Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: google group | github issues

Project: eXo PLF:: Platform Private Distributions

com.exoplatform.platform.distributions:plf-private-distributions:5.2.x-SNAPSHOT

Scan Information (show all):

Display: Showing Vulnerable Dependencies (click to show all)

Dependency CPE Coordinates Highest Severity CVE Count CPE Confidence Evidence Count
calendar-webapp-5.2.x-SNAPSHOT.war org.exoplatform.calendar:calendar-webapp:5.2.x-SNAPSHOT   0 28
commons-lang-2.6.jar commons-lang:commons-lang:2.6    0 34
jcr-1.0.1.jar cpe:/a:content_project:content:1.0.1 javax.jcr:jcr:1.0.1 Medium 1 Low 25
mail-1.4.7.jar cpe:/a:sun:javamail:1.4.7 javax.mail:mail:1.4.7    0 Low 41
portlet-api-2.0.jar javax.portlet:portlet-api:2.0    0 22
commons-chain-1.2.jar commons-chain:commons-chain:1.2    0 34
commons-httpclient-3.1.jar cpe:/a:apache:httpclient:3.1
cpe:/a:apache:commons-httpclient:3.1
commons-httpclient:commons-httpclient:3.1    0 Low 24
ical4j-1.0-beta5.jar ical4j:ical4j:1.0-beta5   0 21
jackrabbit-webdav-1.6.5.jar cpe:/a:apache:jackrabbit:1.6.5 org.apache.jackrabbit:jackrabbit-webdav:1.6.5  Medium 1 Low 26
commons-digester-2.1.jar commons-digester:commons-digester:2.1    0 34
exo.kernel.component.command-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.component.command:5.2.x-SNAPSHOT   0 22
c3p0-0.9.1.1.jar c3p0:c3p0:0.9.1.1    0 23
quartz-2.2.2.jar org.quartz-scheduler:quartz:2.2.2    0 43
calendar-service-5.2.x-SNAPSHOT.jar org.exoplatform.calendar:calendar-service:5.2.x-SNAPSHOT   0 28
jsr250-api-1.0.jar javax.annotation:jsr250-api:1.0    0 20
jackson-core-2.4.2.jar cpe:/a:fasterxml:jackson:2.4.2 com.fasterxml.jackson.core:jackson-core:2.4.2    0 Low 37
jackson-annotations-2.4.0.jar cpe:/a:fasterxml:jackson:2.4.0 com.fasterxml.jackson.core:jackson-annotations:2.4.0    0 Low 37
stax2-api-3.1.4.jar org.codehaus.woodstox:stax2-api:3.1.4    0 29
jackson-dataformat-xml-2.4.2.jar cpe:/a:fasterxml:jackson-databind:2.4.2
cpe:/a:fasterxml:jackson:2.4.2
com.fasterxml.jackson.dataformat:jackson-dataformat-xml:2.4.2  High 5 Highest 37
swagger-annotations-1.5.0.jar io.swagger:swagger-annotations:1.5.0    0 24
swagger-models-1.5.0.jar io.swagger:swagger-models:1.5.0    0 24
swagger-core-1.5.0.jar io.swagger:swagger-core:1.5.0    0 17
annotations-2.0.1.jar com.google.code.findbugs:annotations:2.0.1    0 23
reflections-0.9.9.jar org.reflections:reflections:0.9.9    0 19
swagger-jaxrs-1.5.0.jar io.swagger:swagger-jaxrs:1.5.0    0 17
calendar-webservice-5.2.x-SNAPSHOT.jar org.exoplatform.calendar:calendar-webservice:5.2.x-SNAPSHOT   0 26
exo.ws.commons-5.2.x-SNAPSHOT.jar cpe:/a:ws_project:ws:5.2.20181202 org.exoplatform.ws:exo.ws.commons:5.2.x-SNAPSHOT   0 Low 24
bayeux-api-3.0.8.jar org.cometd.java:bayeux-api:3.0.8    0 29
cometd-java-common-3.0.8.jar org.cometd.java:cometd-java-common:3.0.8    0 29
cometd-java-websocket-javax-server-3.0.8.jar org.cometd.java:cometd-java-websocket-javax-server:3.0.8    0 29
cometd-java-websocket-common-server-3.0.8.jar org.cometd.java:cometd-java-websocket-common-server:3.0.8    0 29
cometd-java-annotations-3.0.8.jar org.cometd.java:cometd-java-annotations:3.0.8    0 29
jetty-io-9.2.14.v20151106.jar org.eclipse.jetty:jetty-io:9.2.14.v20151106    0 35
cometd-java-client-3.0.8.jar org.cometd.java:cometd-java-client:3.0.8    0 29
cometd-java-websocket-common-client-3.0.8.jar org.cometd.java:cometd-java-websocket-common-client:3.0.8    0 29
cometd-java-websocket-javax-client-3.0.8.jar org.cometd.java:cometd-java-websocket-javax-client:3.0.8    0 29
cometd-java-oort-3.0.8.jar org.cometd.java:cometd-java-oort:3.0.8    0 29
jetty-jmx-9.2.14.v20151106.jar cpe:/a:jetty:jetty:9.2.14.v20151106
cpe:/a:eclipse:jetty:9.2.14.v20151106
org.eclipse.jetty:jetty-jmx:9.2.14.v20151106  High 4 Low 37
cometd-java-server-3.0.8.jar org.cometd.java:cometd-java-server:3.0.8    0 29
commons-comet-service-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-comet-service:5.2.x-SNAPSHOT   0 26
commons-webui-ext-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-webui-ext:5.2.x-SNAPSHOT   0 26
chromattic.core-1.3.0.jar org.chromattic:chromattic.core:1.3.0    0 23
aspectjrt-1.8.8.jar org.aspectj:aspectjrt:1.8.8    0 21
owasp-java-html-sanitizer-20160413.1.jar cpe:/a:owasp-java-html-sanitizer_project:owasp-java-html-sanitizer:20160413.1 com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer:20160413.1    0 Low 21
jrcs.diff-0.4.2.jar org.jvnet.hudson:org.suigeneris.jrcs.diff:0.4.2    0 17
ecs-1.4.2.jar ecs:ecs:1.4.2    0 14
liquibase-core-3.4.2.jar org.liquibase:liquibase-core:3.4.2    0 19
dom4j-1.6.1.jar cpe:/a:dom4j_project:dom4j:1.6.1 dom4j:dom4j:1.6.1  Medium 1 Highest 31
javassist-3.20.0-GA.jar org.javassist:javassist:3.20.0-GA    0 27
hibernate-jpa-2.0-api-1.0.1.Final.jar org.hibernate.javax.persistence:hibernate-jpa-2.0-api:1.0.1.Final    0 26
hibernate-entitymanager-4.2.21.Final.jar org.hibernate:hibernate-entitymanager:4.2.21.Final    0 32
commons-component-common-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-component-common:5.2.x-SNAPSHOT   0 26
antlr-2.7.7.jar antlr:antlr:2.7.7    0 18
hibernate-core-4.2.21.Final.jar org.hibernate:hibernate-core:4.2.21.Final    0 32
jakarta-regexp-1.4.jar jakarta-regexp:jakarta-regexp:1.4    0 14
xpp3-1.1.6.jar org.ogce:xpp3:1.1.6    0 24
exo.core.component.organization.api-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.organization.api:5.2.x-SNAPSHOT   0 22
exo.core.component.security.core-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.security.core:5.2.x-SNAPSHOT   0 24
lucene-core-3.6.2.jar org.apache.lucene:lucene-core:3.6.2    0 26
lucene-analyzers-3.6.2.jar org.apache.lucene:lucene-analyzers:3.6.2    0 26
lucene-spellchecker-3.6.2.jar org.apache.lucene:lucene-spellchecker:3.6.2    0 26
jta-1.1.jar javax.transaction:transaction-api:1.1    0 22
concurrent-1.3.4.jar concurrent:concurrent:1.3.4    0 23
commons-collections-3.2.2.jar cpe:/a:apache:commons_collections:3.2.2 commons-collections:commons-collections:3.2.2    0 Low 40
jgroups-3.6.13.Final.jar org.jgroups:jgroups:3.6.13.Final    0 32
jbossjta-4.16.6.Final.jar org.jboss.jbossts:jbossjta:4.16.6.Final    0 22
ws-commons-util-1.0.1.jar cpe:/a:ws_project:ws:1.0.1 ws-commons-util:ws-commons-util:1.0.1  Medium 1 Low 30
jboss-common-core-2.2.22.GA.jar org.jboss:jboss-common-core:2.2.22.GA    0 30
stringtemplate-3.2.1.jar org.antlr:stringtemplate:3.2.1    0 23
antlr-runtime-3.5.jar org.antlr:antlr-runtime:3.5    0 26
exo.kernel.component.ext.cache.impl.infinispan.v8-5.2.x-SNAPSHOT.jar cpe:/a:infinispan:infinispan:5.2.0 org.exoplatform.kernel:exo.kernel.component.ext.cache.impl.infinispan.v8:5.2.x-SNAPSHOT Medium 3 Highest 22
jboss-marshalling-osgi-2.0.0.Beta3.jar org.jboss.marshalling:jboss-marshalling-osgi:2.0.0.Beta3    0 29
infinispan-core-8.2.6.Final.jar cpe:/a:infinispan:infinispan:8.2.6 org.infinispan:infinispan-core:8.2.6.Final  Medium 3 Highest 35
exo.jcr.component.core-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.component.core:5.2.x-SNAPSHOT   0 24
mime-util-2.1.3.jar eu.medsea.mimeutil:mime-util:2.1.3    0 30
slf4j-api-1.7.7.jar cpe:/a:slf4j:slf4j:1.7.7 org.slf4j:slf4j-api:1.7.7    0 Low 31
exo.kernel.commons-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.commons:5.2.x-SNAPSHOT   0 24
commons-dbcp-1.4.jar commons-dbcp:commons-dbcp:1.4    0 34
commons-pool-1.6.jar commons-pool:commons-pool:1.6    0 36
exo.kernel.component.common-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.component.common:5.2.x-SNAPSHOT   0 24
commons-beanutils-1.8.3.jar cpe:/a:apache:commons_beanutils:1.8.3 commons-beanutils:commons-beanutils:1.8.3  High 1 Low 34
jibx-run-1.2.6.jar org.jibx:jibx-run:1.2.6    0 29
cdi-api-1.0-SP4.jar javax.enterprise:cdi-api:1.0-SP4    0 31
exo.kernel.container-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.container:5.2.x-SNAPSHOT   0 24
exo.portal.webui.core-5.2.x-SNAPSHOT.jar cpe:/a:in-portal:in-portal:5.2.0 org.exoplatform.gatein.portal:exo.portal.webui.core:5.2.x-SNAPSHOT Medium 1 Highest 29
icu4j-56.1.jar cpe:/a:icu-project:international_components_for_unicode:56.1::~~~c%2fc%2b%2b~~ com.ibm.icu:icu4j:56.1  High 8 Highest 33
common-logging-2.2.2.Final.jar org.gatein.common:common-logging:2.2.2.Final    0 31
social-component-core-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-core:5.2.x-SNAPSHOT   0 28
social-component-common-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-common:5.2.x-SNAPSHOT   0 26
staxnav.core-0.9.8.jar org.staxnav:staxnav.core:0.9.8    0 19
commons-lang3-3.3.2.jar org.apache.commons:commons-lang3:3.3.2    0 37
pc-federation-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.pc:pc-federation:5.2.x-SNAPSHOT   0 29
pc-bridge-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.pc:pc-bridge:5.2.x-SNAPSHOT   0 29
picketlink-idm-core-1.4.6.Final.jar cpe:/a:picketlink:picketlink:1.4.6 org.picketlink.idm:picketlink-idm-core:1.4.6.Final  Medium 3 Low 37
mop-api-1.3.2.Final.jar org.gatein.mop:mop-api:1.3.2.Final   0 30
mop-spi-1.3.2.Final.jar org.gatein.mop:mop-spi:1.3.2.Final   0 30
mop-core-1.3.2.Final.jar org.gatein.mop:mop-core:1.3.2.Final   0 30
gatein-management-spi-2.1.0.Final.jar org.gatein.management:gatein-management-spi:2.1.0.Final   0 28
args4j-2.0.16.jar args4j:args4j:2.0.16    0 20
closure-compiler-v20131014.jar cpe:/a:google:gmail:- com.google.javascript:closure-compiler:v20131014  Medium 1 Low 28
filters-2.0.235.jar cpe:/a:image_processing_software:image_processing_software:2.0.235 com.jhlabs:filters:2.0.235  Low 1 Low 22
simplecaptcha-1.1.1.Final-gatein-4.jar org.gatein.captcha:simplecaptcha:1.1.1.Final-gatein-4   0 27
gatein-api-1.0.1.Final.jar org.gatein.api:gatein-api:1.0.1.Final    0 29
wci-wci-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.wci:wci-wci:5.2.x-SNAPSHOT   0 29
jcl-over-slf4j-1.7.7.jar cpe:/a:slf4j:slf4j:1.7.7 org.slf4j:jcl-over-slf4j:1.7.7    0 Low 31
rome-1.0.jar rome:rome:1.0    0 32
calendar-common-5.2.x-SNAPSHOT.jar org.exoplatform.calendar:calendar-common:5.2.x-SNAPSHOT   0 24
commons-comet-webapp-5.2.x-SNAPSHOT.war org.exoplatform.commons:commons-comet-webapp:5.2.x-SNAPSHOT   0 24
commons-extension-webapp-5.2.x-SNAPSHOT.war org.exoplatform.commons:commons-extension-webapp:5.2.x-SNAPSHOT   0 26
jtidy-r938.jar cpe:/a:html-tidy:tidy:- net.sf.jtidy:jtidy:r938    0 Low 25
exo.core.component.xml-processing-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.xml-processing:5.2.x-SNAPSHOT   0 24
exo.jcr.component.ext-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.component.ext:5.2.x-SNAPSHOT   0 24
ecms-apps-portlet-administration-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-apps-portlet-administration:5.2.x-SNAPSHOT   0 28
ecms-core-webui-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-webui:5.2.x-SNAPSHOT   0 26
ecms-apps-portlet-presentation-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-apps-portlet-presentation:5.2.x-SNAPSHOT   0 26
exo.jcr.component.webdav-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.component.webdav:5.2.x-SNAPSHOT   0 24
ecms-core-publication-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-publication:5.2.x-SNAPSHOT   0 28
ecms-core-search-5.2.x-SNAPSHOT.jar cpe:/a:pro_search:pro_search:5.2.20181206 org.exoplatform.ecms:ecms-core-search:5.2.x-SNAPSHOT   0 Low 26
itunes-com-podcast-0.2.jar cpe:/a:apple:itunes:0.2 com.totsp.feedpod:itunes-com-podcast:0.2  High 513 Low 29
jurt-3.2.1.jar cpe:/a:openoffice:openoffice.org:3.2.1
cpe:/a:openoffice:openoffice:3.2.1
org.openoffice:jurt:3.2.1  High 8 Highest 18
juh-3.2.1.jar cpe:/a:openoffice:openoffice.org:3.2.1
cpe:/a:openoffice:openoffice:3.2.1
org.openoffice:juh:3.2.1  High 8 Highest 20
ridl-3.2.1.jar cpe:/a:openoffice:openoffice.org:3.2.1
cpe:/a:openoffice:openoffice:3.2.1
org.openoffice:ridl:3.2.1  High 8 Highest 18
unoil-3.2.1.jar cpe:/a:openoffice:openoffice.org:3.2.1
cpe:/a:openoffice:openoffice:3.2.1
org.openoffice:unoil:3.2.1  High 8 Highest 18
jodconverter-core-3.0-eXo03.jar org.artofsolving.jodconverter:jodconverter-core:3.0-eXo03   0 21
groovy-all-2.4.12.jar cpe:/a:apache:groovy:2.4.12 org.codehaus.groovy:groovy-all:2.4.12    0 Low 36
jai-core-1.1.3.jar javax.media:jai-core:1.1.3   0 21
jai-codec-1.1.3.jar com.sun.media:jai-codec:1.1.3   0 22
icepdf-core-5.1.1.jar org.icepdf.os:icepdf-core:5.1.1   0 17
imgscalr-lib-4.2.jar org.imgscalr:imgscalr-lib:4.2    0 23
jdom-1.1.3.jar org.jdom:jdom:1.1.3    0 44
ecms-core-services-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-services:5.2.x-SNAPSHOT   0 26
ecms-core-webui-presentation-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-webui-presentation:5.2.x-SNAPSHOT   0 24
ecms-ext-authoring-services-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-ext-authoring-services:5.2.x-SNAPSHOT   0 26
json-20070829.jar org.json:json:20070829    0 23
ecms-apps-portlet-seo-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-apps-portlet-seo:5.2.x-SNAPSHOT   0 26
ecms-apps-resources-wcm-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-apps-resources-wcm:5.2.x-SNAPSHOT   0 26
ecms-core-webapp-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-core-webapp:5.2.x-SNAPSHOT   0 28
commons-component-upgrade-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-component-upgrade:5.2.x-SNAPSHOT   0 26
json-simple-1.1.1.jar com.googlecode.json-simple:json-simple:1.1.1    0 23
commons-io-2.4.jar commons-io:commons-io:2.4    0 36
ecms-core-connector-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-connector:5.2.x-SNAPSHOT   0 26
exo.kernel.component.cache-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.component.cache:5.2.x-SNAPSHOT   0 22
ecms-ext-authoring-apps-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-ext-authoring-apps:5.2.x-SNAPSHOT   0 26
ecms-core-webui-fcc-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-webui-fcc:5.2.x-SNAPSHOT   0 28
