging-3.4.2.Final.jarDescription:
The JBoss Logging Framework License:
Apache License, version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/jboss/logging/jboss-logging/3.4.2.Final/jboss-logging-3.4.2.Final.jar
MD5: b050c93a9bfbcd28546cec7511a82e9a
SHA1: e517b8a93dd9962ed5481345e4d262fdd47c4217
SHA256: 804d824c9144561ef85a626e453b90a9ce81c103c3910851e057d79ed84c2e38
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor Manifest java-vendor Red Hat, Inc. Medium Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor pom parent-artifactid jboss-parent Low Vendor Manifest bundle-docurl http://www.jboss.org Low Vendor file name jboss-logging High Vendor Manifest os-arch amd64 Low Vendor Manifest Implementation-Vendor-Id org.jboss.logging Medium Vendor Manifest os-name Linux Medium Vendor pom artifactid jboss-logging Low Vendor Manifest automatic-module-name org.jboss.logging Medium Vendor pom url http://www.jboss.org Highest Vendor Manifest implementation-url http://www.jboss.org Low Vendor Manifest specification-vendor JBoss by Red Hat Low Vendor pom groupid jboss.logging Highest Vendor Manifest build-jdk-spec 1.8 Low Vendor hint analyzer vendor redhat Highest Vendor jar package name logging Highest Vendor Manifest Implementation-Vendor JBoss by Red Hat High Vendor pom parent-groupid org.jboss Medium Vendor pom name JBoss Logging 3 High Vendor pom groupid org.jboss.logging Highest Vendor Manifest bundle-symbolicname org.jboss.logging.jboss-logging Medium Vendor jar package name jboss Highest Product Manifest Implementation-Title JBoss Logging 3 High Product pom url http://www.jboss.org Medium Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest Bundle-Name JBoss Logging 3 Medium Product Manifest bundle-docurl http://www.jboss.org Low Product file name jboss-logging High Product Manifest os-arch amd64 Low Product Manifest os-name Linux Medium Product pom artifactid jboss-logging Highest Product Manifest automatic-module-name org.jboss.logging Medium Product Manifest implementation-url http://www.jboss.org Low Product pom groupid jboss.logging Highest Product Manifest build-jdk-spec 1.8 Low Product pom parent-artifactid jboss-parent Medium Product Manifest specification-title JBoss Logging 3 Medium Product jar package name logging Highest Product pom parent-groupid org.jboss Medium Product pom name JBoss Logging 3 High Product Manifest bundle-symbolicname org.jboss.logging.jboss-logging Medium Product jar package name jboss Highest Version Manifest Implementation-Version 3.4.2.Final High Version Manifest Bundle-Version 3.4.2.Final High Version pom parent-version 3.4.2.Final Low Version pom version 3.4.2.Final Highest
jboss-transaction-api_1.2_spec-1.1.1.Final.jarDescription:
The Java Transaction 1.2 API classes License:
Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/jboss/spec/javax/transaction/jboss-transaction-api_1.2_spec/1.1.1.Final/jboss-transaction-api_1.2_spec-1.1.1.Final.jar
MD5: 1e633c47138aba999d39692a31a1a124
SHA1: a8485cab9484dda36e9a8c319e76b5cc18797b58
SHA256: a310a50b9bdc44aaf36362dc9bb212235a147ffa8ef72dc9544a39c329eabbc3
Referenced In Project/Scope: TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile
Evidence Type Source Name Value Confidence Vendor pom name Java Transaction API High Vendor Manifest implementation-url http://www.jboss.org/jboss-transaction-api_1.2_spec Low Vendor pom parent-artifactid jboss-parent Low Vendor jar package name transaction Highest Vendor Manifest bundle-docurl http://www.jboss.org Low Vendor pom groupid org.jboss.spec.javax.transaction Highest Vendor jar package name javax Highest Vendor hint analyzer vendor redhat Highest Vendor Manifest java-vendor Oracle Corporation Medium Vendor Manifest Implementation-Vendor JBoss by Red Hat High Vendor pom groupid jboss.spec.javax.transaction Highest Vendor pom artifactid jboss-transaction-api_1.2_spec Low Vendor Manifest bundle-symbolicname org.jboss.spec.javax.transaction.jboss-transaction-api_1.2_spec Medium Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.7))" Low Vendor Manifest automatic-module-name java.transaction Medium Vendor Manifest os-name Windows 10 Medium Vendor file name jboss-transaction-api_1.2_spec-1.1.1.Final High Vendor pom parent-groupid org.jboss Medium Vendor Manifest Implementation-Vendor-Id org.jboss.spec.javax.transaction Medium Vendor Manifest os-arch x86 Low Product pom name Java Transaction API High Product pom artifactid jboss-transaction-api_1.2_spec Highest Product Manifest implementation-url http://www.jboss.org/jboss-transaction-api_1.2_spec Low Product jar package name transaction Highest Product Manifest bundle-docurl http://www.jboss.org Low Product Manifest Implementation-Title Java Transaction API High Product Manifest Bundle-Name Java Transaction API Medium Product jar package name javax Highest Product pom parent-artifactid jboss-parent Medium Product pom groupid jboss.spec.javax.transaction Highest Product Manifest specification-title JSR 907: Java Transaction API (JTA) Medium Product Manifest bundle-symbolicname org.jboss.spec.javax.transaction.jboss-transaction-api_1.2_spec Medium Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.7))" Low Product Manifest automatic-module-name java.transaction Medium Product Manifest os-name Windows 10 Medium Product file name jboss-transaction-api_1.2_spec-1.1.1.Final High Product pom parent-groupid org.jboss Medium Product Manifest os-arch x86 Low Version pom version 1.1.1.Final Highest Version pom parent-version 1.1.1.Final Low Version Manifest Bundle-Version 1.1.1.Final High Version Manifest Implementation-Version 1.1.1.Final High
jcl-over-slf4j-1.7.30.jarDescription:
JCL 1.2 implemented over SLF4J License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/slf4j/jcl-over-slf4j/1.7.30/jcl-over-slf4j-1.7.30.jar
MD5: 69ad224b2feb6f86554fe8997b9c3d4b
SHA1: cd92524ea19d27e5b94ecd251e1af729cffdfe15
SHA256: 71e9ee37b9e4eb7802a2acc5f41728a4cf3915e7483d798db3b4ff2ec8847c50
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom url http://www.slf4j.org Highest Vendor file name jcl-over-slf4j High Vendor pom parent-groupid org.slf4j Medium Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Vendor pom parent-artifactid slf4j-parent Low Vendor pom artifactid jcl-over-slf4j Low Vendor pom groupid org.slf4j Highest Vendor jar package name apache Highest Vendor jar package name commons Highest Vendor pom groupid slf4j Highest Vendor Manifest automatic-module-name org.apache.commons.logging Medium Vendor jar package name logging Highest Vendor Manifest bundle-symbolicname jcl.over.slf4j Medium Vendor pom name JCL 1.2 implemented over SLF4J High Product Manifest Bundle-Name jcl-over-slf4j Medium Product file name jcl-over-slf4j High Product pom url http://www.slf4j.org Medium Product pom parent-groupid org.slf4j Medium Product pom artifactid jcl-over-slf4j Highest Product Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Product Manifest Implementation-Title jcl-over-slf4j High Product jar package name apache Highest Product jar package name commons Highest Product pom groupid slf4j Highest Product Manifest automatic-module-name org.apache.commons.logging Medium Product jar package name logging Highest Product pom parent-artifactid slf4j-parent Medium Product Manifest bundle-symbolicname jcl.over.slf4j Medium Product pom name JCL 1.2 implemented over SLF4J High Version pom version 1.7.30 Highest Version Manifest Bundle-Version 1.7.30 High Version Manifest Implementation-Version 1.7.30 High Version file version 1.7.30 High
Published Vulnerabilities CVE-2021-37533 suppress
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711. CWE-20 Improper Input Validation
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions:
jcommander-1.48.jarDescription:
A Java framework to parse command line options with annotations. License:
The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/beust/jcommander/1.48/jcommander-1.48.jar
MD5: 7a84fb4b01f46c904bd549e67e6c48a1
SHA1: bfcb96281ea3b59d626704f74bc6d625ff51cbce
SHA256: a7313fcfde070930e40ec79edf3c5948cf34e4f0d25cb3a09f9963d8bdd84113
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom artifactid jcommander Low Vendor Manifest bundle-symbolicname com.beust.jcommander Medium Vendor jar package name jcommander Highest Vendor pom groupid beust Highest Vendor pom name JCommander High Vendor pom groupid com.beust Highest Vendor pom url http://beust.com/jcommander Highest Vendor jar package name beust Highest Vendor file name jcommander High Product pom artifactid jcommander Highest Product jar package name jcommander Highest Product Manifest bundle-symbolicname com.beust.jcommander Medium Product pom groupid beust Highest Product pom name JCommander High Product jar package name beust Highest Product file name jcommander High Product Manifest Bundle-Name JCommander Medium Product pom url http://beust.com/jcommander Medium Version pom version 1.48 Highest Version file version 1.48 High
joda-time-1.6.2.jarDescription:
Date and time library to replace JDK date handling License:
Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/joda-time/joda-time/1.6.2/joda-time-1.6.2.jar
MD5: 6442e992dedaddadd8b9e3c87a38bfb8
SHA1: 7a0525fe460ef5b99ea3152e6d2c0e4f24f04c51
SHA256: 442ffc099aaa8e1907dcf8806104c1640acba906f68988f9c5a2e1442e0fb8e5
Referenced In Project/Scope: TheseFoolishThings :: Actors:compile
Evidence Type Source Name Value Confidence Vendor pom url http://joda-time.sourceforge.net Highest Vendor pom organization url http://www.joda.org Medium Vendor pom name Joda time High Vendor Manifest bundle-symbolicname joda-time Medium Vendor pom artifactid joda-time Low Vendor Manifest specification-vendor Joda.org Low Vendor Manifest bundle-docurl http://joda-time.sourceforge.net/ Low Vendor pom organization name Joda.org High Vendor pom groupid joda-time Highest Vendor jar package name joda Highest Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.3 Low Vendor file name joda-time High Vendor jar package name time Highest Vendor Manifest Implementation-Vendor Joda.org High Vendor Manifest Implementation-Vendor-Id org.joda Medium Vendor Manifest extension-name joda-time Medium Product pom name Joda time High Product pom url http://joda-time.sourceforge.net Medium Product Manifest bundle-symbolicname joda-time Medium Product Manifest Implementation-Title org.joda.time High Product Manifest bundle-docurl http://joda-time.sourceforge.net/ Low Product pom groupid joda-time Highest Product jar package name joda Highest Product Manifest bundle-requiredexecutionenvironment J2SE-1.3 Low Product Manifest specification-title Joda-Time Medium Product file name joda-time High Product Manifest Bundle-Name Joda-Time Medium Product pom organization url http://www.joda.org Low Product jar package name time Highest Product pom organization name Joda.org Low Product pom artifactid joda-time Highest Product Manifest extension-name joda-time Medium Version Manifest Implementation-Version 1.6.2 High Version Manifest Bundle-Version 1.6.2 High Version file version 1.6.2 High Version pom version 1.6.2 Highest
jsr305-3.0.2.jarDescription:
JSR305 Annotations for Findbugs License:
The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.jar
MD5: dd83accb899363c32b07d7a1b2e4ce40
SHA1: 25ea2e8b0c338a877313bd4672d3fe056ea78f0d
SHA256: 766ad2a0783f2687962c8ad74ceecc38a28b9f72a2d085ee438b7813e928d0c7
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings (modules):compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: MessageBus:compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Utilities:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor file name jsr305 High Vendor pom url http://findbugs.sourceforge.net/ Highest Vendor pom groupid google.code.findbugs Highest Vendor pom groupid com.google.code.findbugs Highest Vendor pom artifactid jsr305 Low Vendor Manifest bundle-symbolicname org.jsr-305 Medium Vendor pom name FindBugs-jsr305 High Product file name jsr305 High Product pom groupid google.code.findbugs Highest Product pom url http://findbugs.sourceforge.net/ Medium Product Manifest Bundle-Name FindBugs-jsr305 Medium Product pom artifactid jsr305 Highest Product Manifest bundle-symbolicname org.jsr-305 Medium Product pom name FindBugs-jsr305 High Version pom version 3.0.2 Highest Version file version 3.0.2 High Version Manifest Bundle-Version 3.0.2 High
