Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: google group | github issues

Project: eXo PLF:: Commons - Comet WebApp

org.exoplatform.commons:commons-comet-webapp:6.0.x-SNAPSHOT

Scan Information (show all):

Display: Showing Vulnerable Dependencies (click to show all)

Dependency CPE Coordinates Highest Severity CVE Count CPE Confidence Evidence Count
cometd-javascript-jquery-3.0.8.war cpe:/a:jquery:jquery:3.0.8 org.cometd.javascript:cometd-javascript-jquery:3.0.8 Medium 1 Low 24

Dependencies

cometd-javascript-jquery-3.0.8.war

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/javascript/cometd-javascript-jquery/3.0.8/cometd-javascript-jquery-3.0.8.war
MD5: 26eb81a00cb777d04c290480d1614027
SHA1: eed7d93b72c3161f7070c0b27044e76286bbcd3c
Referenced In Project/Scope: eXo PLF:: Commons - Comet WebApp:provided

Identifiers

  • cpe: cpe:/a:jquery:jquery:3.0.8   Confidence:Low   
  • maven: org.cometd.javascript:cometd-javascript-jquery:3.0.8   Confidence:High

CVE-2007-2379  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The jQuery framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

Vulnerable Software & Versions:



This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the Node Security Platform.