ecms-packaging-wcm-webapp-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-packaging-wcm-webapp:5.2.x-SNAPSHOT   0 28
exo-jcr-services-5.2.x-SNAPSHOT.jar org.exoplatform:exo-jcr-services:5.2.x-SNAPSHOT   0 24
fontbox-1.8.14.jar cpe:/a:apache:pdfbox:1.8.14 org.apache.pdfbox:fontbox:1.8.14    0 Low 37
jempbox-1.8.14.jar cpe:/a:apache:pdfbox:1.8.14 org.apache.pdfbox:jempbox:1.8.14    0 Low 35
pdfbox-1.8.14.jar cpe:/a:apache:pdfbox:1.8.14 org.apache.pdfbox:pdfbox:1.8.14    0 Low 35
htmllexer-2.1.jar org.htmlparser:htmllexer:2.1    0 23
htmlparser-2.1.jar org.htmlparser:htmlparser:2.1    0 23
poi-3.13.jar cpe:/a:apache:poi:3.13 org.apache.poi:poi:3.13  High 2 Highest 28
tika-core-1.5.jar cpe:/a:apache:tika:1.5 org.apache.tika:tika-core:1.5  High 7 Highest 33
vorbis-java-core-0.1-tests.jar org.gagravarr:vorbis-java-core:0.1    0 23
vorbis-java-tika-0.1.jar cpe:/a:apache:tika:0.1 org.gagravarr:vorbis-java-tika:0.1  High 5 Highest 23
netcdf-4.2-min.jar edu.ucar:netcdf:4.2-min    0 21
apache-mime4j-core-0.7.2.jar cpe:/a:apache:james:0.7.2 org.apache.james:apache-mime4j-core:0.7.2    0 Low 33
xz-1.2.jar cpe:/a:tukaani:xz:1.2 org.tukaani:xz:1.2  Medium 1 Low 27
commons-compress-1.5.jar cpe:/a:apache:commons-compress:1.5 org.apache.commons:commons-compress:1.5    0 Low 39
tagsoup-1.2.1.jar org.ccil.cowan.tagsoup:tagsoup:1.2.1    0 18
asm-debug-all-4.1.jar org.ow2.asm:asm-debug-all:4.1    0 28
isoparser-1.0-RC-1.jar cpe:/a:boxes_project:boxes:7.x-1.0 com.googlecode.mp4parser:isoparser:1.0-RC-1  Low 1 Highest 24
xmpcore-5.1.2.jar com.adobe.xmp:xmpcore:5.1.2    0 30
metadata-extractor-2.6.2.jar com.drewnoakes:metadata-extractor:2.6.2    0 21
vorbis-java-core-0.1.jar org.gagravarr:vorbis-java-core:0.1    0 21
juniversalchardet-1.0.3.jar org.zenframework.z8.dependencies.commons:juniversalchardet-1.0.3:2.0    0 27
jhighlight-1.0.jar com.uwyn:jhighlight:1.0    0 25
xmlbeans-2.6.0.jar org.apache.xmlbeans:xmlbeans:2.6.0    0 24
exo.core.component.document-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.document:5.2.x-SNAPSHOT   0 24
ecms-core-publication-plugins-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-publication-plugins:5.2.x-SNAPSHOT   0 28
ecms-core-viewer-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-viewer:5.2.x-SNAPSHOT   0 28
ecms-core-webui-administration-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-webui-administration:5.2.x-SNAPSHOT   0 28
ecms-ext-authoring-webui-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-ext-authoring-webui:5.2.x-SNAPSHOT   0 26
ecms-ext-webui-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-ext-webui:5.2.x-SNAPSHOT   0 26
ecms-upgrade-plugins-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-upgrade-plugins:5.2.x-SNAPSHOT   0 26
forum-forum-webapp-5.2.x-SNAPSHOT.war org.exoplatform.forum:forum-forum-webapp:5.2.x-SNAPSHOT   0 24
commons-webui-component-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-webui-component:5.2.x-SNAPSHOT   0 26
forum-application-common-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-application-common:5.2.x-SNAPSHOT   0 26
htmlcleaner-2.7.jar cpe:/a:htmlcleaner_project:htmlcleaner:2.7 net.sourceforge.htmlcleaner:htmlcleaner:2.7    0 Low 20
stax-utils-20070216.jar net.java.dev.stax-utils:stax-utils:20070216    0 20
xwiki-commons-xml-5.4.7.jar cpe:/a:xwiki:xwiki:5.4.7 org.xwiki.commons:xwiki-commons-xml:5.4.7 Low 1 Low 26
wiki-renderer-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-renderer:5.2.x-SNAPSHOT   0 26
forum-component-bbcode-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-component-bbcode:5.2.x-SNAPSHOT   0 24
forum-component-common-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-component-common:5.2.x-SNAPSHOT   0 26
forum-component-rendering-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-component-rendering:5.2.x-SNAPSHOT   0 26
forum-forum-service-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-forum-service:5.2.x-SNAPSHOT   0 26
xpp3-1.1.4c.jar xpp3:xpp3:1.1.4c    0 26
integ-search-portlet-5.2.x-SNAPSHOT.war org.exoplatform.integration:integ-search-portlet:5.2.x-SNAPSHOT   0 24
juzu-core-1.2.x-SNAPSHOT.jar org.juzu:juzu-core:1.2.x-SNAPSHOT   0 21
rhino-1.7R3.jar org.mozilla:rhino:1.7R3    0 26
juzu-plugins-less-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-less:1.2.x-SNAPSHOT   0 24
juzu-plugins-portlet-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-portlet:1.2.x-SNAPSHOT   0 24
javax.inject-1.jar javax.inject:javax.inject:1    0 20
commons-api-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-api:5.2.x-SNAPSHOT   0 26
integ-search-service-5.2.x-SNAPSHOT.jar cpe:/a:pro_search:pro_search:5.2.20181206 org.exoplatform.integration:integ-search-service:5.2.x-SNAPSHOT   0 Low 26
exo.jcr.framework.command-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.framework.command:5.2.x-SNAPSHOT   0 22
exo.jcr.framework.web-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.framework.web:5.2.x-SNAPSHOT   0 22
commons-component-product-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-component-product:5.2.x-SNAPSHOT   0 28
platform-component-upgrade-plugins-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-upgrade-plugins:5.2.x-SNAPSHOT   0 26
platform-exo-gadget-pack-gadget-pack-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-exo-gadget-pack-gadget-pack:5.2.x-SNAPSHOT   0 28
exo.core.component.script.groovy-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.script.groovy:5.2.x-SNAPSHOT   0 24
platform-exo-gadget-pack-gadget-pack-services-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-exo-gadget-pack-gadget-pack-services:5.2.x-SNAPSHOT   0 26
platform-extension-portlet-branding-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-portlet-branding:5.2.x-SNAPSHOT   0 22
commons-fileupload-1.3.3.jar cpe:/a:apache:commons_fileupload:1.3.3 commons-fileupload:commons-fileupload:1.3.3    0 Low 40
commons-juzu-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-juzu:5.2.x-SNAPSHOT   0 28
juzu-plugins-upload-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-upload:1.2.x-SNAPSHOT   0 23
platform-extension-portlets-homepage-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-portlets-homepage:5.2.x-SNAPSHOT   0 23
aopalliance-1.0.jar aopalliance:aopalliance:1.0    0 20
guice-3.0.jar com.google.inject:guice:3.0    0 29
guice-multibindings-3.0.jar com.google.inject.extensions:guice-multibindings:3.0    0 29
commons-codec-1.10.jar commons-codec:commons-codec:1.10    0 38
guava-18.0.jar cpe:/a:google:guava:18.0 com.google.guava:guava:18.0  Medium 1 Highest 27
oauth-provider-20100527.jar net.oauth.core:oauth-provider:20100527    0 18
oauth-consumer-20090617.jar net.oauth.core:oauth-consumer:20090617   0 17
oauth-httpclient4-20090913.jar net.oauth.core:oauth-httpclient4:20090913   0 20
httpcore-4.3.3.jar org.apache.httpcomponents:httpcore:4.3.3    0 32
httpclient-4.3.6.jar cpe:/a:apache:httpclient:4.3.6 org.apache.httpcomponents:httpclient:4.3.6    0 Low 32
platform-extension-portlets-platformNavigation-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-portlets-platformNavigation:5.2.x-SNAPSHOT   0 26
calendar-component-create-5.2.x-SNAPSHOT.jar org.exoplatform.calendar:calendar-component-create:5.2.x-SNAPSHOT   0 26
ecms-core-webui-seo-5.2.x-SNAPSHOT.jar cpe:/a:content_project:content:5.2.20181206 org.exoplatform.ecms:ecms-core-webui-seo:5.2.x-SNAPSHOT   0 Low 28
forum-application-create-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-application-create:5.2.x-SNAPSHOT   0 24
platform-component-common-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-common:5.2.x-SNAPSHOT   0 24
platform-component-uxpnavigation-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-uxpnavigation:5.2.x-SNAPSHOT   0 26
platform-component-webui-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-webui:5.2.x-SNAPSHOT   0 26
social-component-webui-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-webui:5.2.x-SNAPSHOT   0 28
chromattic.common-1.3.0.jar org.chromattic:chromattic.common:1.3.0    0 25
chromattic.metamodel-1.3.0.jar org.chromattic:chromattic.metamodel:1.3.0    0 23
jboss-logging-annotations-1.2.0.Beta1.jar org.jboss.logging:jboss-logging-annotations:1.2.0.Beta1    0 30
hibernate-commons-annotations-4.0.5.Final.jar org.hibernate.common:hibernate-commons-annotations:4.0.5.Final    0 30
jackson-databind-2.3.1.jar cpe:/a:fasterxml:jackson:2.3.1
cpe:/a:fasterxml:jackson-databind:2.3.1
com.fasterxml.jackson.core:jackson-databind:2.3.1  High 5 Highest 37
social-component-service-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-service:5.2.x-SNAPSHOT   0 28
itext-2.1.7.jar com.lowagie:itext:2.1.7    0 23
validation-api-1.1.0.Final.jar javax.validation:validation-api:1.1.0.Final    0 22
sac-1.3.jar org.w3c.css:sac:1.3    0 27
cssparser-0.9.18.jar net.sourceforge.cssparser:cssparser:0.9.18    0 27
bcmail-jdk15-1.45.jar org.bouncycastle:bcmail-jdk15:1.45    0 24
bcprov-jdk15-1.45.jar cpe:/a:bouncycastle:bouncy-castle-crypto-package:1.45
cpe:/a:bouncycastle:bouncy_castle_crypto_package:1.45
org.bouncycastle:bcprov-jdk15:1.45  Medium 1 Low 24
bctsp-jdk15-1.45.jar org.bouncycastle:bctsp-jdk15:1.45    0 24
mchange-commons-java-0.2.3.4.jar com.mchange:mchange-commons-java:0.2.3.4    0 19
c3p0-0.9.2.1.jar com.mchange:c3p0:0.9.2.1    0 24
hibernate-c3p0-4.2.21.Final.jar org.hibernate:hibernate-c3p0:4.2.21.Final    0 32
exo.core.component.organization.jdbc-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.organization.jdbc:5.2.x-SNAPSHOT   0 24
jrcs.rcs-0.4.2.jar org.jvnet.hudson:org.suigeneris.jrcs.rcs:0.4.2    0 17
flying-saucer-core-9.0.8.jar org.xhtmlrenderer:flying-saucer-core:9.0.8    0 21
flying-saucer-pdf-9.0.8.jar org.xhtmlrenderer:flying-saucer-pdf:9.0.8    0 23
wiki-service-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-service:5.2.x-SNAPSHOT   0 24
wiki-macros-iframe-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-macros-iframe:5.2.x-SNAPSHOT   0 26
jython-standalone-2.5.4-rc1.jar cpe:/a:jython_project:jython:2.5.4.rc1 org.python:jython-standalone:2.5.4-rc1    0 Low 10
pygments-1.6.jar cpe:/a:pygments:pygments:1.6 org.pygments:pygments:1.6  High 1 Highest 18
jdom2-2.0.5.jar org.jdom:jdom2:2.0.5    0 43
wiki-webui-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-webui:5.2.x-SNAPSHOT   0 24
common-common-2.2.2.Final.jar org.gatein.common:common-common:2.2.2.Final    0 31
platform-extension-portlets-notification-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-portlets-notification:5.2.x-SNAPSHOT   0 22
platform-extension-resources-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-resources:5.2.x-SNAPSHOT   0 26
platform-extension-webapp-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-webapp:5.2.x-SNAPSHOT   0 24
juzu-plugins-validation-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-validation:1.2.x-SNAPSHOT   0 24
protobuf-java-2.5.0.jar cpe:/a:google:protobuf:2.5.0 com.google.protobuf:protobuf-java:2.5.0  Medium 1 Highest 29
less4j-1.4.0.jar com.github.sommeri:less4j:1.4.0    0 24
juzu-plugins-less4j-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-less4j:1.2.x-SNAPSHOT   0 24
webjars-locator-0.4.jar org.webjars:webjars-locator:0.4    0 19
juzu-plugins-webjars-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-webjars:1.2.x-SNAPSHOT   0 23
jsr311-api-1.1.1.jar javax.ws.rs:jsr311-api:1.1.1    0 28
chromattic.api-1.3.0.jar org.chromattic:chromattic.api:1.3.0    0 23
reflext.api-1.1.0.jar org.reflext:reflext.api:1.1.0    0 23
reflext.core-1.1.0.jar org.reflext:reflext.core:1.1.0    0 23
reflext.spi-1.1.0.jar org.reflext:reflext.spi:1.1.0    0 25
reflext.apt-1.1.0.jar org.reflext:reflext.apt:1.1.0    0 23
chromattic.apt-1.3.0.jar org.chromattic:chromattic.apt:1.3.0    0 23
chromattic.ext-1.3.0.jar org.chromattic:chromattic.ext:1.3.0    0 25
chromattic.spi-1.3.0.jar org.chromattic:chromattic.spi:1.3.0    0 25
pc-api-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.pc:pc-api:5.2.x-SNAPSHOT   0 29
picocontainer-1.1.jar picocontainer:picocontainer:1.1    0 28
sso-integration-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.sso:sso-integration:5.2.x-SNAPSHOT   0 31
sso-agent-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.sso:sso-agent:5.2.x-SNAPSHOT   0 29
xmlpull-1.1.3.1.jar xmlpull:xmlpull:1.1.3.1    0 18
xstream-1.4.10.jar cpe:/a:xstream_project:xstream:1.4.10 com.thoughtworks.xstream:xstream:1.4.10    0 Low 53
ccpp-1.0.jar javax.ccpp:ccpp:1.0    0 20
portals-bridges-common-1.0.4.jar org.apache.portals.bridges:portals-bridges-common:1.0.4    0 25
asm-3.1.jar asm:asm:3.1    0 18
cglib-2.2.jar cglib:cglib:2.2    0 20
chromattic.cglib-1.3.0.jar org.chromattic:chromattic.cglib:1.3.0    0 23
javaparser-1.0.8.jar com.google.code.javaparser:javaparser:1.0.8   0 20
chromattic.groovy-1.3.0.jar org.chromattic:chromattic.groovy:1.3.0    0 23
reflext.jlr-1.1.0.jar org.reflext:reflext.jlr:1.1.0    0 23
chromattic.dataobject-1.3.0.jar org.chromattic:chromattic.dataobject:1.3.0    0 23
commons-search-5.2.x-SNAPSHOT.jar cpe:/a:pro_search:pro_search:5.2.20181206 org.exoplatform.commons:commons-search:5.2.x-SNAPSHOT   0 Low 26
commons-file-storage-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-file-storage:5.2.x-SNAPSHOT   0 24
jboss-logging-3.3.0.Final.jar org.jboss.logging:jboss-logging:3.3.0.Final    0 44
exo.core.component.database-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.database:5.2.x-SNAPSHOT   0 22
integ-calendar-social-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-calendar-social:5.2.x-SNAPSHOT   0 26
integ-ecms-social-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-ecms-social:5.2.x-SNAPSHOT   0 28
integ-forum-social-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-forum-social:5.2.x-SNAPSHOT   0 28