jul-to-slf4j-1.7.30.jarDescription:
JUL to SLF4J bridge File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/slf4j/jul-to-slf4j/1.7.30/jul-to-slf4j-1.7.30.jarMD5: f2c78cb93d70dc5dea0c50f36ace09c1SHA1: d58bebff8cbf70ff52b59208586095f467656c30SHA256: bbcbfdaa72572255c4f85207a9bfdb24358dc993e41252331bd4d0913e4988b9Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom artifactid jul-to-slf4j Low Vendor pom url http://www.slf4j.org Highest Vendor jar package name bridge Highest Vendor pom parent-groupid org.slf4j Medium Vendor jar package name slf4j Highest Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Vendor pom parent-artifactid slf4j-parent Low Vendor pom groupid org.slf4j Highest Vendor pom groupid slf4j Highest Vendor file name jul-to-slf4j High Vendor Manifest bundle-symbolicname jul.to.slf4j Medium Vendor pom name JUL to SLF4J bridge High Product jar package name bridge Highest Product pom url http://www.slf4j.org Medium Product pom parent-groupid org.slf4j Medium Product jar package name slf4j Highest Product Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Product pom groupid slf4j Highest Product file name jul-to-slf4j High Product Manifest Bundle-Name jul-to-slf4j Medium Product pom artifactid jul-to-slf4j Highest Product Manifest bundle-symbolicname jul.to.slf4j Medium Product pom parent-artifactid slf4j-parent Medium Product pom name JUL to SLF4J bridge High Version pom version 1.7.30 Highest Version Manifest Bundle-Version 1.7.30 High Version Manifest Implementation-Version 1.7.30 High Version file version 1.7.30 High
junit-4.12.jarDescription:
JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck. License:
Eclipse Public License 1.0: http://www.eclipse.org/legal/epl-v10.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/junit/junit/4.12/junit-4.12.jar
MD5: 5b38c40c97fbd0adee29f91e60405584
SHA1: 2973d150c0dc1fefe998f834810d68f278ea58ec
SHA256: 59721f0805e223d84b90677887d9ff567dc534d7c502ca903c0c2b17f05c116a
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor pom groupid junit Highest Vendor pom organization url http://www.junit.org Medium Vendor file name junit High Vendor jar package name framework Highest Vendor Manifest Implementation-Vendor-Id junit Medium Vendor pom artifactid junit Low Vendor pom name JUnit High Vendor jar package name junit Highest Vendor pom organization name JUnit High Vendor pom url http://junit.org Highest Vendor Manifest Implementation-Vendor JUnit High Product pom groupid junit Highest Product pom artifactid junit Highest Product file name junit High Product Manifest Implementation-Title JUnit High Product jar package name framework Highest Product pom url http://junit.org Medium Product pom organization name JUnit Low Product pom organization url http://www.junit.org Low Product pom name JUnit High Product jar package name junit Highest Version file version 4.12 High Version pom version 4.12 Highest Version Manifest Implementation-Version 4.12 High
Published Vulnerabilities CVE-2020-15250 (OSSINDEX) suppress
In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory. CWE-732 Incorrect Permission Assignment for Critical Resource
CVSSv2:
Base Score: MEDIUM (5.5) Vector: /AV:L/AC:L/Au:/C:H/I:N/A:N References:
Vulnerable Software & Versions (OSSINDEX):
cpe:2.3:a:junit:junit:4.12:*:*:*:*:*:*:* log4j-api-2.17.0.jarDescription:
The Apache Log4j API License:
https://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/apache/logging/log4j/log4j-api/2.17.0/log4j-api-2.17.0.jar
MD5: 935fcbd8c8273c0a4f1652de53493050
SHA1: bbd791e9c8c9421e45337c4fe0a10851c086e36c
SHA256: ab9cadc80e234580e3f3c8c18644314fccd4b3cd3f7085d4e934866cb561b95d
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor jar package name log4j Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest Implementation-Vendor-Id org.apache.logging.log4j Medium Vendor pom parent-artifactid log4j Low Vendor Manifest multi-release true Low Vendor file name log4j-api High Vendor Manifest log4jreleasekey B3D8E1BA Low Vendor jar package name apache Highest Vendor Manifest specification-vendor The Apache Software Foundation Low Vendor Manifest Implementation-Vendor The Apache Software Foundation High Vendor Manifest bundle-symbolicname org.apache.logging.log4j.api Medium Vendor pom artifactid log4j-api Low Vendor pom groupid org.apache.logging.log4j Highest Vendor jar package name logging Highest Vendor jar package name org Highest Vendor pom parent-groupid org.apache.logging.log4j Medium Vendor pom name Apache Log4j API High Vendor Manifest log4jreleasemanager Ralph Goers Low Vendor pom groupid apache.logging.log4j Highest Vendor Manifest bundle-docurl https://www.apache.org/ Low Vendor Manifest implementation-url https://logging.apache.org/log4j/2.x/log4j-api/ Low Product jar package name log4j Highest Product Manifest specification-title Apache Log4j API Medium Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product pom parent-artifactid log4j Medium Product Manifest multi-release true Low Product Manifest Bundle-Name Apache Log4j API Medium Product pom artifactid log4j-api Highest Product file name log4j-api High Product Manifest Implementation-Title Apache Log4j API High Product Manifest log4jreleasekey B3D8E1BA Low Product jar package name apache Highest Product Manifest bundle-symbolicname org.apache.logging.log4j.api Medium Product jar package name logging Highest Product jar package name org Highest Product pom parent-groupid org.apache.logging.log4j Medium Product pom name Apache Log4j API High Product Manifest log4jreleasemanager Ralph Goers Low Product pom groupid apache.logging.log4j Highest Product Manifest bundle-docurl https://www.apache.org/ Low Product Manifest implementation-url https://logging.apache.org/log4j/2.x/log4j-api/ Low Version pom version 2.17.0 Highest Version file version 2.17.0 High Version Manifest Implementation-Version 2.17.0 High Version Manifest log4jreleaseversion 2.17.0 Medium Version Manifest Bundle-Version 2.17.0 High
Related Dependencies log4j-to-slf4j-2.17.0.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/apache/logging/log4j/log4j-to-slf4j/2.17.0/log4j-to-slf4j-2.17.0.jar MD5: a0ff4b3bd7936ca313dc29033e85bbd6 SHA1: e50b82411b9ce9c204c938509f914b2bb887168b SHA256: df8a9a9d06368a87abd04051597310cc7a501762ab0cd7492ba106df92862c78 pkg:maven/org.apache.logging.log4j/log4j-to-slf4j@2.17.0 Published Vulnerabilities CVE-2021-44832 suppress
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. CWE-20 Improper Input Validation
CVSSv2:
Base Score: HIGH (8.5) Vector: /AV:N/AC:M/Au:S/C:C/I:C/A:C CVSSv3:
Base Score: MEDIUM (6.6) Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
logback-core-1.2.3.jarDescription:
logback-core module License:
http://www.eclipse.org/legal/epl-v10.html, http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/ch/qos/logback/logback-core/1.2.3/logback-core-1.2.3.jar
MD5: 841fc80c6edff60d947a3872a2db4d45
SHA1: 864344400c3d4d92dfeb0a305dc87d953677c03c
SHA256: 5946d837fe6f960c02a53eda7a6926ecc3c758bbdd69aa453ee429f858217f22
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: Finder :: JPA Finder:runtime TheseFoolishThings :: Examples :: DCI :: Swing:runtime TheseFoolishThings :: Examples :: Data:runtime TheseFoolishThings :: Examples :: DCI :: Marshal XStream:runtime TheseFoolishThings :: Examples :: DCI :: Displayable:runtime TheseFoolishThings :: Examples :: Finder :: In-memory Finder:runtime TheseFoolishThings :: Examples :: DCI :: Persistence JPA:runtime TheseFoolishThings :: Examples (master):runtime TheseFoolishThings :: Examples :: Finder :: Extended Finder:runtime Evidence Type Source Name Value Confidence Vendor pom name Logback Core Module High Vendor Manifest bundle-docurl http://www.qos.ch Low Vendor pom parent-artifactid logback-parent Low Vendor file name logback-core High Vendor jar package name qos Highest Vendor pom groupid ch.qos.logback Highest Vendor Manifest originally-created-by Apache Maven Bundle Plugin Low Vendor jar package name core Highest Vendor jar package name logback Highest Vendor Manifest bundle-symbolicname ch.qos.logback.core Medium Vendor pom artifactid logback-core Low Vendor Manifest bundle-requiredexecutionenvironment JavaSE-1.6 Low Vendor jar package name ch Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.6))" Low Product pom name Logback Core Module High Product Manifest bundle-docurl http://www.qos.ch Low Product file name logback-core High Product jar package name qos Highest Product pom groupid ch.qos.logback Highest Product Manifest originally-created-by Apache Maven Bundle Plugin Low Product jar package name core Highest Product pom artifactid logback-core Highest Product jar package name logback Highest Product Manifest bundle-symbolicname ch.qos.logback.core Medium Product Manifest Bundle-Name Logback Core Module Medium Product Manifest bundle-requiredexecutionenvironment JavaSE-1.6 Low Product jar package name ch Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.6))" Low Product pom parent-artifactid logback-parent Medium Version file version 1.2.3 High Version pom version 1.2.3 Highest Version Manifest Bundle-Version 1.2.3 High
Related Dependencies logback-classic-1.2.3.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/ch/qos/logback/logback-classic/1.2.3/logback-classic-1.2.3.jar MD5: 64f7a68f931aed8e5ad8243470440f0b SHA1: 7c4f3c474fb2c041d8028740440937705ebb473a SHA256: fb53f8539e7fcb8f093a56e138112056ec1dc809ebb020b59d8a36a5ebac37e0 pkg:maven/ch.qos.logback/logback-classic@1.2.3 Published Vulnerabilities CVE-2021-42550 suppress
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (8.5) Vector: /AV:N/AC:M/Au:S/C:C/I:C/A:C CVSSv3:
Base Score: MEDIUM (6.6) Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
lombok-1.18.22.jarDescription:
Spice up your java: Automatic Resource Management, automatic generation of getters, setters, equals, hashCode and toString, and more! License:
The MIT License: https://projectlombok.org/LICENSE File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/projectlombok/lombok/1.18.22/lombok-1.18.22.jar
MD5: 30905901647fe0ebb06fb20ee8a638bf
SHA1: 9c08ea24c6eb714e2d6170e8122c069a0ba9aacf
SHA256: ecef1581411d7a82cc04281667ee0bac5d7c0a5aae74cfc38430396c91c31831
Referenced In Projects/Scopes: TheseFoolishThings :: Roles:provided TheseFoolishThings :: MessageBus:provided TheseFoolishThings :: Examples :: DCI :: Swing:provided TheseFoolishThings :: Test Utilities:provided TheseFoolishThings :: Examples :: DCI :: Marshal XStream:provided TheseFoolishThings :: MessageBus :: Spring:provided TheseFoolishThings :: Examples :: Finder :: Extended Finder:provided TheseFoolishThings :: Roles :: Spring:provided TheseFoolishThings :: Examples (master):provided TheseFoolishThings :: Examples :: Data:provided TheseFoolishThings :: Examples :: Finder :: JPA Finder:provided TheseFoolishThings :: Examples :: DCI :: Persistence JPA:provided TheseFoolishThings (modules):provided TheseFoolishThings :: Utilities:provided TheseFoolishThings :: Examples :: Finder :: In-memory Finder:provided TheseFoolishThings :: Examples :: DCI :: Displayable:provided TheseFoolishThings :: Actors:provided Evidence Type Source Name Value Confidence Vendor pom groupid org.projectlombok Highest Vendor file name lombok High Vendor Manifest can-redefine-classes true Low Vendor Manifest automatic-module-name lombok Medium Vendor jar package name java Highest Vendor pom name Project Lombok High Vendor pom groupid projectlombok Highest Vendor jar package name lombok Highest Vendor jar package name tostring Highest Vendor pom url https://projectlombok.org Highest Vendor pom artifactid lombok Low Product file name lombok High Product Manifest can-redefine-classes true Low Product Manifest automatic-module-name lombok Medium Product jar package name java Highest Product pom url https://projectlombok.org Medium Product pom name Project Lombok High Product pom groupid projectlombok Highest Product pom artifactid lombok Highest Product jar package name lombok Highest Product jar package name tostring Highest Version file version 1.18.22 High Version pom version 1.18.22 Highest Version Manifest lombok-version 1.18.22 Medium
mockito-core-3.8.0.jarDescription:
Mockito mock objects library core API and implementation License:
The MIT License: https://github.com/mockito/mockito/blob/release/3.x/LICENSE File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/mockito/mockito-core/3.8.0/mockito-core-3.8.0.jar
MD5: 181eb3008ed533261c9afb1efd1ea332
SHA1: a3f5ed0745e4d76aa880136ab514412cd50b6246
SHA256: e8a6113e5ba2fcadc22ad5da712ce60ce85db48efb8bfc1cbac4802eb36b559f
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor jar package name mockito Highest Vendor Manifest bundle-symbolicname org.mockito.mockito-core Medium Vendor pom groupid org.mockito Highest Vendor pom artifactid mockito-core Low Vendor file name mockito-core High Vendor jar package name and Highest Vendor pom name mockito-core High Vendor jar package name api Highest Vendor Manifest automatic-module-name org.mockito Medium Vendor pom url mockito/mockito Highest Vendor pom groupid mockito Highest Product Manifest Bundle-Name Mockito Mock Library for Java. Core bundle requires Byte Buddy and Objenesis. Medium Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product jar package name mockito Highest Product Manifest bundle-symbolicname org.mockito.mockito-core Medium Product pom url mockito/mockito High Product pom artifactid mockito-core Highest Product file name mockito-core High Product jar package name and Highest Product pom name mockito-core High Product jar package name api Highest Product Manifest automatic-module-name org.mockito Medium Product pom groupid mockito Highest Version pom version 3.8.0 Highest Version Manifest Bundle-Version 3.8.0 High Version file version 3.8.0 High
mxparser-1.2.2.jarDescription:
MXParser is a fork of xpp3_min 1.1.7 containing only the parser with merged changes of the Plexus fork.
License:
Indiana University Extreme! Lab Software License: https://raw.githubusercontent.com/x-stream/mxparser/master/LICENSE.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar
MD5: 9d7e42409dfdcee9bd17903015bdeae2
SHA1: 476fb3b3bb3716cad797cd054ce45f89445794e9
SHA256: aeeee23a3303d811bca8790ea7f25b534314861c03cff36dafdcc2180969eb97
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor file name mxparser High Vendor Manifest automatic-module-name io.github.xstream.mxparser Medium Vendor Manifest x-build-os Linux Low Vendor pom groupid io.github.x-stream Highest Vendor Manifest x-build-time 2021-08-18T22:35:34Z Low Vendor Manifest java_1_5_home /opt/sun-jdk-1.5.0.22 Low Vendor Manifest java_9_home /opt/oracle-jdk-bin-9.0.4 Low Vendor jar package name xstream Highest Vendor Manifest x-compile-target 1.4 Low Vendor jar package name mxparser Highest Vendor pom name MXParser High Vendor pom url http://x-stream.github.io/mxparser Highest Vendor Manifest java_1_8_home /opt/oracle-jdk-bin-1.8.0.202 Low Vendor Manifest x-builder Maven 3.8.1 Low Vendor Manifest bundle-symbolicname mxparser Medium Vendor Manifest build-jdk-spec 1.8 Low Vendor jar package name io Highest Vendor Manifest java_1_4_home /opt/blackdown-jdk-1.4.2.03 Low Vendor jar package name github Highest Vendor Manifest x-compile-source 1.4 Low Vendor Manifest java_1_7_home /opt/oracle-jdk-bin-1.7.0.80 Low Vendor pom artifactid mxparser Low Vendor Manifest java_1_6_home /opt/sun-jdk-1.6.0.45 Low Product file name mxparser High Product Manifest automatic-module-name io.github.xstream.mxparser Medium Product Manifest x-build-os Linux Low Product Manifest x-build-time 2021-08-18T22:35:34Z Low Product Manifest java_1_5_home /opt/sun-jdk-1.5.0.22 Low Product jar package name xstream Highest Product Manifest x-compile-target 1.4 Low Product pom name MXParser High Product Manifest x-builder Maven 3.8.1 Low Product pom url http://x-stream.github.io/mxparser Medium Product Manifest build-jdk-spec 1.8 Low Product jar package name io Highest Product jar package name github Highest Product Manifest java_1_6_home /opt/sun-jdk-1.6.0.45 Low Product Manifest Bundle-Name MXParser Medium Product pom groupid io.github.x-stream Highest Product Manifest Implementation-Title MXParser High Product pom artifactid mxparser Highest Product Manifest java_9_home /opt/oracle-jdk-bin-9.0.4 Low Product jar package name mxparser Highest Product Manifest java_1_8_home /opt/oracle-jdk-bin-1.8.0.202 Low Product Manifest bundle-symbolicname mxparser Medium Product Manifest java_1_4_home /opt/blackdown-jdk-1.4.2.03 Low Product Manifest specification-title MXParser Medium Product Manifest x-compile-source 1.4 Low Product Manifest java_1_7_home /opt/oracle-jdk-bin-1.7.0.80 Low Version pom version 1.2.2 Highest Version file version 1.2.2 High Version Manifest Bundle-Version 1.2.2 High Version Manifest Implementation-Version 1.2.2 High
Published Vulnerabilities CVE-2013-7285 suppress
Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2016-3674 suppress
Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document. CWE-200 Information Exposure
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions:
CVE-2017-7957 suppress
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call. CWE-20 Improper Input Validation
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2020-26217 suppress
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14. CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVSSv2:
Base Score: HIGH (9.3) Vector: /AV:N/AC:M/Au:N/C:C/I:C/A:C CVSSv3:
Base Score: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2020-26258 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories. CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.7) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N References:
Vulnerable Software & Versions:
CVE-2020-26259 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories. CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVSSv2:
Base Score: MEDIUM (6.4) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:P CVSSv3:
Base Score: MEDIUM (6.8) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N References:
Vulnerable Software & Versions:
CVE-2021-21341 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion'), CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.1) Vector: /AV:N/AC:M/Au:N/C:N/I:N/A:C CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21342 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-502 Deserialization of Untrusted Data, CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (5.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:N CVSSv3:
Base Score: CRITICAL (9.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2021-21343 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-502 Deserialization of Untrusted Data, CWE-73 External Control of File Name or Path
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2021-21344 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21345 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVSSv2:
Base Score: MEDIUM (6.5) Vector: /AV:N/AC:L/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.9) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21346 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21347 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21348 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
CVSSv2:
Base Score: HIGH (7.8) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:C CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21349 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-502 Deserialization of Untrusted Data, CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (8.6) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2021-21350 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-21351 suppress
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.5) Vector: /AV:N/AC:L/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.1) Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-29505 suppress
XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17. CWE-502 Deserialization of Untrusted Data, CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: MEDIUM (6.5) Vector: /AV:N/AC:L/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39139 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.5) Vector: /AV:N/AC:L/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39140 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-502 Deserialization of Untrusted Data, CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')
CVSSv2:
Base Score: MEDIUM (6.3) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:C CVSSv3:
Base Score: MEDIUM (6.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39141 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39144 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-502 Deserialization of Untrusted Data, CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39145 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39146 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39147 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39148 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39149 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39150 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. CWE-502 Deserialization of Untrusted Data, CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39151 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39152 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. CWE-502 Deserialization of Untrusted Data, CWE-918 Server-Side Request Forgery (SSRF)
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39153 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-39154 suppress
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. CWE-434 Unrestricted Upload of File with Dangerous Type, CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: MEDIUM (6.0) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:P CVSSv3:
Base Score: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2021-43859 suppress
XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-40151 suppress
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-40152 suppress
Those using Woodstox to parse XML data may be vulnerable to Denial of Service attacks (DOS) if DTD support is enabled. If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-40153 suppress
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-41966 suppress
XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable. CWE-502 Deserialization of Untrusted Data, CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), CWE-121 Stack-based Buffer Overflow
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
objenesis-3.1.jarDescription:
A library for instantiating Java objects License:
http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/objenesis/objenesis/3.1/objenesis-3.1.jar
MD5: 712a73c2f496ab26736fd3f8029bac20
SHA1: 48f12deaae83a8dfc3775d830c9fd60ea59bbbca
SHA256: cdb3d038c188de6f46ffd5cd930be2d5e5dba59c53b26437995d534e3db2fb80
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Vendor Manifest bundle-symbolicname org.objenesis Medium Vendor Manifest implementation-url http://objenesis.org Low Vendor pom parent-groupid org.objenesis Medium Vendor jar package name objenesis Highest Vendor file name objenesis High Vendor Manifest Implementation-Vendor-Id org.objenesis Medium Vendor Manifest automatic-module-name org.objenesis Medium Vendor pom url http://objenesis.org Highest Vendor pom artifactid objenesis Low Vendor Manifest build-jdk-spec 1.8 Low Vendor Manifest Implementation-Vendor Joe Walnes, Henri Tremblay, Leonardo Mesquita High Vendor pom groupid org.objenesis Highest Vendor pom parent-artifactid objenesis-parent Low Vendor pom groupid objenesis Highest Vendor pom name Objenesis High Vendor Manifest specification-vendor Joe Walnes, Henri Tremblay, Leonardo Mesquita Low Product Manifest Implementation-Title Objenesis High Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.8))" Low Product Manifest bundle-symbolicname org.objenesis Medium Product Manifest implementation-url http://objenesis.org Low Product pom parent-groupid org.objenesis Medium Product jar package name objenesis Highest Product file name objenesis High Product Manifest Bundle-Name Objenesis Medium Product Manifest automatic-module-name org.objenesis Medium Product pom artifactid objenesis Highest Product pom parent-artifactid objenesis-parent Medium Product pom url http://objenesis.org Medium Product Manifest build-jdk-spec 1.8 Low Product Manifest specification-title Objenesis Medium Product pom groupid objenesis Highest Product pom name Objenesis High Version file version 3.1 High Version Manifest Implementation-Version 3.1 High Version pom version 3.1 Highest