integ-social-ecms-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-social-ecms:5.2.x-SNAPSHOT   0 28
integ-wiki-social-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-wiki-social:5.2.x-SNAPSHOT   0 26
platform-component-gadgets-5.2.x-SNAPSHOT.jar cpe:/a:user_dashboard_project:user_dashboard:5.2.20181206 org.exoplatform.platform:platform-component-gadgets:5.2.x-SNAPSHOT   0 Low 28
platform-component-organization-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-organization:5.2.x-SNAPSHOT   0 26
platform-extension-config-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-extension-config:5.2.x-SNAPSHOT   0 26
exo.ws.rest.core-5.2.x-SNAPSHOT.jar cpe:/a:ws_project:ws:5.2 org.exoplatform.ws:exo.ws.rest.core:5.2.x-SNAPSHOT   0 Low 22
redirect-5.2.x-SNAPSHOT.jar cpe:/a:in-portal:in-portal:5.2.0 org.gatein.web:redirect:5.2.x-SNAPSHOT Medium 1 Highest 29
hibernate-validator-4.2.0.Final.jar cpe:/a:hibernate:hibernate_validator:4.2.0 org.hibernate:hibernate-validator:4.2.0.Final  Medium 1 Highest 27
platform-sample-acme-intranet-portlet-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-sample-acme-intranet-portlet:5.2.x-SNAPSHOT   0 26
platform-sample-acme-intranet-webapp-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-sample-acme-intranet-webapp:5.2.x-SNAPSHOT   0 26
platform-sample-gadgets-sample-exo-gadget-resources-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-sample-gadgets-sample-exo-gadget-resources:5.2.x-SNAPSHOT   0 26
platform-sample-gadgets-sample-gadgets-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-sample-gadgets-sample-gadgets:5.2.x-SNAPSHOT   0 26
platform-sample-gadgets-sample-service-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-sample-gadgets-sample-service:5.2.x-SNAPSHOT   0 24
platform-registration-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-registration:5.2.x-SNAPSHOT   0 26
platform-ui-skin-5.2.x-SNAPSHOT.war org.exoplatform.platform-ui:platform-ui-skin:5.2.x-SNAPSHOT   0 26
plf-root-webapp-5.2.x-SNAPSHOT.war org.exoplatform.platform.distributions:plf-root-webapp:5.2.x-SNAPSHOT   0 24
social-extension-war-5.2.x-SNAPSHOT.war org.exoplatform.social:social-extension-war:5.2.x-SNAPSHOT   0 28
social-notification-extension-5.2.x-SNAPSHOT.war org.exoplatform.social:social-notification-extension:5.2.x-SNAPSHOT   0 28
social-component-notification-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-notification:5.2.x-SNAPSHOT   0 28
social-component-core-jpa-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-core-jpa:5.2.x-SNAPSHOT   0 28
social-extras-feedmash-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-extras-feedmash:5.2.x-SNAPSHOT   0 28
oauth-20100527.jar net.oauth.core:oauth:20100527    0 18
social-component-opensocial-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-opensocial:5.2.x-SNAPSHOT   0 28
joda-time-2.4.jar joda-time:joda-time:2.4    0 34
ehcache-core-2.6.9.jar net.sf.ehcache:ehcache-core:2.6.9    0 19
juel-impl-2.2.7.jar de.odysseus.juel:juel-impl:2.2.7    0 26
shindig-common-2.5.2.jar cpe:/a:apache:shindig:2.5.2 org.apache.shindig:shindig-common:2.5.2    0 Low 26
caja-r5054.jar com.google.caja:caja:r5054   0 23
htmlparser-r4209.jar caja:htmlparser:r4209   0 24
nekohtml-1.9.22.jar net.sourceforge.nekohtml:nekohtml:1.9.22    0 20
xercesImpl-2.9.1.jar cpe:/a:apache:xerces2_java:2.9.1 xerces:xercesImpl:2.9.1  High 1 Low 50
sanselan-0.97-incubator.jar org.apache.sanselan:sanselan:0.97-incubator    0 35
social-webapp-portlet-5.2.x-SNAPSHOT.war cpe:/a:app_project:app:5.2.20181206 org.exoplatform.social:social-webapp-portlet:5.2.x-SNAPSHOT Medium 1 Low 28
social-webapp-juzu-portlet-5.2.x-SNAPSHOT.war org.exoplatform.social:social-webapp-juzu-portlet:5.2.x-SNAPSHOT   0 22
social-webapp-resources-5.2.x-SNAPSHOT.war cpe:/a:app_project:app:5.2 org.exoplatform.social:social-webapp-resources:5.2.x-SNAPSHOT Medium 1 Low 26
wiki-upgrade-plugins-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-upgrade-plugins:5.2.x-SNAPSHOT   0 28
wiki-webapp-5.2.x-SNAPSHOT.war org.exoplatform.wiki:wiki-webapp:5.2.x-SNAPSHOT   0 24
gwt-servlet-2.6.1.jar cpe:/a:google:protobuf:2.5.0
cpe:/a:google:protobuf:2.6.1
com.google.gwt:gwt-servlet:2.6.1  Medium 1 Highest 29
smartgwt-lgpl-6.0-p20170514.jar cpe:/a:widgets_project:widgets:6.0.p20170514 com.isomorphic.smartgwt.lgpl:smartgwt-lgpl:6.0-p20170514 Medium 1 Low 14
jcommon-1.0.17.jar org.jfree:jcommon:1.0.17    0 23
jfreechart-1.0.14.jar org.jfree:jfreechart:1.0.14    0 25
velocity-1.7.jar org.apache.velocity:velocity:1.7    0 33
velocity-tools-1.4.jar cpe:/a:apache:struts:1.4 velocity-tools:velocity-tools:1.4    0 Low 19
ezmorph-1.0.6.jar net.sf.ezmorph:ezmorph:1.0.6    0 22
json-lib-2.4-jdk15.jar com.hynnet:json-lib:2.4    0 15
commons-configuration-1.10.jar commons-configuration:commons-configuration:1.10    0 36
snuggletex-core-1.1.0.jar uk.ac.ed.ph.snuggletex:snuggletex-core:1.1.0   0 18
batik-css-1.7.jar cpe:/a:apache:batik:1.7 org.apache.xmlgraphics:batik-css:1.7  High 3 Highest 22
xmlgraphics-commons-1.3.1.jar org.apache.xmlgraphics:xmlgraphics-commons:1.3.1    0 25
jeuclid-core-3.1.5.jar net.sourceforge.jeuclid:jeuclid-core:3.1.5    0 22
snuggletex-jeuclid-1.1.0.jar uk.ac.ed.ph.snuggletex:snuggletex-jeuclid:1.1.0   0 18
serializer-2.7.1.jar cpe:/a:apache:xalan-java:2.7.1 xalan:serializer:2.7.1  High 1 Highest 26
xalan-2.7.1.jar cpe:/a:apache:xalan-java:2.7.1 xalan:xalan:2.7.1  High 1 Highest 40
wiki-jpa-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-jpa:5.2.x-SNAPSHOT   0 26
wiki-jpa-migration-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-jpa-migration:5.2.x-SNAPSHOT   0 24
gatein-management-api-2.1.0.Final.jar org.gatein.management:gatein-management-api:2.1.0.Final   0 28
jboss-dmr-1.1.1.Final.jar org.jboss:jboss-dmr:1.1.1.Final    0 26
gatein-management-core-2.1.0.Final.jar org.gatein.management:gatein-management-core:2.1.0.Final   0 28
gatein-management-rest-2.1.0.Final.jar org.gatein.management:gatein-management-rest:2.1.0.Final   0 28
twitter4j-core-3.0.5.jar cpe:/a:twitter_project:twitter:3.0.5
cpe:/a:twitter:twitter:3.0.5
org.twitter4j:twitter4j-core:3.0.5    0 Low 22
scribe-1.3.5.jar cpe:/a:scribe:scribe:1.3.5 org.scribe:scribe:1.3.5    0 Low 23
google-http-client-1.14.1-beta.jar com.google.http-client:google-http-client:1.14.1-beta    0 24
jsr305-1.3.9.jar com.google.code.findbugs:jsr305:1.3.9    0 21
google-oauth-client-1.14.1-beta.jar com.google.oauth-client:google-oauth-client:1.14.1-beta    0 24
google-api-client-1.14.1-beta.jar com.google.api-client:google-api-client:1.14.1-beta    0 22
jackson-core-asl-1.9.11.jar cpe:/a:fasterxml:jackson:1.9.11 org.codehaus.jackson:jackson-core-asl:1.9.11    0 Low 32
google-http-client-jackson-1.14.1-beta.jar com.google.http-client:google-http-client-jackson:1.14.1-beta    0 22
google-api-services-plus-v1-rev69-1.14.2-beta.jar com.google.apis:google-api-services-plus:v1-rev69-1.14.2-beta    0 26
google-api-services-oauth2-v2-rev36-1.14.2-beta.jar com.google.apis:google-api-services-oauth2:v2-rev36-1.14.2-beta    0 26
platform-component-oauth-auth-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-oauth-auth:5.2.x-SNAPSHOT   0 26
pc-portlet-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.pc:pc-portlet:5.2.x-SNAPSHOT   0 29
gatein-cdi-injection-5.2.x-SNAPSHOT.jar org.gatein.cdi:gatein-cdi-injection:5.2.x-SNAPSHOT   0 29
gatein-cdi-contexts-5.2.x-SNAPSHOT.jar org.gatein.cdi:gatein-cdi-contexts:5.2.x-SNAPSHOT   0 29
platform-welcome-screens-webapp-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-welcome-screens-webapp:5.2.x-SNAPSHOT   0 26
platform-welcome-screens-component-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-welcome-screens-component:5.2.x-SNAPSHOT   0 26
platform-component-edition-enterprise-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-edition-enterprise:5.2.x-SNAPSHOT   0 24
liquibase-slf4j-2.0.0.jar cpe:/a:slf4j:slf4j:2.0.0 com.mattbertolini:liquibase-slf4j:2.0.0    0 Low 24
snakeyaml-1.13.jar org.yaml:snakeyaml:1.13    0 25
plf-enterprise-jbosseap-ear-5.2.x-SNAPSHOT.ear   0 7
plf-exo-tools-5.2.x-SNAPSHOT.jar cpe:/a:form_tools:form_tools:5.2.20181207 org.exoplatform.platform.distributions:plf-exo-tools:5.2.x-SNAPSHOT   0 Low 26
exo-lgpl-license-resource-bundle-2.jar org.exoplatform.resources:exo-lgpl-license-resource-bundle:2   0 27
hsqldb-2.4.0.jar org.hsqldb:hsqldb:2.4.0    0 35
exo-es-embedded-war-2.2.x-SNAPSHOT.war org.exoplatform.addons.exo-es-embedded:exo-es-embedded-war:2.2.x-SNAPSHOT   0 24
enterprise-ui-skin-5.2.x-SNAPSHOT.war org.exoplatform.addons.enterprise-skin:enterprise-ui-skin:5.2.x-SNAPSHOT   0 26
wci-wildfly11-5.2.x-SNAPSHOT.jar cpe:/a:wildfly:wildfly:5.2 org.exoplatform.gatein.wci:wci-wildfly11:5.2.x-SNAPSHOT   0 Low 27
logback-core-1.1.2.jar cpe:/a:logback:logback:1.1.2 ch.qos.logback:logback-core:1.1.2  High 1 Low 30
tomcat-catalina-jmx-remote-8.5.35.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-catalina-jmx-remote:8.5.35  High 3 Low 21
commons-compiler-2.6.1.jar org.codehaus.janino:commons-compiler:2.6.1    0 18
janino-2.6.1.jar org.codehaus.janino:janino:2.6.1    0 21
plf-tomcat-integration-webapp-5.2.x-SNAPSHOT.war org.exoplatform.platform.distributions:plf-tomcat-integration-webapp:5.2.x-SNAPSHOT   0 26
wci-tomcat8-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.wci:wci-tomcat8:5.2.x-SNAPSHOT   0 29
plf-tomcat-pc-creator-listener-5.2.x-SNAPSHOT.jar org.exoplatform.platform.distributions:plf-tomcat-pc-creator-listener:5.2.x-SNAPSHOT   0 28
jansi-1.11.jar org.fusesource.jansi:jansi:1.11    0 24
jul-to-slf4j-1.7.7.jar cpe:/a:slf4j:slf4j:1.7.7 org.slf4j:jul-to-slf4j:1.7.7    0 Low 30
log4j-over-slf4j-1.7.7.jar cpe:/a:slf4j:slf4j:1.7.7 org.slf4j:log4j-over-slf4j:1.7.7    0 Low 29
jython-standalone-2.5.4-rc1.jar: jline64.dll   0 4
jython-standalone-2.5.4-rc1.jar: jline32.dll   0 4
jython-standalone-2.5.4-rc1.jar: wininst-7.1.exe   0 4
jython-standalone-2.5.4-rc1.jar: wininst-6.exe   0 4
jython-standalone-2.5.4-rc1.jar: jffi-1.0.dll   0 4
jython-standalone-2.5.4-rc1.jar: jffi-1.0.dll   0 4
ehcache-core-2.6.9.jar: sizeof-agent.jar net.sf.ehcache:sizeof-agent:1.0.1   0 26
smartgwt-lgpl-6.0-p20170514.jar: isomorphic_applets.jar   0 9
exo.portal.portlet.dashboard-5.2.x-SNAPSHOT.war: slf4j-api-1.7.5.jar cpe:/a:slf4j:slf4j:1.7.5 org.slf4j:slf4j-api:1.7.5    0 Low 30
exo.portal.portlet.dashboard-5.2.x-SNAPSHOT.war: jcr-1.0.jar cpe:/a:content_project:content:1.0 javax.jcr:jcr:1.0  Medium 1 Low 31
web-conferencing-packaging-1.3.x-SNAPSHOT.zip: web-conferencing-webrtc-services-1.3.x-SNAPSHOT.jar cpe:/a:webrtc_project:webrtc:1.3 org.exoplatform.addons.web-conferencing:web-conferencing-webrtc-services:1.3.x-SNAPSHOT Medium 2 Low 26
web-conferencing-packaging-1.3.x-SNAPSHOT.zip: web-conferencing-services-1.3.x-SNAPSHOT.jar org.exoplatform.addons.web-conferencing:web-conferencing-services:1.3.x-SNAPSHOT   0 26
web-conferencing-packaging-1.3.x-SNAPSHOT.zip: webconferencing.war org.exoplatform.addons.web-conferencing:web-conferencing-webapp:1.3.x-SNAPSHOT   0 25
web-conferencing-packaging-1.3.x-SNAPSHOT.zip: webrtc.war cpe:/a:webrtc_project:webrtc:1.3 org.exoplatform.addons.web-conferencing:web-conferencing-webrtc-webapp:1.3.x-SNAPSHOT Medium 2 Low 25
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar cpe:/a:form_manager_project:form_manager:1.4   0 Low 15
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war org.exoplatform.addons.task:task-management:2.2.x-SNAPSHOT   0 23
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management-integration.jar org.exoplatform.addons.task:task-management-integration:2.2.x-SNAPSHOT   0 23
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management-services.jar org.exoplatform.addons.task:task-management-services:2.2.x-SNAPSHOT   0 23
wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: template-pack-config.jar org.exoplatform.addons.wcm-template:template-pack-config:2.2.x-SNAPSHOT   0 25
wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: agital-template.war org.exoplatform.addons.wcm-template:agital-template:2.2.x-SNAPSHOT   0 25
wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: wai-template.war org.exoplatform.addons.wcm-template:wai-template:2.2.x-SNAPSHOT   0 25
wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: responsive-template.war org.exoplatform.addons.wcm-template:responsive-template:2.2.x-SNAPSHOT   0 25
wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: globex-template.war org.exoplatform.addons.wcm-template:globex-template:2.2.x-SNAPSHOT   0 25
bundle-2.2.x-SNAPSHOT.zip: conf-2.2.x-SNAPSHOT.jar org.exoplatform.addons.open-document:conf:2.2.x-SNAPSHOT   0 24
bundle-2.2.x-SNAPSHOT.zip: open-document.war org.exoplatform.addons.open-document:webapp:2.2.x-SNAPSHOT   0 23
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar: jansi.dll   0 2
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar: jansi.dll   0 2
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: jquery-1.11.1.jar org.webjars:jquery:1.11.1    0 17
exo-es-embedded-war-2.2.x-SNAPSHOT.war: transport-netty4-client-5.6.11.jar cpe:/a:netty_project:netty:5.6.11
cpe:/a:elastic:elasticsearch:5.6.11
cpe:/a:elasticsearch:elasticsearch:5.6.11
org.elasticsearch.plugin:transport-netty4-client:5.6.11    0 Low 30
exo-es-embedded-war-2.2.x-SNAPSHOT.war: elasticsearch-5.6.11.jar cpe:/a:elastic:elasticsearch:5.6.11
cpe:/a:elasticsearch:elasticsearch:5.6.11
org.elasticsearch:elasticsearch:5.6.11    0 Low 26
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-sandbox-6.6.1.jar org.apache.lucene:lucene-sandbox:6.6.1    0 28
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: bootstrap-datepicker-1.4.0.jar org.webjars:bootstrap-datepicker:1.4.0    0 17
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: select2-3.5.2.jar org.webjars:select2:3.5.2    0 17
exo-es-embedded-war-2.2.x-SNAPSHOT.war: spatial4j-0.6.jar org.locationtech.spatial4j:spatial4j:0.6    0 30
exo-es-embedded-war-2.2.x-SNAPSHOT.war: netty-codec-4.1.13.Final.jar cpe:/a:netty_project:netty:4.1.13 io.netty:netty-codec:4.1.13.Final    0 Low 30
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: selectize.js-0.12.1.jar org.webjars:selectize.js:0.12.1    0 17
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: bootstrap-2.3.1.jar org.webjars:bootstrap:2.3.1    0 17
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: jquery-ui-1.11.4.jar org.webjars:jquery-ui:1.11.4    0 17
task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: x-editable-bootstrap-1.4.6.jar org.webjars:x-editable-bootstrap:1.4.6    0 17
exo-es-embedded-war-2.2.x-SNAPSHOT.war: bcpkix-jdk15on-1.55.jar org.bouncycastle:bcpkix-jdk15on:1.55    0 41
exo-es-embedded-war-2.2.x-SNAPSHOT.war: commons-logging-1.1.3.jar commons-logging:commons-logging:1.1.3    0 36
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-queries-6.6.1.jar org.apache.lucene:lucene-queries:6.6.1    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jbig2-imageio-3.0.1.jar cpe:/a:apache:pdfbox:3.0.1 org.apache.pdfbox:jbig2-imageio:3.0.1    0 Low 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: commons-collections4-4.1.jar cpe:/a:apache:commons_collections:4.1 org.apache.commons:commons-collections4:4.1    0 Low 38
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-memory-6.6.1.jar org.apache.lucene:lucene-memory:6.6.1    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-grouping-6.6.1.jar org.apache.lucene:lucene-grouping:6.6.1    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-queryparser-6.6.1.jar org.apache.lucene:lucene-queryparser:6.6.1    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: objenesis-2.6.jar org.objenesis:objenesis:2.6    0 39
exo-es-embedded-war-2.2.x-SNAPSHOT.war: xz-1.8.jar cpe:/a:tukaani:xz:1.8 org.tukaani:xz:1.8  Medium 1 Low 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: joda-time-2.9.5.jar joda-time:joda-time:2.9.5    0 36
exo-es-embedded-war-2.2.x-SNAPSHOT.war: ingest-common-5.6.11.jar cpe:/a:elasticsearch:elasticsearch:5.6.11   0 Low 16
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-spatial3d-6.6.1.jar org.apache.lucene:lucene-spatial3d:6.6.1    0 31
tomcat-8.5.35.zip: tomcat-jni.jar cpe:/a:apache:tomcat_native:8.5.35
cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-jni:8.5.35  High 3 Low 24
tomcat-8.5.35.zip: annotations-api.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-annotations-api:8.5.35  High 3 Low 21
tomcat-8.5.35.zip: catalina.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-catalina:8.5.35  High 3 Low 22
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jts-1.13.jar com.vividsolutions:jts:1.13    0 20
tomcat-8.5.35.zip: jsp-api.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-jsp-api:8.5.35  High 3 Low 23
exo-es-embedded-war-2.2.x-SNAPSHOT.war: poi-3.17.jar cpe:/a:apache:poi:3.17 org.apache.poi:poi:3.17    0 Low 30
tomcat-8.5.35.zip: servlet-api.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:3.1
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-servlet-api:8.5.35  High 34 Medium 21
tomcat-8.5.35.zip: jaspic-api.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-jaspic-api:8.5.35  High 3 Low 24
tomcat-8.5.35.zip: jasper.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-jasper:8.5.35  High 3 Low 24
tomcat-8.5.35.zip: websocket-api.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-websocket-api:8.5.35  High 3 Low 21
tomcat-8.5.35.zip: tomcat-coyote.jar cpe:/a:apache:coyote_http_connector:8.5.35
cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache:tomcat_connectors:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-coyote:8.5.35  High 3 Low 24
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.4.0-1.jar org.elasticsearch:jna:4.4.0-1    0 34
exo-es-embedded-war-2.2.x-SNAPSHOT.war: fontbox-2.0.9.jar cpe:/a:apache:pdfbox:2.0.9 org.apache.pdfbox:fontbox:2.0.9    0 Low 36
tomcat-8.5.35.zip: el-api.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:3.0
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-el-api:8.5.35  High 33 Medium 21
tomcat-8.5.35.zip: ecj-4.6.3.jar org.eclipse.jdt:ecj:3.12.3    0 32
exo-es-embedded-war-2.2.x-SNAPSHOT.war: mapper-attachments-5.6.11.jar cpe:/a:elasticsearch:elasticsearch:5.6.11   0 Low 16
exo-es-embedded-war-2.2.x-SNAPSHOT.war: commons-compress-1.16.1.jar cpe:/a:apache:commons-compress:1.16.1 org.apache.commons:commons-compress:1.16.1    0 Low 44
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.1.0.jar net.java.dev.jna:jna:4.1.0    0 34
tomcat-8.5.35.zip: tomcat-jdbc.jar cpe:/a:apache_software_foundation:tomcat:8.5.35 org.apache.tomcat:tomcat-jdbc:8.5.35    0 Low 24
tomcat-8.5.35.zip: tomcat-i18n-ja.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-i18n-ja:8.5.35  High 3 Low 19
tomcat-8.5.35.zip: bootstrap.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
High 3 Low 12
tomcat-8.5.35.zip: commons-daemon.jar cpe:/a:apache:apache_commons_daemon:1.1.0 commons-daemon:commons-daemon:1.1.0    0 Low 39
tomcat-8.5.35.zip: sample.war   0 8
tomcat-8.5.35.zip: taglibs-standard-impl-1.2.5.jar cpe:/a:apache:standard_taglibs:1.2.5 org.apache.taglibs:taglibs-standard-impl:1.2.5    0 Low 28
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-spatial-extras-6.6.1.jar org.apache.lucene:lucene-spatial-extras:6.6.1    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-analyzers-common-6.6.1.jar org.apache.lucene:lucene-analyzers-common:6.6.1    0 30
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jai-imageio-jpeg2000-1.3.0.jar com.github.jai-imageio:jai-imageio-jpeg2000:1.3.0    0 30
exo-es-embedded-war-2.2.x-SNAPSHOT.war: bcmail-jdk15on-1.55.jar org.bouncycastle:bcmail-jdk15on:1.55    0 45
exo-es-embedded-war-2.2.x-SNAPSHOT.war: httpcore-4.4.5.jar org.apache.httpcomponents:httpcore:4.4.5    0 33
exo-es-embedded-war-2.2.x-SNAPSHOT.war: securesm-1.2.jar org.elasticsearch:securesm:1.2    0 16
exo-es-embedded-war-2.2.x-SNAPSHOT.war: tika-core-1.18.jar cpe:/a:apache:tika:1.18 org.apache.tika:tika-core:1.18  Medium 3 Highest 42
exo-es-embedded-war-2.2.x-SNAPSHOT.war: hppc-0.7.1.jar com.carrotsearch:hppc:0.7.1    0 22
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jempbox-1.8.13.jar cpe:/a:apache:pdfbox:1.8.13 org.apache.pdfbox:jempbox:1.8.13    0 Low 34
exo-es-embedded-war-2.2.x-SNAPSHOT.war: pdfbox-2.0.9.jar cpe:/a:apache:pdfbox:2.0.9 org.apache.pdfbox:pdfbox:2.0.9    0 Low 34
exo-es-embedded-war-2.2.x-SNAPSHOT.war: bcprov-jdk15on-1.55.jar cpe:/a:bouncycastle:bouncy-castle-crypto-package:1.55
cpe:/a:bouncycastle:bouncy_castle_crypto_package:1.55
org.bouncycastle:bcprov-jdk15on:1.55    0 Low 41
exo-es-embedded-war-2.2.x-SNAPSHOT.war: httpasyncclient-4.1.2.jar cpe:/a:apache:httpasyncclient:4.1.2 org.apache.httpcomponents:httpasyncclient:4.1.2    0 Low 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-backward-codecs-6.6.1.jar org.apache.lucene:lucene-backward-codecs:6.6.1    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jopt-simple-5.0.2.jar net.sf.jopt-simple:jopt-simple:5.0.2    0 22
exo-es-embedded-war-2.2.x-SNAPSHOT.war: reindex-client-5.6.11.jar cpe:/a:elastic:elasticsearch:5.6.11
cpe:/a:elasticsearch:elasticsearch:5.6.11
org.elasticsearch.plugin:reindex-client:5.6.11    0 Low 30
exo-es-embedded-war-2.2.x-SNAPSHOT.war: t-digest-3.0.jar com.tdunning:t-digest:3.0    0 22
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jackson-core-2.8.6.jar cpe:/a:fasterxml:jackson:2.8.6 com.fasterxml.jackson.core:jackson-core:2.8.6    0 Low 38
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-suggest-6.6.1.jar org.apache.lucene:lucene-suggest:6.6.1    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: apache-mime4j-core-0.8.1.jar cpe:/a:apache:james:0.8.1 org.apache.james:apache-mime4j-core:0.8.1    0 Low 30
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-highlighter-6.6.1.jar org.apache.lucene:lucene-highlighter:6.6.1    0 30
exo-es-embedded-war-2.2.x-SNAPSHOT.war: log4j-core-2.7.jar cpe:/a:apache:log4j:2.7 org.apache.logging.log4j:log4j-core:2.7  High 1 Highest 36
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-misc-6.6.1.jar org.apache.lucene:lucene-misc:6.6.1    0 28
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jai-imageio-core-1.3.0.jar com.github.jai-imageio:jai-imageio-core:1.3.0    0 30
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-join-6.6.1.jar org.apache.lucene:lucene-join:6.6.1    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: snakeyaml-1.15.jar org.yaml:snakeyaml:1.15    0 26
exo-es-embedded-war-2.2.x-SNAPSHOT.war: httpcore-nio-4.4.5.jar org.apache.httpcomponents:httpcore-nio:4.4.5    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: HdrHistogram-2.1.9.jar org.hdrhistogram:HdrHistogram:2.1.9    0 28
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-core-6.6.1.jar org.apache.lucene:lucene-core:6.6.1    0 28
exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-spatial-6.6.1.jar org.apache.lucene:lucene-spatial:6.6.1    0 31
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.4.0-1.jar: jnidispatch.dll   0 2
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.4.0-1.jar: jnidispatch.dll   0 2
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.1.0.jar: jnidispatch.dll   0 2
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.1.0.jar: jnidispatch.dll   0 2
exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.1.0.jar: jnidispatch.dll   0 2
jboss-eap-7.1.0.zip: java-getopt-1.0.13.redhat-5.jar gnu.getopt:java-getopt:1.0.13.redhat-5   0 28
jboss-eap-7.1.0.zip: cal10n-api-0.8.1.redhat-1.jar ch.qos.cal10n:cal10n-api:0.8.1.redhat-1   0 31
jboss-eap-7.1.0.zip: xom-1.2.10.redhat-1.jar com.io7m.xom:xom:1.2.10.redhat-1   0 50
jboss-eap-7.1.0.zip: netty-all-4.1.9.Final-redhat-1.jar cpe:/a:netty_project:netty:4.1.9 io.netty:netty-all:4.1.9.Final-redhat-1   0 Low 22
jboss-eap-7.1.0.zip: undertow-websockets-jsr-1.4.18.Final-redhat-2.jar io.undertow:undertow-websockets-jsr:1.4.18.Final-redhat-2   0 33
jboss-eap-7.1.0.zip: jastow-2.0.2.Final-redhat-1.jar cpe:/a:oracle:jsp:2.0.2 io.undertow.jastow:jastow:2.0.2.Final-redhat-1   0 Low 26
jboss-eap-7.1.0.zip: undertow-core-1.4.18.Final-redhat-2.jar io.undertow:undertow-core:1.4.18.Final-redhat-2   0 33
jboss-eap-7.1.0.zip: undertow-js-1.0.2.Final-redhat-1.jar io.undertow.js:undertow-js:1.0.2.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: undertow-servlet-1.4.18.Final-redhat-2.jar io.undertow:undertow-servlet:1.4.18.Final-redhat-2   0 33
jboss-eap-7.1.0.zip: jaxen-1.1.6.redhat-1.jar jaxen:jaxen:1.1.6.redhat-1   0 37
jboss-eap-7.1.0.zip: jansi-1.16.0.redhat-4.jar   0 29
jboss-eap-7.1.0.zip: hibernate-commons-annotations-5.0.1.Final-redhat-2.jar   0 19
jboss-eap-7.1.0.zip: jipijapa-hibernate5-7.1.0.GA-redhat-11.jar org.jboss.eap:jipijapa-hibernate5:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: hibernate-infinispan-5.1.10.Final-redhat-1.jar cpe:/a:infinispan:infinispan:5.1.10 Medium 1 Low 23
jboss-eap-7.1.0.zip: hibernate-validator-5.3.5.Final-redhat-2.jar cpe:/a:hibernate:hibernate_validator:5.3.5 org.hibernate:hibernate-validator:5.3.5.Final-redhat-2   0 Low 37
jboss-eap-7.1.0.zip: hibernate-search-engine-5.5.8.Final-redhat-1.jar org.hibernate:hibernate-search-engine:5.5.8.Final-redhat-1   0 35
jboss-eap-7.1.0.zip: hibernate-search-serialization-avro-5.5.8.Final-redhat-1.jar cpe:/a:pro_search:pro_search:5.5.8 org.hibernate:hibernate-search-serialization-avro:5.5.8.Final-redhat-1   0 Low 35
jboss-eap-7.1.0.zip: hibernate-search-orm-5.5.8.Final-redhat-1.jar org.hibernate:hibernate-search-orm:5.5.8.Final-redhat-1   0 35
jboss-eap-7.1.0.zip: hibernate-search-backend-jms-5.5.8.Final-redhat-1.jar org.hibernate:hibernate-search-backend-jms:5.5.8.Final-redhat-1   0 35
jboss-eap-7.1.0.zip: hibernate-search-backend-jgroups-5.5.8.Final-redhat-1.jar org.hibernate:hibernate-search-backend-jgroups:5.5.8.Final-redhat-1   0 35
jboss-eap-7.1.0.zip: jipijapa-hibernate4-3-7.1.0.GA-redhat-11.jar org.jboss.eap:jipijapa-hibernate4-3:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: hibernate-envers-5.1.10.Final-redhat-1.jar   0 22
jboss-eap-7.1.0.zip: hibernate-core-5.1.10.Final-redhat-1.jar   0 19
jboss-eap-7.1.0.zip: hibernate-java8-5.1.10.Final-redhat-1.jar   0 21
jboss-eap-7.1.0.zip: hibernate-entitymanager-5.1.10.Final-redhat-1.jar   0 21
jboss-eap-7.1.0.zip: jipijapa-hibernate4-1-7.1.0.GA-redhat-11.jar org.jboss.eap:jipijapa-hibernate4-1:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: javassist-3.20.0.GA-redhat-3.jar org.javassist:javassist:3.20.0.GA-redhat-3   0 37
jboss-eap-7.1.0.zip: bcmail-jdk15on-1.56.0.redhat-2.jar org.bouncycastle:bcmail-jdk15on:1.56.0.redhat-2   0 51
jboss-eap-7.1.0.zip: bcprov-jdk15on-1.56.0.redhat-2.jar cpe:/a:bouncycastle:bouncy-castle-crypto-package:1.56.0
cpe:/a:bouncycastle:bouncy_castle_crypto_package:1.56.0
org.bouncycastle:bcprov-jdk15on:1.56.0.redhat-2   0 Low 51
jboss-eap-7.1.0.zip: bcpkix-jdk15on-1.56.0.redhat-2.jar org.bouncycastle:bcpkix-jdk15on:1.56.0.redhat-2   0 51
jboss-eap-7.1.0.zip: jberet-core-1.2.4.Final-redhat-1.jar org.jberet:jberet-core:1.2.4.Final-redhat-1   0 22
jboss-eap-7.1.0.zip: infinispan-core-8.2.8.Final-redhat-1.jar cpe:/a:infinispan:infinispan:8.2.8 org.infinispan:infinispan-core:8.2.8.Final-redhat-1 Medium 3 Highest 35
jboss-eap-7.1.0.zip: joda-time-2.9.7.redhat-1.jar joda-time:joda-time:2.9.7.redhat-1   0 32
jboss-eap-7.1.0.zip: slf4j-ext-1.7.22.redhat-1.jar cpe:/a:slf4j:slf4j:1.7.22 org.slf4j:slf4j-ext:1.7.22.redhat-1   0 Low 35
jboss-eap-7.1.0.zip: slf4j-jboss-logmanager-1.0.3.GA-redhat-2.jar cpe:/a:slf4j:slf4j:1.0.3 org.jboss.slf4j:slf4j-jboss-logmanager:1.0.3.GA-redhat-2   0 Low 26
jboss-eap-7.1.0.zip: vdx-wildfly-1.1.6.redhat-1.jar cpe:/a:wildfly:wildfly:1.1.6 org.projectodd.vdx:vdx-wildfly:1.1.6.redhat-1   0 Low 26