slf4j-api-1.7.30.jarDescription:
The slf4j API File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/slf4j/slf4j-api/1.7.30/slf4j-api-1.7.30.jarMD5: f8be00da99bc4ab64c79ab1e2be7cb7cSHA1: b5a4b6d16ab13e34a88fae84c35cd5d68cac922cSHA256: cdba07964d1bb40a0761485c6b1e8c2f8fd9eb1d19c53928ac0d7f9510105c57Referenced In Projects/Scopes:
TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: MessageBus:compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Utilities:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor Manifest automatic-module-name org.slf4j Medium Vendor pom url http://www.slf4j.org Highest Vendor file name slf4j-api High Vendor pom parent-groupid org.slf4j Medium Vendor jar package name slf4j Highest Vendor pom artifactid slf4j-api Low Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Vendor pom parent-artifactid slf4j-parent Low Vendor pom groupid org.slf4j Highest Vendor pom name SLF4J API Module High Vendor pom groupid slf4j Highest Vendor Manifest bundle-symbolicname slf4j.api Medium Product Manifest automatic-module-name org.slf4j Medium Product Manifest Bundle-Name slf4j-api Medium Product pom url http://www.slf4j.org Medium Product file name slf4j-api High Product pom parent-groupid org.slf4j Medium Product jar package name slf4j Highest Product Manifest Implementation-Title slf4j-api High Product Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Product pom name SLF4J API Module High Product pom groupid slf4j Highest Product pom artifactid slf4j-api Highest Product pom parent-artifactid slf4j-parent Medium Product Manifest bundle-symbolicname slf4j.api Medium Version pom version 1.7.30 Highest Version Manifest Bundle-Version 1.7.30 High Version Manifest Implementation-Version 1.7.30 High Version file version 1.7.30 High
snakeyaml-1.29.jarDescription:
YAML 1.1 parser and emitter for Java License:
Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/yaml/snakeyaml/1.29/snakeyaml-1.29.jar
MD5: 5bdf841bc5abda0507fa5ce91c44cc86
SHA1: 6d0cdafb2010f1297e574656551d7145240f6e25
SHA256: 89c5f029811b08c878f0b81dbb05e9626624c1fda4087a26871101e499a217ab
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor jar package name snakeyaml Highest Vendor Manifest bundle-symbolicname org.yaml.snakeyaml Medium Vendor jar package name yaml Highest Vendor Manifest automatic-module-name org.yaml.snakeyaml Medium Vendor file name snakeyaml High Vendor jar package name emitter Highest Vendor pom artifactid snakeyaml Low Vendor pom groupid org.yaml Highest Vendor pom url http://www.snakeyaml.org Highest Vendor pom name SnakeYAML High Vendor pom groupid yaml Highest Vendor jar package name parser Highest Vendor Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.7))" Low Product jar package name snakeyaml Highest Product pom artifactid snakeyaml Highest Product Manifest bundle-symbolicname org.yaml.snakeyaml Medium Product jar package name yaml Highest Product Manifest automatic-module-name org.yaml.snakeyaml Medium Product file name snakeyaml High Product pom url http://www.snakeyaml.org Medium Product Manifest Bundle-Name SnakeYAML Medium Product jar package name emitter Highest Product pom name SnakeYAML High Product pom groupid yaml Highest Product jar package name parser Highest Product Manifest require-capability osgi.ee;filter:="(&(osgi.ee=JavaSE)(version=1.7))" Low Version pom version 1.29 Highest Version file version 1.29 High
Published Vulnerabilities CVE-2021-4235 suppress
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector. NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-1471 (OSSINDEX) suppress
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (9.8) Vector: /AV:N/AC:L/Au:/C:H/I:H/A:H References:
Vulnerable Software & Versions (OSSINDEX):
cpe:2.3:a:org.yaml:snakeyaml:1.29:*:*:*:*:*:*:* CVE-2022-25857 suppress
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-3064 suppress
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-38749 suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-38750 suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-38751 suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-38752 suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
CVE-2022-41854 suppress
Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions:
spotbugs-annotations-3.1.9.jarDescription:
Annotations the SpotBugs tool supports License:
GNU LESSER GENERAL PUBLIC LICENSE, Version 2.1: https://www.gnu.org/licenses/old-licenses/lgpl-2.1.en.html File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/github/spotbugs/spotbugs-annotations/3.1.9/spotbugs-annotations-3.1.9.jar
MD5: 56a1a81d69b6a111161bbce0e6dea26a
SHA1: 2ef5127efcc1a899aab8c66d449a631c9a99c469
SHA256: 68c7c46b4299e94837e236ae742f399901a950fe910fe3ca710026753b5dd2e1
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings (modules):compile TheseFoolishThings :: Roles:compile TheseFoolishThings :: Actors:compile TheseFoolishThings :: MessageBus :: Spring:compile TheseFoolishThings :: Examples (master):compile TheseFoolishThings :: MessageBus:compile TheseFoolishThings :: Test Utilities:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile TheseFoolishThings :: Examples :: Data:compile TheseFoolishThings :: Examples :: Finder :: In-memory Finder:compile TheseFoolishThings :: Utilities:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: Examples :: Finder :: Extended Finder:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor Manifest bundle-symbolicname spotbugs-annotations Medium Vendor Manifest automatic-module-name com.github.spotbugs.annotations Medium Vendor pom name SpotBugs Annotations High Vendor file name spotbugs-annotations High Vendor pom groupid github.spotbugs Highest Vendor pom url https://spotbugs.github.io/ Highest Vendor pom groupid com.github.spotbugs Highest Vendor Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Vendor pom artifactid spotbugs-annotations Low Product Manifest bundle-symbolicname spotbugs-annotations Medium Product pom artifactid spotbugs-annotations Highest Product Manifest automatic-module-name com.github.spotbugs.annotations Medium Product pom url https://spotbugs.github.io/ Medium Product pom name SpotBugs Annotations High Product file name spotbugs-annotations High Product Manifest Bundle-Name spotbugs-annotations Medium Product pom groupid github.spotbugs Highest Product Manifest bundle-requiredexecutionenvironment J2SE-1.5 Low Version Manifest Bundle-Version 3.1.9 High Version file version 3.1.9 High Version pom version 3.1.9 Highest
spring-boot-2.6.2.jarDescription:
Spring Boot License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot/2.6.2/spring-boot-2.6.2.jar
MD5: fb8e372b32de62fcb54e31bad9272b43
SHA1: bbf59f411320da665411692359ff511315d0ff91
SHA256: 7e3071eb3f944ae041beff9dcfec3b8b4792c39a4c54868fb874d2e91cfd21f9
Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor pom url https://spring.io/projects/spring-boot Highest Vendor hint analyzer vendor vmware Highest Vendor pom name spring-boot High Vendor pom organization url https://spring.io Medium Vendor jar package name boot Highest Vendor hint analyzer vendor SpringSource Highest Vendor jar package name springframework Highest Vendor pom groupid springframework.boot Highest Vendor pom groupid org.springframework.boot Highest Vendor Manifest build-jdk-spec 1.8 Low Vendor pom artifactid spring-boot Low Vendor hint analyzer vendor pivotal software Highest Vendor file name spring-boot High Vendor Manifest automatic-module-name spring.boot Medium Vendor pom organization name Pivotal Software, Inc. High Product pom organization url https://spring.io Low Product pom name spring-boot High Product jar package name boot Highest Product jar package name springframework Highest Product pom organization name Pivotal Software, Inc. Low Product pom groupid springframework.boot Highest Product Manifest build-jdk-spec 1.8 Low Product file name spring-boot High Product Manifest Implementation-Title Spring Boot High Product Manifest automatic-module-name spring.boot Medium Product pom url https://spring.io/projects/spring-boot Medium Product pom artifactid spring-boot Highest Version pom version 2.6.2 Highest Version Manifest Implementation-Version 2.6.2 High Version file version 2.6.2 High
Related Dependencies spring-boot-starter-logging-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter-logging/2.6.2/spring-boot-starter-logging-2.6.2.jar MD5: ab53f3d4beb515ac9a39d3b0e3fdc047 SHA1: 58d4896c606b6ff07b9bd8e46c87eac5a51255de SHA256: d749ad8e12022609ba4510bcbf4b716f86d8be16d0d3eddd46bf3498ee192094 pkg:maven/org.springframework.boot/spring-boot-starter-logging@2.6.2 spring-boot-autoconfigure-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-autoconfigure/2.6.2/spring-boot-autoconfigure-2.6.2.jar MD5: 75c98cd9186a3e4fe0d3a0fa6afacdd9 SHA1: 7c91bce101d3f796cccbc1a6744c1ea389fff73f SHA256: 2b99caf9783b520bd2fe46d7e4cf810d60b49a93564fcb3d18e4a38904396086 pkg:maven/org.springframework.boot/spring-boot-autoconfigure@2.6.2 spring-boot-starter-aop-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter-aop/2.6.2/spring-boot-starter-aop-2.6.2.jar MD5: b69e33c490d506dc959d1ab801c3b85f SHA1: af16c0de56462ef8a6a9ac63cff30bf5120fc5b3 SHA256: c5bf05e42fc25a8c0fa4c77a7a48fa6d86495d20191019f6552458cde052ab46 pkg:maven/org.springframework.boot/spring-boot-starter-aop@2.6.2 spring-boot-starter-data-jpa-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter-data-jpa/2.6.2/spring-boot-starter-data-jpa-2.6.2.jar MD5: fd565de75209a0b0dee01536a556ae6e SHA1: 3eb637ccd03194f1d639b9efed1ff7d73c8592e3 SHA256: 40825d0ca4b51968542a77cf8e78774fb27de4502895852c185700e873bf94f6 pkg:maven/org.springframework.boot/spring-boot-starter-data-jpa@2.6.2 spring-boot-starter-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter/2.6.2/spring-boot-starter-2.6.2.jar MD5: e7dd83e12342cdea36446589f3140b5c SHA1: c36f1f6886cdbedc5347fdea62b97b44b053b0ba SHA256: 98fe30d08ff475b9724acf3c3a23945f3c32c5561cb1f922f37a2cfe7b5c6b96 pkg:maven/org.springframework.boot/spring-boot-starter@2.6.2 spring-boot-starter-jdbc-2.6.2.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/boot/spring-boot-starter-jdbc/2.6.2/spring-boot-starter-jdbc-2.6.2.jar MD5: d5f22a2954c767fb530df0b4e9eea452 SHA1: ff853babf286bf913d73197d0f0b521343d5e8aa SHA256: 6679bcec14437bed15f293091faaa0dfbe9fd53acab29ad3c505fdd41ff53fd6 pkg:maven/org.springframework.boot/spring-boot-starter-jdbc@2.6.2 Published Vulnerabilities CVE-2013-4152 suppress
The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2013-7315 suppress
The Spring MVC in Spring Framework before 3.2.4 and 4.0.0.M1 through 4.0.0.M2 does not disable external entity resolution for the StAX XMLInputFactory, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML with JAXB, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152. NOTE: this issue was SPLIT from CVE-2013-4152 due to different affected versions. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2014-0054 suppress
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4152, CVE-2013-7315, and CVE-2013-6429. CWE-352 Cross-Site Request Forgery (CSRF)
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2018-11039 suppress
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-11040 suppress
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. CWE-829 Inclusion of Functionality from Untrusted Control Sphere
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-1257 suppress
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2020-5421 suppress
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. NVD-CWE-noinfo
CVSSv2:
Base Score: LOW (3.6) Vector: /AV:N/AC:H/Au:S/C:P/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
spring-core-4.3.30.RELEASE.jarDescription:
Spring Core License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-core/4.3.30.RELEASE/spring-core-4.3.30.RELEASE.jar
MD5: e34fafcb6ea7a2c9db80a686af31a27e
SHA1: b255bb7389e582d24574f75bc0c880ffb8103dfa