jboss-eap-7.1.0.zip: vdx-core-1.1.6.redhat-1.jar org.projectodd.vdx:vdx-core:1.1.6.redhat-1   0 26
jboss-eap-7.1.0.zip: avro-1.7.6.redhat-1.jar org.apache.avro:avro:1.7.6.redhat-1   0 37
jboss-eap-7.1.0.zip: xmlsec-2.0.8.redhat-1.jar cpe:/a:apache:santuario_xml_security_for_java:2.0.8
cpe:/a:apache:xml_security_for_java:2.0.8
org.apache.santuario:xmlsec:2.0.8.redhat-1   0 Low 41
jboss-eap-7.1.0.zip: apache-mime4j-0.6.0.redhat-6.jar cpe:/a:apache:james:0.6.0 org.apache.james:apache-mime4j:0.6.0.redhat-6   0 Low 39
jboss-eap-7.1.0.zip: xercesImpl-2.11.0.SP5-redhat-1.jar cpe:/a:apache:xerces2_java:2.11.0.sp5 xerces:xercesImpl:2.11.0.SP5-redhat-1   0 Low 67
jboss-eap-7.1.0.zip: xml-resolver-1.2.0.redhat-11.jar xml-resolver:xml-resolver:1.2.0.redhat-11   0 32
jboss-eap-7.1.0.zip: commons-lang-2.6.0.redhat-6.jar commons-lang:commons-lang:2.6.0.redhat-6   0 39
jboss-eap-7.1.0.zip: commons-codec-1.10.0.redhat-5.jar commons-codec:commons-codec:1.10.0.redhat-5   0 39
jboss-eap-7.1.0.zip: commons-cli-1.3.1.redhat-1.jar commons-cli:commons-cli:1.3.1.redhat-1   0 39
jboss-eap-7.1.0.zip: commons-collections-3.2.2.redhat-2.jar cpe:/a:apache:commons_collections:3.2.2 commons-collections:commons-collections:3.2.2.redhat-2   0 Low 39
jboss-eap-7.1.0.zip: commons-io-2.5.0.redhat-2.jar commons-io:commons-io:2.5.0.redhat-2   0 39
jboss-eap-7.1.0.zip: commons-beanutils-1.9.3.redhat-1.jar cpe:/a:apache:commons_beanutils:1.9.3 commons-beanutils:commons-beanutils:1.9.3.redhat-1   0 Low 39
jboss-eap-7.1.0.zip: commons-pool-1.6.0.redhat-9.jar commons-pool:commons-pool:1.6.0.redhat-9   0 39
jboss-eap-7.1.0.zip: xalan-2.7.1.redhat-11.jar cpe:/a:apache:xalan-java:2.7.1 xalan:xalan:2.7.1.redhat-11 High 1 Highest 36
jboss-eap-7.1.0.zip: serializer-2.7.1.redhat-11.jar cpe:/a:apache:xalan-java:2.7.1 xalan:serializer:2.7.1.redhat-11 High 1 Highest 31
jboss-eap-7.1.0.zip: httpmime-4.5.2.redhat-1.jar cpe:/a:apache:httpclient:4.5.2 org.apache.httpcomponents:httpmime:4.5.2.redhat-1   0 Low 34
jboss-eap-7.1.0.zip: httpcore-4.4.4.redhat-1.jar org.apache.httpcomponents:httpcore:4.4.4.redhat-1   0 34
jboss-eap-7.1.0.zip: httpclient-4.5.2.redhat-1.jar cpe:/a:apache:httpclient:4.5.2 org.apache.httpcomponents:httpclient:4.5.2.redhat-1   0 Low 34
jboss-eap-7.1.0.zip: httpcore-nio-4.4.4.redhat-1.jar org.apache.httpcomponents:httpcore-nio:4.4.4.redhat-1   0 34
jboss-eap-7.1.0.zip: httpasyncclient-4.1.2.redhat-1.jar cpe:/a:apache:httpasyncclient:4.1.2 org.apache.httpcomponents:httpasyncclient:4.1.2.redhat-1   0 Low 34
jboss-eap-7.1.0.zip: neethi-3.0.3.redhat-1.jar cpe:/a:apache:apache_test:3.0.3 org.apache.neethi:neethi:3.0.3.redhat-1   0 Low 41
jboss-eap-7.1.0.zip: wss4j-policy-2.1.10.redhat-1.jar cpe:/a:apache:wss4j:2.1.10 org.apache.wss4j:wss4j-policy:2.1.10.redhat-1   0 Low 35
jboss-eap-7.1.0.zip: jasypt-1.9.2.redhat-1.jar cpe:/a:jasypt_project:jasypt:1.9.2 org.jasypt:jasypt:1.9.2.redhat-1   0 Low 32
jboss-eap-7.1.0.zip: xmlschema-core-2.2.1.redhat-1.jar cpe:/a:ws_project:ws:2.2.1 org.apache.ws.xmlschema:xmlschema-core:2.2.1.redhat-1   0 Low 33
jboss-eap-7.1.0.zip: lucene-misc-5.3.1.redhat-2.jar org.apache.lucene:lucene-misc:5.3.1.redhat-2   0 39
jboss-eap-7.1.0.zip: lucene-backward-codecs-5.3.1.redhat-2.jar org.apache.lucene:lucene-backward-codecs:5.3.1.redhat-2   0 39
jboss-eap-7.1.0.zip: lucene-analyzers-common-5.3.1.redhat-2.jar org.apache.lucene:lucene-analyzers-common:5.3.1.redhat-2   0 39
jboss-eap-7.1.0.zip: lucene-core-5.3.1.redhat-2.jar org.apache.lucene:lucene-core:5.3.1.redhat-2   0 39
jboss-eap-7.1.0.zip: lucene-queries-5.3.1.redhat-2.jar org.apache.lucene:lucene-queries:5.3.1.redhat-2   0 39
jboss-eap-7.1.0.zip: lucene-queryparser-5.3.1.redhat-2.jar org.apache.lucene:lucene-queryparser:5.3.1.redhat-2   0 39
jboss-eap-7.1.0.zip: lucene-facet-5.3.1.redhat-2.jar org.apache.lucene:lucene-facet:5.3.1.redhat-2   0 39
jboss-eap-7.1.0.zip: cxf-core-3.1.12.redhat-1.jar cpe:/a:apache:cxf:3.1.12 org.apache.cxf:cxf-core:3.1.12.redhat-1 Medium 2 Highest 30
jboss-eap-7.1.0.zip: cxf-xjc-dv-3.0.5.redhat-2.jar cpe:/a:apache:cxf:3.0.5 org.apache.cxf.xjcplugins:cxf-xjc-dv:3.0.5.redhat-2 High 8 Highest 26
jboss-eap-7.1.0.zip: cxf-services-ws-discovery-api-3.1.12.redhat-1.jar cpe:/a:ws_project:ws:3.1.12
cpe:/a:apache:cxf:3.1.12
org.apache.cxf.services.ws-discovery:cxf-services-ws-discovery-api:3.1.12.redhat-1 Medium 2 Highest 28
jboss-eap-7.1.0.zip: cxf-xjc-runtime-3.0.5.redhat-2.jar org.apache.cxf.xjc-utils:cxf-xjc-runtime:3.0.5.redhat-2   0 31
jboss-eap-7.1.0.zip: velocity-1.7.0.redhat-5.jar org.apache.velocity:velocity:1.7.0.redhat-5   0 37
jboss-eap-7.1.0.zip: jipijapa-openjpa-7.1.0.GA-redhat-11.jar org.jboss.eap:jipijapa-openjpa:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: artemis-journal-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-journal:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-native-1.5.5.008-redhat-1.jar cpe:/a:apache:apache_http_server:1.5.5.008 org.apache.activemq:artemis-native:1.5.5.008-redhat-1 Medium 2 Low 33
jboss-eap-7.1.0.zip: artemis-commons-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-commons:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-core-client-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-core-client:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-jdbc-store-1.5.5.008-redhat-1.jar cpe:/a:oracle:jdbc:1.5.5.008 org.apache.activemq:artemis-jdbc-store:1.5.5.008-redhat-1   0 Low 24
jboss-eap-7.1.0.zip: artemis-cli-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-cli:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-service-extensions-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-service-extensions:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-server-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-server:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-jms-server-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-jms-server:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-selector-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-selector:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-jms-client-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-jms-client:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-dto-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-dto:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: artemis-ra-1.5.5.008-redhat-1.jar org.apache.activemq:artemis-ra:1.5.5.008-redhat-1   0 24
jboss-eap-7.1.0.zip: snakeyaml-1.17.0.redhat-1.jar org.yaml:snakeyaml:1.17.0.redhat-1   0 39
jboss-eap-7.1.0.zip: jsoup-1.8.3.redhat-2.jar cpe:/a:jsoup:jsoup:1.8.3:a org.jsoup:jsoup:1.8.3.redhat-2 Medium 1 Highest 41
jboss-eap-7.1.0.zip: jgroups-azure-1.1.0.Final-redhat-1.jar org.jgroups.azure:jgroups-azure:1.1.0.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: jgroups-3.6.13.Final-redhat-2.jar org.jgroups:jgroups:3.6.13.Final-redhat-2   0 41
jboss-eap-7.1.0.zip: hornetq-commons-2.4.7.Final-redhat-1.jar org.hornetq:hornetq-commons:2.4.7.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: hornetq-core-client-2.4.7.Final-redhat-1.jar org.hornetq:hornetq-core-client:2.4.7.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: hornetq-jms-client-2.4.7.Final-redhat-1.jar org.hornetq:hornetq-jms-client:2.4.7.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: javax.json-1.0.4.redhat-1.jar org.glassfish:javax.json:1.0.4.redhat-1   0 41
jboss-eap-7.1.0.zip: javax.el-impl-3.0.1.b08-redhat-1.jar cpe:/a:oracle:glassfish:3.0.1.b08 org.glassfish:javax.el-impl:3.0.1.b08-redhat-1 Medium 2 Low 37
jboss-eap-7.1.0.zip: javax.enterprise.concurrent-1.0.0.redhat-1.jar org.glassfish:javax.enterprise.concurrent:1.0.0.redhat-1   0 41
jboss-eap-7.1.0.zip: jettison-1.3.8.redhat-1.jar org.codehaus.jettison:jettison:1.3.8.redhat-1   0 32
jboss-eap-7.1.0.zip: stax2-api-3.1.4.redhat-1.jar org.codehaus.woodstox:stax2-api:3.1.4.redhat-1   0 37
jboss-eap-7.1.0.zip: woodstox-core-5.0.3.redhat-1.jar com.fasterxml.woodstox:woodstox-core:5.0.3.redhat-1   0 43
jboss-eap-7.1.0.zip: jackson-core-asl-1.9.13.redhat-4.jar cpe:/a:fasterxml:jackson:1.9.13 High 2 Low 18
jboss-eap-7.1.0.zip: dom4j-1.6.1.redhat-7.jar cpe:/a:dom4j_project:dom4j:1.6.1 dom4j:dom4j:1.6.1.redhat-7 Medium 1 Highest 36
jboss-eap-7.1.0.zip: picketlink-wildfly8-2.5.5.SP8-redhat-1.jar cpe:/a:wildfly:wildfly:2.5.5.sp8
cpe:/a:picketlink:picketlink:2.5.5.sp8
Medium 3 Low 24
jboss-eap-7.1.0.zip: picketlink-api-2.5.5.SP8-redhat-1.jar cpe:/a:picketlink:picketlink:2.5.5.sp8 org.picketlink:picketlink-api:2.5.5.SP8-redhat-1 Medium 3 Low 24
jboss-eap-7.1.0.zip: antlr-2.7.7.redhat-7.jar antlr:antlr:2.7.7.redhat-7   0 28
jboss-eap-7.1.0.zip: ecj-4.6.1.redhat-1.jar org.eclipse.jdt.core.compiler:ecj:4.6.1.redhat-1   0 35
jboss-eap-7.1.0.zip: jipijapa-eclipselink-7.1.0.GA-redhat-11.jar org.jboss.eap:jipijapa-eclipselink:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: netty-xnio-transport-0.1.2.Final-redhat-1.jar cpe:/a:netty_project:netty:0.1.2 org.jboss.xnio.netty:netty-xnio-transport:0.1.2.Final-redhat-1 Medium 2 Low 28
jboss-eap-7.1.0.zip: xnio-nio-3.5.4.Final-redhat-1.jar org.jboss.xnio:xnio-nio:3.5.4.Final-redhat-1   0 39
jboss-eap-7.1.0.zip: xnio-api-3.5.4.Final-redhat-1.jar org.jboss.xnio:xnio-api:3.5.4.Final-redhat-1   0 39
jboss-eap-7.1.0.zip: narayana-jts-integration-5.5.30.Final-redhat-1.jar org.jboss.narayana.jts:narayana-jts-integration:5.5.30.Final-redhat-1   0 37
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar   0 27
jboss-eap-7.1.0.zip: jboss-remoting-5.0.5.Final-redhat-1.jar org.jboss.remoting:jboss-remoting:5.0.5.Final-redhat-1   0 32
jboss-eap-7.1.0.zip: jboss-invocation-1.5.0.Final-redhat-1.jar org.jboss.invocation:jboss-invocation:1.5.0.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jboss-stdio-1.0.2.GA-redhat-2.jar org.jboss.stdio:jboss-stdio:1.0.2.GA-redhat-2   0 26
jboss-eap-7.1.0.zip: jboss-negotiation-common-3.0.4.Final-redhat-1.jar org.jboss.security:jboss-negotiation-common:3.0.4.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jboss-negotiation-ntlm-3.0.4.Final-redhat-1.jar org.jboss.security:jboss-negotiation-ntlm:3.0.4.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jboss-negotiation-extras-3.0.4.Final-redhat-1.jar org.jboss.security:jboss-negotiation-extras:3.0.4.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jboss-negotiation-spnego-3.0.4.Final-redhat-1.jar org.jboss.security:jboss-negotiation-spnego:3.0.4.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jbossxacml-2.0.8.Final-redhat-8.jar   0 28
jboss-eap-7.1.0.zip: jandex-2.0.3.Final-redhat-1.jar org.jboss:jandex:2.0.3.Final-redhat-1   0 31
jboss-eap-7.1.0.zip: jboss-ejb3-ext-api-2.2.0.Final-redhat-1.jar org.jboss.ejb3:jboss-ejb3-ext-api:2.2.0.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jboss-classfilewriter-1.2.1.Final-redhat-1.jar org.jboss.classfilewriter:jboss-classfilewriter:1.2.1.Final-redhat-1   0 37
jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar   0 24
jboss-eap-7.1.0.zip: jbosstxbridge-5.5.30.Final-redhat-1.jar org.jboss.narayana:jbosstxbridge:5.5.30.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: staxmapper-1.3.0.Final-redhat-1.jar org.jboss:staxmapper:1.3.0.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: remoting-jmx-3.0.0.Final-redhat-1.jar org.jboss.remotingjmx:remoting-jmx:3.0.0.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jboss-metadata-ejb-10.0.2.Final-redhat-1.jar org.jboss.metadata:jboss-metadata-ejb:10.0.2.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jboss-metadata-common-10.0.2.Final-redhat-1.jar org.jboss.metadata:jboss-metadata-common:10.0.2.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: jboss-metadata-ear-10.0.2.Final-redhat-1.jar org.jboss.metadata:jboss-metadata-ear:10.0.2.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: jboss-metadata-web-10.0.2.Final-redhat-1.jar org.jboss.metadata:jboss-metadata-web:10.0.2.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: jboss-metadata-appclient-10.0.2.Final-redhat-1.jar org.jboss.metadata:jboss-metadata-appclient:10.0.2.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: ironjacamar-core-api-1.4.6.Final-redhat-1.jar cpe:/a:jboss:ironjacamar:1.4.6   0 Low 16
jboss-eap-7.1.0.zip: jboss-transaction-spi-7.6.0.Final-redhat-1.jar org.jboss:jboss-transaction-spi:7.6.0.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jboss-seam-int-jbossas.jar cpe:/a:jboss:seam:7.0.0 org.jboss.seam.integration:jboss-seam-int-jbossas:7.0.0.GA-redhat-2   0 Low 28
jboss-eap-7.1.0.zip: aesh-0.66.19.redhat-1.jar org.jboss.aesh:aesh:0.66.19.redhat-1   0 26