SHA256: 94a64b38e9dfa22df3c67664aea08aed559110bed386a736cb02a01d0254b236
Referenced In Projects/Scopes: TheseFoolishThings :: Roles :: Spring:compile TheseFoolishThings :: MessageBus :: Spring:compile Evidence Type Source Name Value Confidence Vendor hint analyzer vendor vmware Highest Vendor pom name Spring Core High Vendor jar package name core Highest Vendor hint analyzer vendor SpringSource Highest Vendor pom groupid org.springframework Highest Vendor jar package name springframework Highest Vendor file name spring-core High Vendor pom organization name Spring IO High Vendor hint analyzer vendor pivotal software Highest Vendor pom groupid springframework Highest Vendor pom organization url https://projects.spring.io/spring-framework Medium Vendor jar package name io Highest Vendor pom url spring-projects/spring-framework Highest Vendor pom artifactid spring-core Low Product pom url spring-projects/spring-framework High Product pom artifactid spring-core Highest Product pom name Spring Core High Product jar package name core Highest Product pom organization name Spring IO Low Product pom organization url https://projects.spring.io/spring-framework Low Product hint analyzer product springsource_spring_framework Highest Product jar package name springframework Highest Product file name spring-core High Product pom groupid springframework Highest Product Manifest Implementation-Title spring-core High Product jar package name io Highest Version pom version 4.3.30.RELEASE Highest Version Manifest Implementation-Version 4.3.30.RELEASE High
Related Dependencies spring-expression-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-expression/4.3.30.RELEASE/spring-expression-4.3.30.RELEASE.jar MD5: e9959f3eadbef7006c2721f27b324627 SHA1: 6ce0709c6899dde41a7213ccccfe2535e34c80fe SHA256: 21f6d95c15e1b93675b958c69cd9309754c6909dd25c01f120a3934de7e37749 pkg:maven/org.springframework/spring-expression@4.3.30.RELEASE spring-beans-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-beans/4.3.30.RELEASE/spring-beans-4.3.30.RELEASE.jar MD5: b07f7e509363f40654543bdab520dffd SHA1: fd6d361c817081ef9d2101e912b2cd9825c9f02a SHA256: 31575e38cbb0da38e88b166215d42b6024c6df08b29c21fa89361d15c533a741 pkg:maven/org.springframework/spring-beans@4.3.30.RELEASE spring-aspects-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-aspects/4.3.30.RELEASE/spring-aspects-4.3.30.RELEASE.jar MD5: f283d9dff89caca6475f7a651e030291 SHA1: 49080b05d93bb927e489d0d0b90dcb181b670dfd SHA256: af1fa23633ee8ee60ee879467ecb21fbdf135aacce47350f1fb38c7b446dd8bc pkg:maven/org.springframework/spring-aspects@4.3.30.RELEASE spring-context-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-context/4.3.30.RELEASE/spring-context-4.3.30.RELEASE.jar MD5: 490f15abc264678f2ef1e6f9d3a55926 SHA1: 6a66a573322d555fb97ce44419f032d266f94cc4 SHA256: 27b5bab0d84670d21cbcaeec53bfa323031d1bbfc22b01afbe8f136b825309b0 pkg:maven/org.springframework/spring-context@4.3.30.RELEASE spring-aop-4.3.30.RELEASE.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-aop/4.3.30.RELEASE/spring-aop-4.3.30.RELEASE.jar MD5: e718caefc0083dd07f9c5b69d878d193 SHA1: 0b2a6f86ea659114df66cc5d5763667c96336efd SHA256: 717129d1a0dc19f12c923eacbcf0d4efd45d33a326c6655c3279297afa30ee0b pkg:maven/org.springframework/spring-aop@4.3.30.RELEASE Published Vulnerabilities CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
spring-core-5.3.14.jarDescription:
Spring Core License:
Apache License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-core/5.3.14/spring-core-5.3.14.jar
MD5: b9d1f2454c4b7d94c058026d272dfc3c
SHA1: d87ad19f9d8b9a3f1a143db5a2be34c61751aaa2
SHA256: 00ffcfb2671e0c8cab33f75939c97e04127fcfd2e0670032c59b6f48d791b772
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Swing:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor hint analyzer vendor vmware Highest Vendor pom name Spring Core High Vendor jar package name core Highest Vendor hint analyzer vendor SpringSource Highest Vendor pom groupid org.springframework Highest Vendor Manifest automatic-module-name spring.core Medium Vendor jar package name springframework Highest Vendor pom organization url https://spring.io/projects/spring-framework Medium Vendor file name spring-core High Vendor pom organization name Spring IO High Vendor hint analyzer vendor pivotal software Highest Vendor pom groupid springframework Highest Vendor jar package name io Highest Vendor pom url spring-projects/spring-framework Highest Vendor pom artifactid spring-core Low Product pom url spring-projects/spring-framework High Product pom artifactid spring-core Highest Product pom name Spring Core High Product jar package name core Highest Product pom organization name Spring IO Low Product hint analyzer product springsource_spring_framework Highest Product Manifest automatic-module-name spring.core Medium Product jar package name springframework Highest Product file name spring-core High Product pom groupid springframework Highest Product Manifest Implementation-Title spring-core High Product jar package name io Highest Product pom organization url https://spring.io/projects/spring-framework Low Version Manifest Implementation-Version 5.3.14 High Version file version 5.3.14 High Version pom version 5.3.14 Highest
Related Dependencies spring-beans-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-beans/5.3.14/spring-beans-5.3.14.jar MD5: 04f9dc60a62319c97f140b8ebc98f797 SHA1: 24cc27af89edc1581a57bb15bc160d2353f40a0e SHA256: b354f54923139b8d86bc594452a6f53329da7b1e0c2a6402f9d9ca24837091ad pkg:maven/org.springframework/spring-beans@5.3.14 spring-jdbc-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-jdbc/5.3.14/spring-jdbc-5.3.14.jar MD5: 3ef2deb22cb6dbfb75f903c6ea72710f SHA1: f209e8d165dbcfc018aa4f741fbe75844eb45ff8 SHA256: dfe9b62359e6c1558a107c1d4aca02560d0d0e81e025e80c26e1b60b0ba3098d pkg:maven/org.springframework/spring-jdbc@5.3.14 spring-expression-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-expression/5.3.14/spring-expression-5.3.14.jar MD5: 1d268dba90b89964d97254bae133a431 SHA1: 5cd4c568522b7084afac5d2ac6cb945b797b3f16 SHA256: f196833d5bca28b12fbb4ae3265c0f0c4dc9fb4c726b3bfc4cabcc129cd21cf7 pkg:maven/org.springframework/spring-expression@5.3.14 spring-orm-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-orm/5.3.14/spring-orm-5.3.14.jar MD5: 13fb3663deac6f4a60d25c16981a55f7 SHA1: 5ec15c098a56205ff77c7792e9dad30f5be16b5a SHA256: c74dc10593c7f0961127befaf02be62d0d0b974970b056a0bc89ec4924d80627 pkg:maven/org.springframework/spring-orm@5.3.14 spring-context-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-context/5.3.14/spring-context-5.3.14.jar MD5: 731eee1b78fa01375de10fd95b84455d SHA1: ce6042492f042131f602bdc83fcb412b142bdac5 SHA256: 25efd823c10f3afbe1b65efe97370def475d202dd91477f66eb5685e746e2819 pkg:maven/org.springframework/spring-context@5.3.14 spring-jcl-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-jcl/5.3.14/spring-jcl-5.3.14.jar MD5: dd81ad7cd0aa5b6f0225d6a0341edd9a SHA1: ffcf745ed5ba32930771378316fd08e97986bec2 SHA256: b522a60d1f37b8f8b3b6ab58617df850b55fee6d82011b879a62574e068946aa pkg:maven/org.springframework/spring-jcl@5.3.14 spring-aspects-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-aspects/5.3.14/spring-aspects-5.3.14.jar MD5: f41ab1c45453af3f6ff97f24c9886fe9 SHA1: bf5de7c1338c2684d834bef8f389ef3d747f9f56 SHA256: 876dedec1983351faa5c65e07487b8ea70da36c2472ac789810f461561610cee pkg:maven/org.springframework/spring-aspects@5.3.14 spring-aop-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-aop/5.3.14/spring-aop-5.3.14.jar MD5: 953a41d016a5bc9d9e8ace3d90d499c9 SHA1: f049146a55991e89c0f04b9624f1f69e1763d80f SHA256: 1f6bb90bc78fa69506841c24c33f29790650e092dab96a35e56441f045ae216d pkg:maven/org.springframework/spring-aop@5.3.14 spring-tx-5.3.14.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/spring-tx/5.3.14/spring-tx-5.3.14.jar MD5: 0b2bacf1b32bbdd73753aafb4136f192 SHA1: 03d80a1e051f071e9cd42fc99698bf9022862b5c SHA256: 816c0e855f8e8f58bb0d2c3083f4bc0505f602e25597da18fdd61584f84156fc pkg:maven/org.springframework/spring-tx@5.3.14 Published Vulnerabilities CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22971 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
spring-data-commons-2.6.0.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/data/spring-data-commons/2.6.0/spring-data-commons-2.6.0.jarMD5: bcf27a3e9c58cf484184ae6dda921b55SHA1: 5a9afaa6e0a4cd74183a794f467c9b4a546b4cbeSHA256: 2d784e87491b762789a7d77969e61603902e77033d9b526d8898ebc84fe8f0a1Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor jar package name data Highest Vendor file name spring-data-commons High Vendor hint analyzer vendor vmware Highest Vendor jar package name core Highest Vendor pom name Spring Data Core High Vendor pom artifactid spring-data-commons Low Vendor hint analyzer vendor SpringSource Highest Vendor pom groupid org.springframework.data Highest Vendor jar package name springframework Highest Vendor pom parent-groupid org.springframework.data.build Medium Vendor Manifest automatic-module-name spring.data.commons Medium Vendor pom groupid springframework.data Highest Vendor Manifest build-jdk-spec 1.8 Low Vendor hint analyzer vendor pivotal software Highest Vendor pom parent-artifactid spring-data-parent Low Product jar package name data Highest Product file name spring-data-commons High Product jar package name core Highest Product pom name Spring Data Core High Product pom artifactid spring-data-commons Highest Product jar package name springframework Highest Product pom parent-groupid org.springframework.data.build Medium Product Manifest automatic-module-name spring.data.commons Medium Product pom groupid springframework.data Highest Product pom parent-artifactid spring-data-parent Medium Product Manifest build-jdk-spec 1.8 Low Product Manifest Implementation-Title Spring Data Core High Version Manifest Implementation-Version 2.6.0 High Version file version 2.6.0 High Version pom version 2.6.0 Highest
Published Vulnerabilities CVE-2013-4152 suppress
The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2013-7315 suppress
The Spring MVC in Spring Framework before 3.2.4 and 4.0.0.M1 through 4.0.0.M2 does not disable external entity resolution for the StAX XMLInputFactory, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML with JAXB, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152. NOTE: this issue was SPLIT from CVE-2013-4152 due to different affected versions. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2014-0054 suppress
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4152, CVE-2013-7315, and CVE-2013-6429. CWE-352 Cross-Site Request Forgery (CSRF)
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2018-11039 suppress
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-11040 suppress
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. CWE-829 Inclusion of Functionality from Untrusted Control Sphere
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-1257 suppress
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2020-5421 suppress
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. NVD-CWE-noinfo
CVSSv2:
Base Score: LOW (3.6) Vector: /AV:N/AC:H/Au:S/C:P/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
spring-data-jpa-2.6.0.jarDescription:
Spring Data module for JPA repositories. File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/springframework/data/spring-data-jpa/2.6.0/spring-data-jpa-2.6.0.jarMD5: 50ddb96bd3bc08acf0376939595c6a9aSHA1: bd08ea8db76c7c82397307dda2e253180c31b7ecSHA256: 4107be1cca55f9a1ac60959354db1ede4c33587c223a22303ee4e48187d4a415Referenced In Project/Scope: TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile
Evidence Type Source Name Value Confidence Vendor Manifest automatic-module-name spring.data.jpa Medium Vendor jar package name data Highest Vendor hint analyzer vendor vmware Highest Vendor pom artifactid spring-data-jpa Low Vendor pom name Spring Data JPA High Vendor hint analyzer vendor SpringSource Highest Vendor pom groupid org.springframework.data Highest Vendor jar package name springframework Highest Vendor pom url https://projects.spring.io/spring-data-jpa Highest Vendor pom parent-groupid org.springframework.data.build Medium Vendor file name spring-data-jpa High Vendor pom groupid springframework.data Highest Vendor Manifest build-jdk-spec 1.8 Low Vendor hint analyzer vendor pivotal software Highest Vendor jar package name jpa Highest Vendor pom parent-artifactid spring-data-parent Low Product jar package name data Highest Product Manifest automatic-module-name spring.data.jpa Medium Product pom name Spring Data JPA High Product jar package name springframework Highest Product pom parent-groupid org.springframework.data.build Medium Product file name spring-data-jpa High Product pom url https://projects.spring.io/spring-data-jpa Medium Product pom groupid springframework.data Highest Product pom parent-artifactid spring-data-parent Medium Product Manifest build-jdk-spec 1.8 Low Product jar package name jpa Highest Product pom artifactid spring-data-jpa Highest Product Manifest Implementation-Title Spring Data JPA High Version Manifest Implementation-Version 2.6.0 High Version file version 2.6.0 High Version pom version 2.6.0 Highest
Published Vulnerabilities CVE-2013-4152 suppress
The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2013-7315 suppress
The Spring MVC in Spring Framework before 3.2.4 and 4.0.0.M1 through 4.0.0.M2 does not disable external entity resolution for the StAX XMLInputFactory, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML with JAXB, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152. NOTE: this issue was SPLIT from CVE-2013-4152 due to different affected versions. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2014-0054 suppress
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4152, CVE-2013-7315, and CVE-2013-6429. CWE-352 Cross-Site Request Forgery (CSRF)
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2016-1000027 suppress
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. CWE-502 Deserialization of Untrusted Data
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions:
CVE-2018-11039 suppress
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-11040 suppress
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. CWE-829 Inclusion of Functionality from Untrusted Control Sphere
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2018-1257 suppress
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2020-5421 suppress
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. NVD-CWE-noinfo
CVSSv2:
Base Score: LOW (3.6) Vector: /AV:N/AC:H/Au:S/C:P/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22950 suppress
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22965 suppress
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. CWE-94 Improper Control of Generation of Code ('Code Injection')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References:
Vulnerable Software & Versions: (show all )
CVE-2022-22968 suppress
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. CWE-178 Improper Handling of Case Sensitivity
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References:
Vulnerable Software & Versions: (show all )
CVE-2022-22970 suppress
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. CWE-770 Allocation of Resources Without Limits or Throttling
CVSSv2:
Base Score: LOW (3.5) Vector: /AV:N/AC:M/Au:S/C:N/I:N/A:P CVSSv3:
Base Score: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H References:
Vulnerable Software & Versions: (show all )
testng-6.9.10.jarDescription:
Testing framework for Java License:
Apache Version 2.0, January 2004 File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/testng/testng/6.9.10/testng-6.9.10.jar
MD5: 83e26cb672a81f5bbda139436ef4d8d0
SHA1: 6feb3e964aeb7097aff30c372aac3ec0f8d87ede
SHA256: 240ae7bbcf066aadff967b42a27a697693bf5a4e6a5ff4bf339b6bfe371288e4
Referenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor file name testng High Vendor Manifest build-time 01:14:26.500+0400 Low Vendor pom groupid org.testng Highest Vendor pom groupid testng Highest Vendor Manifest build-date 2015-12-16 Low Vendor pom name testng High Vendor Manifest bundle-symbolicname org.testng Medium Vendor jar package name testng Highest Vendor pom url http://github.com/cbeust/testng Highest Vendor pom artifactid testng Low Product file name testng High Product Manifest Bundle-Name testng Medium Product Manifest specification-title testng Medium Product Manifest build-time 01:14:26.500+0400 Low Product pom groupid testng Highest Product Manifest build-date 2015-12-16 Low Product pom name testng High Product pom artifactid testng Highest Product Manifest bundle-symbolicname org.testng Medium Product jar package name testng Highest Product pom url http://github.com/cbeust/testng Medium Version Manifest Bundle-Version 6.9.10 High Version pom version 6.9.10 Highest Version Manifest specification-version 6.9.10 High Version file version 6.9.10 High
Published Vulnerabilities CVE-2019-11358 (OSSINDEX) suppress
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2019-11358 for details CWE-1321
CVSSv2:
Base Score: MEDIUM (6.1) Vector: /AV:N/AC:L/Au:/C:L/I:L/A:N References:
Vulnerable Software & Versions (OSSINDEX):
cpe:2.3:a:org.testng:testng:6.9.10:*:*:*:*:*:*:* testng-6.9.10.jar: jquery-1.7.1.min.jsFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/testng/testng/6.9.10/testng-6.9.10.jar/jquery-1.7.1.min.jsMD5: ddb84c1587287b2df08966081ef063bfSHA1: 9eb9ac595e9b5544e2dc79fff7cd2d0b4b5ef71fSHA256: 88171413fc76dda23ab32baa17b11e4fff89141c633ece737852445f1ba6c1bdReferenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence Vendor file name jquery High Product file name jquery High Version file version 1.7.1.min High
Published Vulnerabilities CVE-2012-6708 suppress
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions up to (excluding) 1.9.0 CVE-2015-9251 suppress
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:oracle:enterprise_operations_monitor:3.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_invoice_matching:15.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:real-time_scheduler:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.6 cpe:2.3:a:oracle:financial_services_asset_liability_management:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_reconciliation_framework:8.0.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_interactive_session_recorder:6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_reconciliation_framework:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_allocation:15.0.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_process_management_suite:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_ui_framework:18.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:utilities_mobile_workforce_management:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_interactive_session_recorder:6.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:*:*:*:*:*:*:*:* versions from (including) 8.0.5; versions up to (including) 8.0.7 cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions up to (excluding) 3.0.0 cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:* versions from (including) 4.3.0.1; versions up to (including) 4.3.0.4 cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_sales_audit:15.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_workforce_management_software:1.64.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:*:*:*:*:*:*:*:* versions from (including) 8.0.2; versions up to (including) 8.0.7 cpe:2.3:a:oracle:weblogic_server:12.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_interactive_session_recorder:6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:*:*:*:*:*:*:*:* versions from (including) 8.0.2; versions up to (including) 8.0.6 cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:* versions up to (excluding) 7.2 cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:endeca_information_discovery_studio:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_ui_framework:18.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:oss_support_tools:19.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:* versions from (including) 17.1; versions up to (including) 17.12 cpe:2.3:a:oracle:communications_services_gatekeeper:*:*:*:*:*:*:*:* versions up to (excluding) 6.1.0.4.0 cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_reporting_and_analytics:9.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 8.0.0; versions up to (including) 8.0.7 cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_cruise_fleet_management:9.0.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:17.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_workforce_management_software:1.60.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 7.3.3; versions up to (including) 7.3.5 cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:* versions up to (excluding) 7.0.0.1 cpe:2.3:a:oracle:enterprise_operations_monitor:4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_process_management_suite:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:* CVE-2019-11358 suppress
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. CWE-1321
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_returns_management:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_asset_liability_management:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:* versions from (including) 17.7; versions up to (including) 17.12 cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 19.12.0; versions up to (including) 19.12.4 cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_back_office:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:* versions from (including) 16.1.0; versions up to (including) 16.4.0 cpe:2.3:a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation_for_mobile_devices:*:*:*:*:*:*:*:* versions from (including) 12.2.0; versions up to (including) 12.2.15 cpe:2.3:a:oracle:retail_central_office:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions up to (excluding) 3.4.0 cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_retail_customer_analytics:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.6 cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper_and_adf:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.6.0; versions up to (excluding) 8.6.15 cpe:2.3:a:oracle:siebel_ui_framework:20.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_application_session_controller:3.8m0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper_and_adf:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:18.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:* versions from (including) 5.0.0.0; versions up to (including) 5.6.0.0 cpe:2.3:a:oracle:application_service_level_management:13.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_retail_performance_analytics:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation:10.4.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_us_federal_reserve:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:financial_services_data_foundation:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.8 cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:* versions up to (excluding) 19.1 cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:bi_publisher:5.5.0.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_governance_for_us_regulatory_reporting:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.9 cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.4.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_european_banking_authority:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_ifrs_17_analyzer:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:*:*:*:*:*:*:*:* versions from (including) 8.0.5; versions up to (including) 8.0.7 cpe:2.3:a:oracle:insurance_data_foundation:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:*:*:*:*:*:*:*:* versions from (including) 8.0.2; versions up to (including) 8.0.7 cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:backdropcms:backdrop:*:*:*:*:*:*:*:* versions from (including) 1.11.0; versions up to (excluding) 1.11.9 cpe:2.3:a:redhat:cloudforms:4.7:*:*:*:*:*:*:* cpe:2.3:a:backdropcms:backdrop:*:*:*:*:*:*:*:* versions from (including) 1.12.0; versions up to (excluding) 1.12.6 cpe:2.3:a:oracle:policy_automation:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:knowledge:*:*:*:*:*:*:*:* versions from (including) 8.6.0; versions up to (including) 8.6.3 cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_accounting_analyzer:8.0.