jboss-eap-7.1.0.zip: jbossws-cxf-jaspi-5.1.9.Final-redhat-1.jar org.jboss.ws.cxf:jbossws-cxf-jaspi:5.1.9.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jbossws-cxf-client-5.1.9.Final-redhat-1.jar org.jboss.ws.cxf:jbossws-cxf-client:5.1.9.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jbossws-common-3.1.5.Final-redhat-1.jar org.jboss.ws:jbossws-common:3.1.5.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jbossws-spi-3.1.4.Final-redhat-1.jar org.jboss.ws:jbossws-spi:3.1.4.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jbossws-common-tools-1.2.4.Final-redhat-1.jar org.jboss.ws:jbossws-common-tools:1.2.4.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jaxws-undertow-httpspi-1.0.1.Final-redhat-1.jar org.jboss.ws.projects:jaxws-undertow-httpspi:1.0.1.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jbossws-api-1.0.3.Final-redhat-1.jar org.jboss.ws:jbossws-api:1.0.3.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jbossws-cxf-transports-udp-5.1.9.Final-redhat-1.jar org.jboss.ws.cxf:jbossws-cxf-transports-udp:5.1.9.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jbossws-cxf-transports-undertow-5.1.9.Final-redhat-1.jar org.jboss.ws.cxf:jbossws-cxf-transports-undertow:5.1.9.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jbossws-cxf-factories-5.1.9.Final-redhat-1.jar org.jboss.ws.cxf:jbossws-cxf-factories:5.1.9.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jbossws-cxf-server-5.1.9.Final-redhat-1.jar org.jboss.ws.cxf:jbossws-cxf-server:5.1.9.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jboss-threads-2.2.1.Final-redhat-1.jar org.jboss.threads:jboss-threads:2.2.1.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jboss-marshalling-river-2.0.2.Final-redhat-1.jar org.jboss.marshalling:jboss-marshalling-river:2.0.2.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jboss-marshalling-2.0.2.Final-redhat-1.jar org.jboss.marshalling:jboss-marshalling:2.0.2.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: txframework-5.5.30.Final-redhat-1.jar org.jboss.narayana.txframework:txframework:5.5.30.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: compensations-5.5.30.Final-redhat-1.jar org.jboss.narayana.compensations:compensations:5.5.30.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: restat-integration-5.5.30.Final-redhat-1.jar org.jboss.narayana.rts:restat-integration:5.5.30.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: restat-util-5.5.30.Final-redhat-1.jar cpe:/a:util-linux_project:util-linux:5.5.30 org.jboss.narayana.rts:restat-util:5.5.30.Final-redhat-1 High 2 Low 26
jboss-eap-7.1.0.zip: restat-bridge-5.5.30.Final-redhat-1.jar org.jboss.narayana.rts:restat-bridge:5.5.30.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: restat-api-5.5.30.Final-redhat-1.jar org.jboss.narayana.rts:restat-api:5.5.30.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jboss-common-beans-2.0.0.Final-redhat-1.jar org.jboss.common:jboss-common-beans:2.0.0.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jboss-msc-1.2.7.SP1-redhat-1.jar org.jboss.msc:jboss-msc:1.2.7.SP1-redhat-1   0 26
jboss-eap-7.1.0.zip: jboss-dmr-1.4.1.Final-redhat-1.jar org.jboss:jboss-dmr:1.4.1.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: log4j-jboss-logmanager-1.1.4.Final-redhat-1.jar org.jboss.logmanager:log4j-jboss-logmanager:1.1.4.Final-redhat-1   0 22
jboss-eap-7.1.0.zip: jboss-ejb-client-4.0.9.Final-redhat-1.jar org.jboss:jboss-ejb-client:4.0.9.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jboss-iiop-client-1.0.1.Final-redhat-1.jar org.jboss:jboss-iiop-client:1.0.1.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: commons-logging-jboss-logmanager-1.0.2.Final-redhat-1.jar org.jboss.logmanager:commons-logging-jboss-logmanager:1.0.2.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: jboss-logmanager-2.0.7.Final-redhat-1.jar org.jboss.logmanager:jboss-logmanager:2.0.7.Final-redhat-1   0 33
jboss-eap-7.1.0.zip: jboss-vfs-3.2.12.Final-redhat-1.jar org.jboss:jboss-vfs:3.2.12.Final-redhat-1   0 32
jboss-eap-7.1.0.zip: mod_cluster-container-spi-1.3.7.Final-redhat-1.jar org.jboss.mod_cluster:mod_cluster-container-spi:1.3.7.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: mod_cluster-core-1.3.7.Final-redhat-1.jar org.jboss.mod_cluster:mod_cluster-core:1.3.7.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: wildfly-web-common-7.1.0.GA-redhat-11.jar org.jboss.eap:wildfly-web-common:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: release-stream-2.9.15.Final-redhat-1-resources.jar org.jboss.hal:release-stream:2.9.15.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: jipijapa-spi-7.1.0.GA-redhat-11.jar org.jboss.eap:jipijapa-spi:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: wildfly-ejb3-7.1.0.GA-redhat-11.jar org.jboss.eap:wildfly-ejb3:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: wildfly-system-jmx-7.1.0.GA-redhat-11.jar org.jboss.eap:wildfly-system-jmx:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: wildfly-core-security-3.0.10.Final-redhat-1.jar cpe:/a:wildfly:wildfly:3.0.10 org.wildfly.core:wildfly-core-security:3.0.10.Final-redhat-1   0 Low 26
jboss-eap-7.1.0.zip: weld-core-jsf-2.4.3.Final-redhat-1.jar org.jboss.weld:weld-core-jsf:2.4.3.Final-redhat-1   0 32
jboss-eap-7.1.0.zip: wildfly-ee-7.1.0.GA-redhat-11.jar cpe:/a:wildfly:wildfly:7.1.0 org.jboss.eap:wildfly-ee:7.1.0.GA-redhat-11   0 Low 26
jboss-eap-7.1.0.zip: wildfly-jsr77-7.1.0.GA-redhat-11.jar org.jboss.eap:wildfly-jsr77:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: jbossws-cxf-resources-5.1.9.Final-redhat-1-wildfly1100.jar org.jboss.ws.cxf:jbossws-cxf-resources:5.1.9.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: resteasy-yaml-provider-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-yaml-provider:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-cdi-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-cdi:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-client-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-client:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-jaxrs-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-jaxrs:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-crypto-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-crypto:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-atom-provider-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-atom-provider:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-multipart-provider-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-multipart-provider:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-jackson-provider-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-jackson-provider:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-validator-provider-11-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-validator-provider-11:3.0.24.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: resteasy-spring-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-spring:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-jaxb-provider-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-jaxb-provider:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-jackson2-provider-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-jackson2-provider:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: jose-jwt-3.0.24.Final-redhat-1.jar cpe:/a:jwt_project:jwt:3.0.24 org.jboss.resteasy:jose-jwt:3.0.24.Final-redhat-1   0 Low 24
jboss-eap-7.1.0.zip: resteasy-json-p-provider-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-json-p-provider:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-jettison-provider-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-jettison-provider:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: resteasy-jsapi-3.0.24.Final-redhat-1.jar org.jboss.resteasy:resteasy-jsapi:3.0.24.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-eap7.1-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-eap7.1:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly10.0-to-eap7.1-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly10.0-to-eap7.1:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly10.0-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly10.0:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly8.2-to-eap7.0-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly8.2-to-eap7.0:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-eap7.0-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-eap7.0:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly9.0-to-eap7.1-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly9.0-to-eap7.1:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly8.2-to-eap7.1-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly8.2-to-eap7.1:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-eap6.4-to-eap7.1-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-eap6.4-to-eap7.1:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly10.1-to-eap7.1-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly10.1-to-eap7.1:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-core-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-core:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-eap7.0-to-eap7.1-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-eap7.0-to-eap7.1:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-cli-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-cli:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-eap6.4-to-eap7.0-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-eap6.4-to-eap7.0:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly9.0-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly9.0:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly8.2-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly8.2:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly10.1-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly10.1:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-wildfly9.0-to-eap7.0-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-wildfly9.0-to-eap7.0:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: jboss-server-migration-eap6.4-1.0.3.Final-redhat-4.jar org.jboss.migration:jboss-server-migration-eap6.4:1.0.3.Final-redhat-4   0 24
jboss-eap-7.1.0.zip: generic-jms-ra-jar-2.0.0.Final-redhat-1.jar org.jboss.genericjms:generic-jms-ra-jar:2.0.0.Final-redhat-1   0 24
jboss-eap-7.1.0.zip: jboss-jaxb-intros-1.0.2.GA-redhat-8.jar jboss.jaxbintros:jboss-jaxb-intros:1.0.2.GA-redhat-8   0 26
jboss-eap-7.1.0.zip: weld-spi-2.4.0.SP1-redhat-1.jar org.jboss.weld:weld-spi:2.4.0.SP1-redhat-1   0 26
jboss-eap-7.1.0.zip: weld-probe-core-2.4.3.Final-redhat-1.jar org.jboss.weld.probe:weld-probe-core:2.4.3.Final-redhat-1   0 28
jboss-eap-7.1.0.zip: weld-api-2.4.0.SP1-redhat-1.jar org.jboss.weld:weld-api:2.4.0.SP1-redhat-1   0 28
jboss-eap-7.1.0.zip: weld-core-impl-2.4.3.Final-redhat-1.jar org.jboss.weld:weld-core-impl:2.4.3.Final-redhat-1   0 32
jboss-eap-7.1.0.zip: jul-to-slf4j-stub-1.0.1.Final-redhat-3.jar cpe:/a:slf4j:slf4j:1.0.1 org.jboss.logging:jul-to-slf4j-stub:1.0.1.Final-redhat-3   0 Low 24
jboss-eap-7.1.0.zip: jboss-logging-3.3.1.Final-redhat-1.jar org.jboss.logging:jboss-logging:3.3.1.Final-redhat-1   0 37
jboss-eap-7.1.0.zip: jdom-1.1.3.redhat-3.jar org.jdom:jdom:1.1.3.redhat-3   0 55
jboss-eap-7.1.0.zip: wildfly-http-ejb-client-1.0.8.Final-redhat-1.jar cpe:/a:wildfly:wildfly:1.0.8 org.wildfly.wildfly-http-client:wildfly-http-ejb-client:1.0.8.Final-redhat-1   0 Low 24
jboss-eap-7.1.0.zip: wildfly-transaction-client-1.0.2.Final-redhat-1.jar cpe:/a:wildfly:wildfly:1.0.2 org.wildfly.transaction:wildfly-transaction-client:1.0.2.Final-redhat-1   0 Low 26
jboss-eap-7.1.0.zip: wildfly-elytron-1.1.7.Final-redhat-1.jar cpe:/a:wildfly:wildfly:1.1.7 org.wildfly.security:wildfly-elytron:1.1.7.Final-redhat-1   0 Low 26
jboss-eap-7.1.0.zip: undertow-server-1.0.1.Final-redhat-1.jar cpe:/a:wildfly:wildfly:1.0.1 org.wildfly.security.elytron-web:undertow-server:1.0.1.Final-redhat-1   0 Low 26
jboss-eap-7.1.0.zip: wildfly-common-1.2.0.Final-redhat-1.jar cpe:/a:wildfly:wildfly:1.2.0 org.wildfly.common:wildfly-common:1.2.0.Final-redhat-1   0 Low 31
jboss-eap-7.1.0.zip: wildfly-naming-client-1.0.7.Final-redhat-1.jar cpe:/a:wildfly:wildfly:1.0.7 org.wildfly:wildfly-naming-client:1.0.7.Final-redhat-1   0 Low 24
jboss-eap-7.1.0.zip: wfssl.dll   0 2
jboss-eap-7.1.0.zip: wfssl.dll   0 2
jboss-eap-7.1.0.zip: wildfly-openssl-java-1.0.2.Final-redhat-1.jar cpe:/a:openssl:openssl:1.0.2
cpe:/a:openssl_project:openssl:1.0.2
cpe:/a:wildfly:wildfly:1.0.2
org.wildfly.openssl:wildfly-openssl-java:1.0.2.Final-redhat-1 High 65 Highest 22
jboss-eap-7.1.0.zip: wildfly-clustering-marshalling-jboss-7.1.0.GA-redhat-11.jar org.jboss.eap:wildfly-clustering-marshalling-jboss:7.1.0.GA-redhat-11   0 26
jboss-eap-7.1.0.zip: wildfly-clustering-ee-infinispan-7.1.0.GA-redhat-11.jar cpe:/a:wildfly:wildfly:7.1.0
cpe:/a:infinispan:infinispan:7.1.0
org.jboss.eap:wildfly-clustering-ee-infinispan:7.1.0.GA-redhat-11 Medium 3 Highest 26
jboss-eap-7.1.0.zip: wildfly-client-config-1.0.0.Final-redhat-1.jar cpe:/a:wildfly:wildfly:1.0.0 org.wildfly.client:wildfly-client-config:1.0.0.Final-redhat-1   0 Low 35
jboss-eap-7.1.0.zip: artemis-wildfly-integration-1.0.2.redhat-1.jar cpe:/a:wildfly:wildfly:1.0.2 org.jboss.activemq.artemis.integration:artemis-wildfly-integration:1.0.2.redhat-1   0 Low 24
jboss-eap-7.1.0.zip: wildfly-picketlink-7.1.0.GA-redhat-11.jar cpe:/a:wildfly:wildfly:7.1.0
cpe:/a:picketlink:picketlink:7.1.0
org.jboss.eap:wildfly-picketlink:7.1.0.GA-redhat-11   0 Low 26
plf-enterprise-jbosseap-package-5.2.x-SNAPSHOT.zip: exo-push-notifications-service-1.1.x-SNAPSHOT.jar org.exoplatform.addons.push-notifications:exo-push-notifications-service:1.1.x-SNAPSHOT   0 24
jboss-eap-7.1.0.zip: cryptacular-1.2.0.redhat-1.jar org.cryptacular:cryptacular:1.2.0.redhat-1   0 37
jboss-eap-7.1.0.zip: opensaml-core-3.1.1.redhat-1.jar cpe:/a:shibboleth:opensaml:3.1.1 org.opensaml:opensaml-core:3.1.1.redhat-1   0 Low 26
jboss-eap-7.1.0.zip: java-support-7.1.1.redhat-2.jar cpe:/a:util-linux_project:util-linux:7.1.1
cpe:/a:linux:util-linux:7.1.1
net.shibboleth.utilities:java-support:7.1.1.redhat-2 High 2 Low 24
jboss-eap-7.1.0.zip: picketbox-commons-1.0.0.final-redhat-5.jar org.picketbox:picketbox-commons:1.0.0.final-redhat-5   0 34
jboss-eap-7.1.0.zip: picketbox-infinispan-5.0.2.Final-redhat-1.jar cpe:/a:infinispan:infinispan:5.0.2 org.picketbox:picketbox-infinispan:5.0.2.Final-redhat-1 Medium 1 Low 28
jboss-eap-7.1.0.zip: picketbox-5.0.2.Final-redhat-1.jar   0 21
jboss-eap-7.1.0.zip: azure-storage-5.0.0.redhat-1.jar com.microsoft.azure:azure-storage:5.0.0.redhat-1   0 28
jboss-eap-7.1.0.zip: classmate-1.3.3.redhat-1.jar com.fasterxml:classmate:1.3.3.redhat-1   0 43
jboss-eap-7.1.0.zip: jackson-databind-2.8.9.redhat-1.jar cpe:/a:fasterxml:jackson:2.8.9
cpe:/a:fasterxml:jackson-databind:2.8.9
com.fasterxml.jackson.core:jackson-databind:2.8.9.redhat-1 High 4 Highest 39