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_enterprise_financial_performance_analytics:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:system_utilities:19.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:big_data_discovery:1.6:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:* versions from (including) 3.0; versions up to (including) 3.1.3 cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:15.2.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:* versions from (including) 2.4.0; versions up to (including) 2.10.0 cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 16.2.0; versions up to (including) 16.2.11 cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.5.0; versions up to (excluding) 8.5.15 cpe:2.3:a:oracle:diagnostic_assistant:2.12.36:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 17.12.0; versions up to (including) 17.12.7 cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:*:*:*:*:*:*:*:* versions from (including) 19.1.0; versions up to (including) 19.1.2 cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_balance_sheet_planning:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:tape_library_acsls:8.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_point-of-service:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:4.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_asset_liability_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_mobile_applications:*:*:*:*:*:*:*:* versions up to (including) 19.8 cpe:2.3:a:oracle:communications_operations_monitor:*:*:*:*:*:*:*:* versions from (including) 4.1; versions up to (including) 4.3 cpe:2.3:a:oracle:utilities_mobile_workforce_management:*:*:*:*:*:*:*:* versions from (including) 2.3.0.1; versions up to (including) 2.3.0.3 cpe:2.3:a:oracle:financial_services_retail_performance_analytics:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* versions from (including) 3.0.0; versions up to (including) 3.9.4 cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:11.2.0.4:*:*:*:-:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_performance_insight:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_ifrs_17_analyzer:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_enterprise_financial_performance_analytics:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_service_level_management:13.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:service_bus:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:tape_library_acsls:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:12.1.0.2:*:*:*:-:*:*:* cpe:2.3:a:oracle:policy_automation:12.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:19c:*:*:*:-:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.0.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:12.2.0.1:*:*:*:-:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.4.0.0:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 7.0; versions up to (excluding) 7.66 cpe:2.3:a:oracle:communications_unified_inventory_management:7.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_interactive_session_recorder:*:*:*:*:*:*:*:* versions from (including) 6.0; versions up to (including) 6.4 cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:real-time_scheduler:*:*:*:*:*:*:*:* versions from (including) 2.3.0.1; versions up to (including) 2.3.0.3 cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.4.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_de_nederlandsche_bank:8.0.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:identity_manager:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 18.8.0; versions up to (including) 18.8.9 cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_enterprise_collections:*:*:*:*:*:*:*:* versions from (including) 2.7.0; versions up to (including) 2.8.0 cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_european_banking_authority:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.5.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 7.3.3; versions up to (including) 7.3.5 cpe:2.3:a:oracle:rest_data_services:18c:*:*:*:-:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 8.0.2; versions up to (including) 8.1.0 cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:*:*:*:*:*:*:*:* versions from (including) 8.0.4; versions up to (including) 8.0.7 cpe:2.3:a:oracle:jdeveloper_and_adf:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:* versions from (including) 12.2.0; versions up to (including) 12.2.15 cpe:2.3:a:oracle:transportation_management:1.4.3:*:*:*:*:*:*:* CVE-2020-11022 suppress
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:oracle:hospitality_simphony:*:*:*:*:*:*:*:* versions from (including) 19.1.0; versions up to (including) 19.1.2 cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_returns_management:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:* versions up to (excluding) 21.1.2 cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_balance_sheet_planning:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.7.0; versions up to (excluding) 8.7.14 cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_back_office:14.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:* versions from (including) 16.1.0; versions up to (including) 16.4.0 cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:19.1.0-19.1.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_asset_liability_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_supplier_collaboration_for_process:6.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\::*:*:*:*:*:*:*:* versions from (including) 8.0.0; versions up to (including) 8.2.2 cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_data_foundation:8.0.6-8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_ui_framework:20.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_application_session_controller:3.8m0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_foundation:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.1.0 cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_simphony:18.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_data_foundation:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.1.0 cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:* versions from (including) 5.0.0.0; versions up to (including) 5.6.0.0 cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_integration_hub:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:* versions up to (excluding) 6.0.9 cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.8.0; versions up to (excluding) 8.8.6 cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:* versions from (including) 12.2.0; versions up to (including) 12.2.20 cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_data_governance_for_us_regulatory_reporting:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.9 cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions from (including) 1.2; versions up to (excluding) 3.5.0 cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 7.0; versions up to (excluding) 7.70 cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:policy_automation_for_mobile_devices:*:*:*:*:*:*:*:* versions from (including) 12.2.0; versions up to (including) 12.2.20 cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_foundation:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_us_federal_reserve:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.9 cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.0.8 cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 8.0.6.0.0; versions up to (including) 8.1.0.0.0 cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_european_banking_authority:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.1.0 cpe:2.3:a:oracle:insurance_accounting_analyzer:8.0.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:* versions from (including) 3.0; versions up to (including) 3.1.3 cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_digital_experience:*:*:*:*:*:*:*:* versions from (including) 18.1; versions up to (including) 20.1 cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_profitability_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_asset_liability_management:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* versions from (including) 8.0.6; versions up to (including) 8.1.0 cpe:2.3:a:oracle:financial_services_asset_liability_management:8.0.7:*:*:*:*:*:*:* CVE-2020-11023 suppress
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N CVSSv3:
Base Score: MEDIUM (6.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N References:
Vulnerable Software & Versions (NVD):
cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 17.12.0; versions up to (including) 17.12.7 cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:12.1.0.2:*:*:*:-:*:*:* cpe:2.3:a:oracle:rest_data_services:19c:*:*:*:-:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.7.0; versions up to (excluding) 8.7.14 cpe:2.3:a:oracle:rest_data_services:12.2.0.1:*:*:*:-:*:*:* cpe:2.3:a:oracle:hyperion_financial_reporting:11.1.2.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 19.12.0; versions up to (including) 19.12.4 cpe:2.3:a:oracle:oss_support_tools:*:*:*:*:*:*:*:* versions up to (excluding) 2.12.41 cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_interactive_session_recorder:*:*:*:*:*:*:*:* versions from (including) 6.1; versions up to (including) 6.4 cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:* versions from (including) 16.1.0; versions up to (including) 16.4.0 cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 7.0; versions up to (excluding) 7.70 cpe:2.3:a:netapp:snapcenter_server:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_mobile:*:*:*:*:*:*:*:* versions up to (including) 20.12 cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* versions up to (excluding) 9.2.5.0 cpe:2.3:a:oracle:healthcare_translational_research:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management_resources:9.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:healthcare_translational_research:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_de_nederlandsche_bank:8.0.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:* versions up to (excluding) 9.2.5.0 cpe:2.3:a:oracle:healthcare_translational_research:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 18.8.0; versions up to (including) 18.8.9 cpe:2.3:a:oracle:communications_operations_monitor:*:*:*:*:*:*:*:* versions from (including) 4.1; versions up to (including) 4.3 cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_enterprise_collections:*:*:*:*:*:*:*:* versions from (including) 2.7.0; versions up to (including) 2.8.0 cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:* versions up to (excluding) 20.2 cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:* versions from (including) 3.0; versions up to (including) 3.1.3 cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:11.2.0.4:*:*:*:-:*:*:* cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:* versions from (including) 2.4.0; versions up to (including) 2.10.0 cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:* versions up to (excluding) 6.0.9 cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:* versions from (including) 1.0.3; versions up to (excluding) 3.5.0 cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:rest_data_services:18c:*:*:*:-:*:*:* cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 8.8.0; versions up to (excluding) 8.8.6 cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 16.2; versions up to (including) 16.2.11 cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:health_sciences_inform:6.3.0:*:*:*:*:*:*:* testng-6.9.10.jar: testng-reports.jsFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/testng/testng/6.9.10/testng-6.9.10.jar/testng-reports.jsMD5: 4311beca6e78e253ebd35f4f8c46166dSHA1: f40c090d15e2e6eb179b4eb3919c365afe882adeSHA256: 45616558165413f0bc3f315e6bd52f7f4238d384169b3355e2e0465a611642cbReferenced In Project/Scope: TheseFoolishThings :: Test Utilities:compile
Evidence Type Source Name Value Confidence
txw2-2.3.5.jarDescription:
TXW is a library that allows you to write XML documents.