jboss-eap-7.1.0.zip: jackson-core-2.8.9.redhat-1.jar cpe:/a:fasterxml:jackson:2.8.9 com.fasterxml.jackson.core:jackson-core:2.8.9.redhat-1   0 Low 39
jboss-eap-7.1.0.zip: guava-20.0.0.redhat-1.jar cpe:/a:google:guava:20.0 com.google.guava:guava:20.0.0.redhat-1 Medium 1 Highest 35
jboss-eap-7.1.0.zip: jsf-impl-2.2.13.SP4-redhat-1.jar com.sun.faces:jsf-impl:2.2.13.SP4-redhat-1   0 26
jboss-eap-7.1.0.zip: xsom-20140925.0.0.redhat-1.jar com.sun.xsom:xsom:20140925.0.0.redhat-1   0 37
jboss-eap-7.1.0.zip: istack-commons-tools-2.21.0.redhat-1.jar com.sun.istack:istack-commons-tools:2.21.0.redhat-1   0 37
jboss-eap-7.1.0.zip: istack-commons-runtime-2.21.0.redhat-1.jar com.sun.istack:istack-commons-runtime:2.21.0.redhat-1   0 37
jboss-eap-7.1.0.zip: txw2-2.2.11.redhat-4.jar org.glassfish.jaxb:txw2:2.2.11.redhat-4   0 29
jboss-eap-7.1.0.zip: FastInfoset-1.2.13.redhat-1.jar com.sun.xml.fastinfoset:FastInfoset:1.2.13.redhat-1   0 44
jboss-eap-7.1.0.zip: codemodel-2.2.11.redhat-4.jar org.glassfish.jaxb:codemodel:2.2.11.redhat-4   0 29
jboss-eap-7.1.0.zip: jaxb-xjc-2.2.11.redhat-4.jar org.glassfish.jaxb:jaxb-xjc:2.2.11.redhat-4   0 29
jboss-eap-7.1.0.zip: rngom-2.2.11.redhat-4.jar com.sun.xml.bind.external:rngom:2.2.11.redhat-4   0 29
jboss-eap-7.1.0.zip: jaxb-jxc-2.2.11.redhat-4.jar org.glassfish.jaxb:jaxb-jxc:2.2.11.redhat-4   0 29
jboss-eap-7.1.0.zip: jaxb-runtime-2.2.11.redhat-4.jar org.glassfish.jaxb:jaxb-runtime:2.2.11.redhat-4   0 29
jboss-eap-7.1.0.zip: jaxb-core-2.2.11.redhat-4.jar org.glassfish.jaxb:jaxb-core:2.2.11.redhat-4   0 29
jboss-eap-7.1.0.zip: saaj-impl-1.3.16.SP1-redhat-6.jar com.sun.xml.messaging.saaj:saaj-impl:1.3.16.SP1-redhat-6   0 31
jboss-eap-7.1.0.zip: compiler-0.9.4.redhat-1.jar cpe:/a:mustache.js_project:mustache.js:0.9.4 com.github.spullara.mustache.java:compiler:0.9.4.redhat-1 Medium 1 Low 28
jboss-eap-7.1.0.zip: relaxngDatatype-2011.1.0.redhat-10.jar com.github.relaxng:relaxngDatatype:2011.1.0.redhat-10   0 24
jboss-eap-7.1.0.zip: h2-1.4.193.redhat-2.jar cpe:/a:h2database:h2:1.4.193 com.h2database:h2:1.4.193.redhat-2   0 Low 28
jboss-eap-7.1.0.zip: asm-3.3.1.redhat-13.jar   0 15
jboss-eap-7.1.0.zip: jboss-websocket-api_1.1_spec-1.1.1.Final-redhat-1.jar org.jboss.spec.javax.websocket:jboss-websocket-api_1.1_spec:1.1.1.Final-redhat-1   0 38
jboss-eap-7.1.0.zip: jboss-jms-api_2.0_spec-1.0.1.Final-redhat-1.jar org.jboss.spec.javax.jms:jboss-jms-api_2.0_spec:1.0.1.Final-redhat-1   0 36
jboss-eap-7.1.0.zip: jboss-jsf-api_2.2_spec-2.2.13.redhat-1.jar org.jboss.spec.javax.faces:jboss-jsf-api_2.2_spec:2.2.13.redhat-1   0 36
jboss-eap-7.1.0.zip: jboss-ejb-api_3.2_spec-1.0.0.Final-redhat-1.jar org.jboss.spec.javax.ejb:jboss-ejb-api_3.2_spec:1.0.0.Final-redhat-1   0 38
jboss-eap-7.1.0.zip: jsr181-api-1.0.0.MR1-redhat-8.jar javax.jws:jsr181-api:1.0.0.MR1-redhat-8   0 28
jboss-eap-7.1.0.zip: jboss-connector-api_1.7_spec-1.0.0.Final-redhat-1.jar org.jboss.spec.javax.resource:jboss-connector-api_1.7_spec:1.0.0.Final-redhat-1   0 38
jboss-eap-7.1.0.zip: jboss-j2eemgmt-api_1.1_spec-1.0.1.Final-redhat-4.jar org.jboss.spec.javax.management.j2ee:jboss-j2eemgmt-api_1.1_spec:1.0.1.Final-redhat-4   0 38
jboss-eap-7.1.0.zip: jboss-transaction-api_1.2_spec-1.0.1.Final-redhat-1.jar org.jboss.spec.javax.transaction:jboss-transaction-api_1.2_spec:1.0.1.Final-redhat-1   0 34
jboss-eap-7.1.0.zip: jboss-jaspi-api_1.1_spec-1.0.0.Final-redhat-1.jar org.jboss.spec.javax.security.auth.message:jboss-jaspi-api_1.1_spec:1.0.0.Final-redhat-1   0 38
jboss-eap-7.1.0.zip: jboss-jacc-api_1.5_spec-1.0.1.Final-redhat-1.jar org.jboss.spec.javax.security.jacc:jboss-jacc-api_1.5_spec:1.0.1.Final-redhat-1   0 36
jboss-eap-7.1.0.zip: validation-api-1.1.0.Final-redhat-1.jar javax.validation:validation-api:1.1.0.Final-redhat-1   0 37
jboss-eap-7.1.0.zip: jboss-annotations-api_1.2_spec-1.0.0.Final-redhat-1.jar org.jboss.spec.javax.annotation:jboss-annotations-api_1.2_spec:1.0.0.Final-redhat-1   0 38
jboss-eap-7.1.0.zip: jboss-interceptors-api_1.2_spec-1.0.0.Final-redhat-1.jar org.jboss.spec.javax.interceptor:jboss-interceptors-api_1.2_spec:1.0.0.Final-redhat-1   0 38
jboss-eap-7.1.0.zip: jboss-el-api_3.0_spec-1.0.9.Final-redhat-1.jar org.jboss.spec.javax.el:jboss-el-api_3.0_spec:1.0.9.Final-redhat-1   0 36
jboss-eap-7.1.0.zip: jboss-saaj-api_1.3_spec-1.0.4.Final-redhat-1.jar org.jboss.spec.javax.xml.soap:jboss-saaj-api_1.3_spec:1.0.4.Final-redhat-1   0 36
jboss-eap-7.1.0.zip: jboss-jaxrpc-api_1.1_spec-1.0.1.Final-redhat-5.jar org.jboss.spec.javax.xml.rpc:jboss-jaxrpc-api_1.1_spec:1.0.1.Final-redhat-5   0 38
jboss-eap-7.1.0.zip: jboss-jaxws-api_2.2_spec-2.0.4.Final-redhat-1.jar org.jboss.spec.javax.xml.ws:jboss-jaxws-api_2.2_spec:2.0.4.Final-redhat-1   0 36
jboss-eap-7.1.0.zip: jboss-jaxb-api_2.2_spec-1.0.4.Final-redhat-4.jar org.jboss.spec.javax.xml.bind:jboss-jaxb-api_2.2_spec:1.0.4.Final-redhat-4   0 38
jboss-eap-7.1.0.zip: jboss-jaxrs-api_2.0_spec-1.0.0.Final-redhat-1.jar org.jboss.spec.javax.ws.rs:jboss-jaxrs-api_2.0_spec:1.0.0.Final-redhat-1   0 40
jboss-eap-7.1.0.zip: jboss-concurrency-api_1.0_spec-1.0.0.Final-redhat-1.jar org.jboss.spec.javax.enterprise.concurrent:jboss-concurrency-api_1.0_spec:1.0.0.Final-redhat-1   0 38
jboss-eap-7.1.0.zip: cdi-api-1.2.0.redhat-2.jar cpe:/a:red_hat:enterprise_linux:1.2.0 javax.enterprise:cdi-api:1.2.0.redhat-2   0 Low 41
jboss-eap-7.1.0.zip: activation-1.1.1.redhat-5.jar javax.activation:activation:1.1.1.redhat-5   0 20
jboss-eap-7.1.0.zip: wsdl4j-1.6.3.redhat-2.jar wsdl4j:wsdl4j:1.6.3.redhat-2   0 34
jboss-eap-7.1.0.zip: openjdk-orb-8.0.8.Final-redhat-1.jar cpe:/a:oracle:openjdk:8.0.8 org.jboss.openjdk-orb:openjdk-orb:8.0.8.Final-redhat-1 Low 1 Low 26
jboss-eap-7.1.0.zip: javax.mail-1.5.6.redhat-1.jar cpe:/a:sun:javamail:1.5.6 com.sun.mail:javax.mail:1.5.6.redhat-1   0 Low 39
jboss-eap-7.1.0.zip: taglibs-standard-impl-1.2.6.RC1-redhat-1.jar cpe:/a:apache:standard_taglibs:1.2.6.rc1 org.apache.taglibs:taglibs-standard-impl:1.2.6.RC1-redhat-1   0 Low 33
jboss-eap-7.1.0.zip: jboss-jsp-api_2.3_spec-1.0.1.Final-redhat-1.jar org.jboss.spec.javax.servlet.jsp:jboss-jsp-api_2.3_spec:1.0.1.Final-redhat-1   0 38
jboss-eap-7.1.0.zip: jboss-servlet-api_3.1_spec-1.0.0.Final-redhat-1.jar org.jboss.spec.javax.servlet:jboss-servlet-api_3.1_spec:1.0.0.Final-redhat-1   0 38
jboss-eap-7.1.0.zip: jboss-batch-api_1.0_spec-1.0.0.Final-redhat-1.jar org.jboss.spec.javax.batch:jboss-batch-api_1.0_spec:1.0.0.Final-redhat-1   0 39
jboss-eap-7.1.0.zip: javax.inject-1.0.0.redhat-6.jar javax.inject:javax.inject:1.0.0.redhat-6   0 30
jboss-eap-7.1.0.zip: hibernate-jpa-2.1-api-1.0.0.Final-redhat-2.jar   0 13
jboss-eap-7.1.0.zip: jcip-annotations-1.0.0.redhat-8.jar net.jcip:jcip-annotations:1.0.0.redhat-8   0 28
jboss-eap-7.1.0.zip: jboss-modules.jar org.jboss.modules:jboss-modules:1.6.0.Final-redhat-1   0 26
jboss-eap-7.1.0.zip: launcher.jar cpe:/a:wildfly:wildfly:3.0.10 org.wildfly.core:wildfly-launcher:3.0.10.Final-redhat-1   0 Low 26
jboss-eap-7.1.0.zip: wildfly-elytron-tool.jar cpe:/a:wildfly:wildfly:1.0.5   0 Low 18
jboss-eap-7.1.0.zip: jboss-client.jar   0 18
jboss-eap-7.1.0.zip: jboss-cli-client.jar   0 19
jboss-eap-7.1.0.zip: jansi-1.16.0.redhat-4.jar: jansi.dll   0 2
jboss-eap-7.1.0.zip: jansi-1.16.0.redhat-4.jar: jansi.dll   0 2
plf-enterprise-jbosseap-package-5.2.x-SNAPSHOT.zip: exo-push-notifications.war org.exoplatform.addons.push-notifications:exo-push-notifications-webapp:1.1.x-SNAPSHOT   0 23
jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/com.fasterxml.jackson.dataformat/jackson-dataformat-yaml/pom.xml cpe:/a:fasterxml:jackson:2.4.2 com.fasterxml.jackson.dataformat:jackson-dataformat-yaml:2.4.2   0 Low 16
jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/org.yaml/snakeyaml/pom.xml org.yaml:snakeyaml:1.12   0 11
jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling/pom.xml org.jboss.marshalling:jboss-marshalling:2.0.0.Beta3   0 13
jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-river/pom.xml org.jboss.marshalling:jboss-marshalling-river:2.0.0.Beta3   0 13
jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-serial/pom.xml org.jboss.marshalling:jboss-marshalling-serial:2.0.0.Beta3   0 13
jython-standalone-2.5.4-rc1.jar/META-INF/maven/jline/jline/pom.xml jline:jline:0.9.95-SNAPSHOT   0 11
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.antlr/antlr-runtime/pom.xml org.antlr:antlr-runtime:3.1.3   0 15
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.ext.posix/jnr-posix/pom.xml cpe:/a:jruby:jruby:1.1.4 org.jruby.ext.posix:jnr-posix:1.1.4 High 3 Highest 9
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/constantine/pom.xml cpe:/a:values_project:values:0.7 org.jruby.extras:constantine:0.7   0 Low 11
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jaffl/pom.xml org.jruby.extras:jaffl:0.5.1   0 11
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jffi/pom.xml cpe:/a:jruby:jruby:1.0.1 org.jruby.extras:jffi:1.0.1 High 3 Highest 11
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jnr-netdb/pom.xml org.jruby.extras:jnr-netdb:0.4   0 11
hibernate-validator-4.2.0.Final.jar/META-INF/maven/com.googlecode.jtype/jtype/pom.xml com.googlecode.jtype:jtype:0.1.1   0 12
jansi-1.11.jar/META-INF/maven/org.fusesource.hawtjni/hawtjni-runtime/pom.xml org.fusesource.hawtjni:hawtjni-runtime:1.8   0 13
jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi-native/pom.xml cpe:/a:id:id-software:1.5 org.fusesource.jansi:jansi-native:1.5   0 Low 16
jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi/pom.xml cpe:/a:id:id-software:1.11 org.fusesource.jansi:jansi:1.11   0 Low 13
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/com.beust/jcommander/pom.xml com.beust:jcommander:1.35   0 11
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/jline/jline/pom.xml jline:jline:2.12   0 7
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-api/pom.xml org.eclipse.aether:aether-api:1.1.0   0 13
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-util/pom.xml org.eclipse.aether:aether-util:1.1.0   0 13
exo-es-embedded-war-2.2.x-SNAPSHOT.war: netty-common-4.1.13.Final.jar/META-INF/maven/org.jctools/jctools-core/pom.xml org.jctools:jctools-core:2.0.1   0 11
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/narayana-jts-idlj/pom.xml org.jboss.narayana.jts:narayana-jts-idlj:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana/common/pom.xml org.jboss.narayana:common:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/jbossxts/pom.xml org.jboss.narayana.xts:jbossxts:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/wsas/pom.xml org.jboss.narayana.xts:wsas:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/wscf11/pom.xml org.jboss.narayana.xts:wscf11:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.arjunacore/arjuna/pom.xml org.jboss.narayana.arjunacore:arjuna:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/ws-c11/pom.xml cpe:/a:ws_project:ws:5.5.30 org.jboss.narayana.xts:ws-c11:5.5.30.Final-redhat-1   0 Low 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.arjunacore/txoj/pom.xml org.jboss.narayana.arjunacore:txoj:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/wstx11/pom.xml org.jboss.narayana.xts:wstx11:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/jta/pom.xml org.jboss.narayana.jta:jta:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/recovery/pom.xml org.jboss.narayana.xts:recovery:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/jdbc/pom.xml org.jboss.narayana.jta:jdbc:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/jms/pom.xml org.jboss.narayana.jta:jms:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/service/pom.xml org.jboss.narayana.xts:service:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/bridge/pom.xml org.jboss.narayana.xts:bridge:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/cdi/pom.xml org.jboss.narayana.jta:cdi:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/orbportability/pom.xml org.jboss.narayana.jts:orbportability:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/jts/pom.xml org.jboss.narayana.jts:jts:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/idlj-idl/pom.xml org.jboss.narayana.jts:idlj-idl:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/jtax/pom.xml org.jboss.narayana.jts:jtax:5.5.30.Final-redhat-1   0 13
jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.wildfly.core/wildfly-cli/pom.xml cpe:/a:wildfly:wildfly:3.0.10 org.wildfly.core:wildfly-cli:3.0.10.Final-redhat-1   0 Low 11
jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.fusesource.hawtjni/hawtjni-runtime/pom.xml org.fusesource.hawtjni:hawtjni-runtime:1.15.0.redhat-2   0 13
jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.fusesource.jansi/jansi-native/pom.xml cpe:/a:id:id-software:1.7.0 org.fusesource.jansi:jansi-native:1.7.0.redhat-3   0 Low 16
jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.fusesource.jansi/jansi/pom.xml cpe:/a:id:id-software:1.16.0 org.fusesource.jansi:jansi:1.16.0.redhat-4   0 Low 13
jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.jboss/staxmapper/pom.xml cpe:/a:st_project:st:1.3.0 org.jboss:staxmapper:1.3.0.Final-redhat-1   0 Low 12
jboss-eap-7.1.0.zip: jboss-client.jar/META-INF/maven/org.jboss.eap/wildfly-client-all/pom.xml cpe:/a:wildfly:wildfly:7.1.0 org.jboss.eap:wildfly-client-all:7.1.0.GA-redhat-11   0 Low 13
jboss-eap-7.1.0.zip: jboss-client.jar/META-INF/maven/org.wildfly.wildfly-http-client/wildfly-http-client-common/pom.xml cpe:/a:wildfly:wildfly:1.0.8 org.wildfly.wildfly-http-client:wildfly-http-client-common:1.0.8.Final-redhat-1   0 Low 11
jboss-eap-7.1.0.zip: jboss-client.jar/META-INF/maven/org.apache.activemq/artemis-hqclient-protocol/pom.xml org.apache.activemq:artemis-hqclient-protocol:1.5.5.008-redhat-1   0 11
jboss-eap-7.1.0.zip: jboss-client.jar/META-INF/maven/org.slf4j/slf4j-api/pom.xml cpe:/a:slf4j:slf4j:1.7.22 org.slf4j:slf4j-api:1.7.22.redhat-1   0 Low 15