File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/org/glassfish/jaxb/txw2/2.3.5/txw2-2.3.5.jarMD5: 67005a4cf5ee9cfd82edec1bdbecb32bSHA1: ec8930fa62e7b1758b1664d135f50c7abe86a4a3SHA256: 7d75ea1151367fb66287011d9941715f645922932554acba0c5ac3aec67fb01fReferenced In Projects/Scopes:
TheseFoolishThings :: Examples :: Finder :: JPA Finder:compile TheseFoolishThings :: Examples :: DCI :: Persistence JPA:compile Evidence Type Source Name Value Confidence Vendor pom artifactid txw2 Low Vendor pom url https://eclipse-ee4j.github.io/jaxb-ri/ Highest Vendor Manifest git-revision f01d8db Low Vendor pom parent-artifactid jaxb-txw-parent Low Vendor pom name TXW2 Runtime High Vendor jar (hint) package name oracle Highest Vendor pom groupid glassfish.jaxb Highest Vendor jar package name sun Highest Vendor file name txw2 High Vendor pom groupid org.glassfish.jaxb Highest Vendor Manifest Implementation-Vendor-Id org.eclipse Medium Vendor jar package name txw2 Highest Vendor Manifest Implementation-Vendor Eclipse Foundation High Vendor jar package name xml Highest Vendor jar package name txw Highest Vendor pom parent-groupid com.sun.xml.bind.mvn Medium Product Manifest specification-title Jakarta XML Binding Medium Product Manifest git-revision f01d8db Low Product pom name TXW2 Runtime High Product pom groupid glassfish.jaxb Highest Product jar package name sun Highest Product pom url https://eclipse-ee4j.github.io/jaxb-ri/ Medium Product file name txw2 High Product pom artifactid txw2 Highest Product pom parent-artifactid jaxb-txw-parent Medium Product Manifest Implementation-Title Jakarta XML Binding Implementation High Product jar package name txw2 Highest Product jar package name xml Highest Product jar package name txw Highest Product pom parent-groupid com.sun.xml.bind.mvn Medium Version pom version 2.3.5 Highest Version Manifest major-version 2.3.5 Medium Version Manifest build-id 2.3.5 Medium Version Manifest Implementation-Version 2.3.5 High Version file version 2.3.5 High
uuid-2.1.5.jarFile Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/eaio/uuid/2.1.5/uuid-2.1.5.jarMD5: aec8f2716d5e9abd040afb744bf4f32bSHA1: 69f75f7ff06261b00bcd77408bb457e5f80d29fdSHA256: d4cf42667d4f314931fb7a7fc8ea19ad3001764d769a174e78284a58677ec248Referenced In Project/Scope: TheseFoolishThings :: Actors:compile
Evidence Type Source Name Value Confidence Vendor pom artifactid uuid Low Vendor jar package name eaio Highest Vendor jar package name uuid Highest Vendor file name uuid High Vendor pom groupid com.eaio Highest Vendor manifest: com/eaio/uuid Implementation-Vendor eaio (<http://eaio.com>) Medium Vendor pom groupid eaio Highest Product pom artifactid uuid Highest Product jar package name eaio Highest Product jar package name uuid Highest Product file name uuid High Product pom groupid eaio Highest Product manifest: com/eaio/uuid Implementation-Title eaio: UUID - generate UUIDs (or GUIDs) in Java Medium Version pom version 2.1.5 Highest Version file version 2.1.5 High
xmlpull-1.1.3.1.jarLicense:
Public Domain: http://www.xmlpull.org/v1/download/unpacked/LICENSE.txt File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar
MD5: cc57dacc720eca721a50e78934b822d2
SHA1: 2b8e230d2ab644e4ecaa94db7cdedbc40c805dfa
SHA256: 34e08ee62116071cbb69c0ed70d15a7a5b208d62798c59f2120bb8929324cb63
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor jar package name v1 Low Vendor pom artifactid xmlpull Low Vendor jar package name xmlpull Highest Vendor pom name XML Pull Parsing API High Vendor pom url http://www.xmlpull.org Highest Vendor file name xmlpull High Vendor jar package name xmlpull Low Vendor pom groupid xmlpull Highest Product jar package name v1 Low Product jar package name xmlpull Highest Product pom name XML Pull Parsing API High Product pom url http://www.xmlpull.org Medium Product pom artifactid xmlpull Highest Product file name xmlpull High Product pom groupid xmlpull Highest Version file version 1.1.3.1 High Version pom version 1.1.3.1 Highest
xstream-1.4.20.jarDescription:
XStream is a serialization library from Java objects to XML and back. License:
BSD-3-Clause File Path: /Volumes/Users/fritz/LocalData/Business/Tidalwave/Projects/WorkAreas/tidalwave.bitbucket.io/repository/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar
MD5: 1e816f33b1eb780a309789478051faeb
SHA1: 0e2315b8b2e95e9f21697833c8e56cdd9c98a5ee
SHA256: 87df0f0be57c92037d0110fbb225a30b651702dc275653d285afcfef31bc2e81
Referenced In Projects/Scopes: TheseFoolishThings :: Examples :: DCI :: Marshal XStream:compile TheseFoolishThings :: Examples :: DCI :: Displayable:compile Evidence Type Source Name Value Confidence Vendor pom name XStream Core High Vendor Manifest x-build-os Linux Low Vendor Manifest x-build-time 2022-12-23T23:21:05Z Low Vendor Manifest Implementation-Vendor-Id com.thoughtworks.xstream Medium Vendor Manifest java_1_5_home /opt/sun-jdk-1.5.0.22 Low Vendor jar package name xstream Highest Vendor Manifest x-compile-target 1.4 Low Vendor Manifest Implementation-Vendor XStream High Vendor Manifest java_1_6_home /opt/sun-jdk-1.6.0.45 Low Vendor Manifest bundle-docurl http://x-stream.github.io Low Vendor pom groupid com.thoughtworks.xstream Highest Vendor Manifest specification-vendor XStream Low Vendor pom groupid thoughtworks.xstream Highest Vendor Manifest java_9_home /opt/oracle-jdk-bin-9.0.4 Low Vendor jar package name core Highest Vendor jar package name thoughtworks Highest Vendor pom parent-groupid com.thoughtworks.xstream Medium Vendor Manifest java_1_8_home /opt/oracle-jdk-bin-1.8.0.202 Low Vendor Manifest bundle-symbolicname xstream Medium Vendor Manifest java_1_4_home /opt/blackdown-jdk-1.4.2.03 Low Vendor file name xstream High Vendor Manifest x-compile-source 1.4 Low Vendor pom artifactid xstream Low Vendor Manifest x-builder Maven 3.8.6 Low Vendor Manifest java_1_7_home /opt/oracle-jdk-bin-1.7.0.80 Low Vendor pom parent-artifactid xstream-parent Low Product pom name XStream Core High Product Manifest x-build-os Linux Low Product Manifest x-build-time 2022-12-23T23:21:05Z Low Product Manifest java_1_5_home /opt/sun-jdk-1.5.0.22 Low Product jar package name xstream Highest Product Manifest x-compile-target 1.4 Low Product Manifest Implementation-Title XStream Core High Product pom parent-artifactid xstream-parent Medium Product jar package name xml Highest Product jar package name io Highest Product Manifest java_1_6_home /opt/sun-jdk-1.6.0.45 Low Product Manifest bundle-docurl http://x-stream.github.io Low Product pom groupid thoughtworks.xstream Highest Product jar package name core Highest Product Manifest java_9_home /opt/oracle-jdk-bin-9.0.4 Low Product Manifest specification-title XStream Core Medium Product jar package name thoughtworks Highest Product Manifest Bundle-Name XStream Core Medium Product pom parent-groupid com.thoughtworks.xstream Medium Product Manifest java_1_8_home /opt/oracle-jdk-bin-1.8.0.202 Low Product Manifest bundle-symbolicname xstream Medium Product pom artifactid xstream Highest Product Manifest java_1_4_home /opt/blackdown-jdk-1.4.2.03 Low Product file name xstream High Product Manifest x-compile-source 1.4 Low Product Manifest x-builder Maven 3.8.6 Low Product Manifest java_1_7_home /opt/oracle-jdk-bin-1.7.0.80 Low Version file version 1.4.20 High Version pom version 1.4.20 Highest Version Manifest Bundle-Version 1.4.20 High Version Manifest Implementation-Version 1.4.20 High