Dependencies

calendar-webapp-5.2.x-SNAPSHOT.war

Description: eXo Calendar Application

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-webapp/5.2.x-SNAPSHOT/calendar-webapp-5.2.x-SNAPSHOT.war
MD5: 4bd87b853c54b62d4309ff4e0e825fef
SHA1: 65c819a0de43d5a2fa29696dea4c2fa9a2397b0e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-webapp:5.2.x-SNAPSHOT   Confidence:High

commons-lang-2.6.jar

Description:  Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-lang/commons-lang/2.6/commons-lang-2.6.jar
MD5: 4d5c1693079575b362edf41500630bbd
SHA1: 0ce1edb914c94ebc388f086c6827e8bdeec71ac2
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jcr-1.0.1.jar

Description: Content Repository for Java technology API. Specifies a standard API to access content repositories in JavaTM 2 independently of implementation.

License:

Day License: http://www.day.com/maven/jsr170/licenses/day-spec-license.htm
File Path: /home/ciagent/.m2/repository/javax/jcr/jcr/1.0.1/jcr-1.0.1.jar
MD5: 4639c7b994528948dab1a4feb1f68d6f
SHA1: 567ee103cf7592e3cf036e1bf4e2e06b9f08e1a1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:content_project:content:1.0.1   Confidence:Low   
  • maven: javax.jcr:jcr:1.0.1   Confidence:High

CVE-2017-16111  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

The content module is a module to parse HTTP Content-* headers. It is used by the hapijs framework to provide this functionality. The module is vulnerable to regular expression denial of service when passed a specifically crafted Content-Type or Content-Disposition header.

Vulnerable Software & Versions:

mail-1.4.7.jar

Description: JavaMail API (compat)

License:

http://www.sun.com/cddl, https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/javax/mail/mail/1.4.7/mail-1.4.7.jar
MD5: 77f53ff0c78ba43c4812ecc9f53e20f8
SHA1: 9add058589d5d85adeb625859bf2c5eeaaedf12d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

portlet-api-2.0.jar

Description: The Java Portlet API version 2.0 developed by the Java Community Process JSR-286 Expert Group.

File Path: /home/ciagent/.m2/repository/javax/portlet/portlet-api/2.0/portlet-api-2.0.jar
MD5: 0ec08593cda1df33985391919996c740
SHA1: 1cd72f2a37fcf8ab9893a9468d7ba71c85fe2653
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-chain-1.2.jar

Description:  An implementation of the GoF Chain of Responsibility pattern

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-chain/commons-chain/1.2/commons-chain-1.2.jar
MD5: e18e2c87826644e4c8c08635572c154f
SHA1: 744a13e8766e338bd347b6fbc28c6db12979d0c6
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-httpclient-3.1.jar

Description: The HttpClient component supports the client-side of RFC 1945 (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework by which new request types (methods) or HTTP extensions can be created easily.

License:

Apache License: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar
MD5: 8ad8c9229ef2d59ab9f59f7050e846a5
SHA1: 964cd74171f427720480efdec40a7c7f6e58426a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:apache:httpclient:3.1   Confidence:Low   
  • cpe: cpe:/a:apache:commons-httpclient:3.1   Confidence:Low   
  • maven: commons-httpclient:commons-httpclient:3.1    Confidence:Highest

ical4j-1.0-beta5.jar

Description:  A Java library for reading and writing iCalendar (*.ics) files

License:

iCal4j - License: LICENSE
File Path: /home/ciagent/.m2/repository/ical4j/ical4j/1.0-beta5/ical4j-1.0-beta5.jar
MD5: 6da73e184e456aebd7bd81923c8cccce
SHA1: 6c19c4eec102ae28871c8765fc8d60dc60df93ec
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: ical4j:ical4j:1.0-beta5   Confidence:High

jackrabbit-webdav-1.6.5.jar

Description: WebDAV library used by the Jackrabbit WebDAV support

File Path: /home/ciagent/.m2/repository/org/apache/jackrabbit/jackrabbit-webdav/1.6.5/jackrabbit-webdav-1.6.5.jar
MD5: 1d573cf67bcff173d91dd1d194334b66
SHA1: 5afbee7ce7bcf1c47d7e54e24afcd533cb6776ae
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2015-1833  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary files and send requests to intranet servers via a crafted WebDAV request.

Vulnerable Software & Versions: (show all)

commons-digester-2.1.jar

Description:  The Digester package lets you configure an XML to Java object mapping module which triggers certain actions called rules whenever a particular pattern of nested XML elements is recognized.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-digester/commons-digester/2.1/commons-digester-2.1.jar
MD5: 528445033f22da28f5047b6abcd1c7c9
SHA1: 73a8001e7a54a255eef0f03521ec1805dc738ca0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo.kernel.component.command-5.2.x-SNAPSHOT.jar

Description: Implementation of Command Service of Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.component.command/5.2.x-SNAPSHOT/exo.kernel.component.command-5.2.x-SNAPSHOT.jar
MD5: a50dc0a0e9d4bf1772adc1e78e6d2815
SHA1: c49b75c13c487a8a127d02bcc27e618d608a9394
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.component.command:5.2.x-SNAPSHOT   Confidence:High

c3p0-0.9.1.1.jar

Description:  c3p0 is an easy-to-use library for augmenting traditional (DriverManager-based) JDBC drivers with JNDI-bindable DataSources, including DataSources that implement Connection and Statement Pooling, as described by the jdbc3 spec and jdbc2 std extension.

License:

GNU LESSER GENERAL PUBLIC LICENSE: http://www.gnu.org/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/c3p0/c3p0/0.9.1.1/c3p0-0.9.1.1.jar
MD5: 640c58226e7bb6beacc8ac3f6bb533d1
SHA1: 302704f30c6e7abb7a0457f7771739e03c973e80
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

quartz-2.2.2.jar

Description: Enterprise Job Scheduler

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
Apache Software License, Version 2.0
File Path: /home/ciagent/.m2/repository/org/quartz-scheduler/quartz/2.2.2/quartz-2.2.2.jar
MD5: 6acfd6ada2f4ad0abf4de916654dcaea
SHA1: 6fd24da6803ab7c3a08bc519a62219a9bebeb0df
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

calendar-service-5.2.x-SNAPSHOT.jar

Description: eXo Calendar Service

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-service/5.2.x-SNAPSHOT/calendar-service-5.2.x-SNAPSHOT.jar
MD5: 7a324a26e8b5d17917053c8e1ab603fa
SHA1: 5f3e11a029bca8d1ac25ae2e4db9395323a05e28
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-service:5.2.x-SNAPSHOT   Confidence:High

jsr250-api-1.0.jar

Description: JSR-250 Reference Implementation by Glassfish

License:

COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.0: https://glassfish.dev.java.net/public/CDDLv1.0.html
File Path: /home/ciagent/.m2/repository/javax/annotation/jsr250-api/1.0/jsr250-api-1.0.jar
MD5: 4cd56b2e4977e541186de69f5126b4a6
SHA1: 5025422767732a1ab45d93abfea846513d742dcf
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jackson-core-2.4.2.jar

Description: Core Jackson abstractions, basic JSON streaming API implementation

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.4.2/jackson-core-2.4.2.jar
MD5: 1800d8b5c3324eaa7cff549bad28a98b
SHA1: ceb72830d95c512b4b300a38f29febc85bdf6e4b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jackson-annotations-2.4.0.jar

Description: Core annotations used for value types, used by Jackson data binding package.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/core/jackson-annotations/2.4.0/jackson-annotations-2.4.0.jar
MD5: 6df1b79ec2e57d62106eb47129e4f7a3
SHA1: d6a66c7a5f01cf500377bd669507a08cfeba882a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

stax2-api-3.1.4.jar

Description: tax2 API is an extension to basic Stax 1.0 API that adds significant new functionality, such as full-featured bi-direction validation interface and high-performance Typed Access API.

License:

The BSD License: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar
MD5: c08e89de601b0a78f941b2c29db565c3
SHA1: ac19014b1e6a7c08aad07fe114af792676b685b7
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jackson-dataformat-xml-2.4.2.jar

Description: Data format extension for Jackson (http://jackson.codehaus.org) to offer alternative support for serializing POJOs as XML and deserializing XML as pojos. Support implemented on top of Stax API (javax.xml.stream), by implementing core Jackson Streaming API types like JsonGenerator, JsonParser and JsonFactory. Some data-binding types overridden as well (ObjectMapper sub-classed as XmlMapper).

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/dataformat/jackson-dataformat-xml/2.4.2/jackson-dataformat-xml-2.4.2.jar
MD5: 1fa55358af6a1364e72e24d9ca4d58e7
SHA1: 02f2d96f68b2d3475452d95dde7a3fbee225f6ae
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-3720  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

XML external entity (XXE) vulnerability in XmlMapper in the Data format extension for Jackson (aka jackson-dataformat-xml) allows attackers to have unspecified impact via unknown vectors.

Vulnerable Software & Versions:

CVE-2016-7051  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-918 Server-Side Request Forgery (SSRF)

XmlMapper in the Jackson XML dataformat component (aka jackson-dataformat-xml) before 2.7.8 and 2.8.x before 2.8.4 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD.

Vulnerable Software & Versions: (show all)

CVE-2017-15095  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.

Vulnerable Software & Versions: (show all)

CVE-2017-17485  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

Vulnerable Software & Versions: (show all)

CVE-2017-7525  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.

Vulnerable Software & Versions: (show all)

swagger-annotations-1.5.0.jar

Description: Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/

License:

http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/io/swagger/swagger-annotations/1.5.0/swagger-annotations-1.5.0.jar
MD5: c16eb2bdd9f90e97849950178c4c543d
SHA1: f7497f7887e65277c0dab1da1148cf211083f3d4
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

swagger-models-1.5.0.jar

Description: Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/

License:

http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/io/swagger/swagger-models/1.5.0/swagger-models-1.5.0.jar
MD5: 5c3d553535fddea14a4e7e87c5fc59fa
SHA1: d2566bfc270073a559b342089f54086ee64ca5b1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

swagger-core-1.5.0.jar

File Path: /home/ciagent/.m2/repository/io/swagger/swagger-core/1.5.0/swagger-core-1.5.0.jar
MD5: abc2015d9e823cb96abfa7e2937b43fb
SHA1: 09d5cfb8188ac316bad3a7b38c46bac0568c60e4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

annotations-2.0.1.jar

Description: Annotation supports the FindBugs tool

License:

GNU Lesser Public License: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/com/google/code/findbugs/annotations/2.0.1/annotations-2.0.1.jar
MD5: 35ef911c85603829ded63f211feb2d68
SHA1: 9ef6656259841cebfb9fb0697bb122ada4485498
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

reflections-0.9.9.jar

Description: Reflections - a Java runtime metadata analysis

License:

WTFPL: http://www.wtfpl.net/
The New BSD License: http://www.opensource.org/licenses/bsd-license.html
File Path: /home/ciagent/.m2/repository/org/reflections/reflections/0.9.9/reflections-0.9.9.jar
MD5: 5f13944b355f927f956b6298136ad959
SHA1: 0296d8adb2f22a38025f44b45cac89835ff0bbaf
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

swagger-jaxrs-1.5.0.jar

File Path: /home/ciagent/.m2/repository/io/swagger/swagger-jaxrs/1.5.0/swagger-jaxrs-1.5.0.jar
MD5: a09d96c899411ac57a479c6635829600
SHA1: 04a77f3f95bfec3073d9d20660c16f54886dfc9f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

calendar-webservice-5.2.x-SNAPSHOT.jar

Description: eXo Calendar Webservice

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-webservice/5.2.x-SNAPSHOT/calendar-webservice-5.2.x-SNAPSHOT.jar
MD5: c62a9d2e5ed5ce72c322a230c5564c9e
SHA1: 4296f33f354d03f4c3bf38424d9cae36e2d53420
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-webservice:5.2.x-SNAPSHOT   Confidence:High

exo.ws.commons-5.2.x-SNAPSHOT.jar

Description: Implementation of Commons Utils for Exoplatform SAS 'Web Services' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/ws/exo.ws.commons/5.2.x-SNAPSHOT/exo.ws.commons-5.2.x-SNAPSHOT.jar
MD5: c63281aadf272c92ac075fcbef10b333
SHA1: e92edc158cad46eeea461d1db1bc0e6e1dc53c51
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ws:exo.ws.commons:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:ws_project:ws:5.2.20181202   Confidence:Low   

bayeux-api-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/bayeux-api/3.0.8/bayeux-api-3.0.8.jar
MD5: a09842b7f274cefffa408299b5fc8dd0
SHA1: d5aceb0e7fef4a140f7e95be48338b97723d3163
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cometd-java-common-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-common/3.0.8/cometd-java-common-3.0.8.jar
MD5: 70c7cc13ecc20634a6b357e33134d551
SHA1: 5e2134a1b3bc6e03b7e1666a74e9993d0bb52a7d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cometd-java-websocket-javax-server-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-websocket-javax-server/3.0.8/cometd-java-websocket-javax-server-3.0.8.jar
MD5: afa5e80138d48292a6f93b708257d2fc
SHA1: 353860f809886a58c181dd9e273ee7b79e133277
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cometd-java-websocket-common-server-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-websocket-common-server/3.0.8/cometd-java-websocket-common-server-3.0.8.jar
MD5: 5772b2360cec4ff610e62151fb4deb62
SHA1: 61538a1231b700bf045fa197514f63509960985e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cometd-java-annotations-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-annotations/3.0.8/cometd-java-annotations-3.0.8.jar
MD5: 98b60697675562cf957655c3239a1ad3
SHA1: 5b56875b2ac024b5666633596abb90702ec35e81
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jetty-io-9.2.14.v20151106.jar

Description: Administrative parent pom for Jetty modules

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.php
File Path: /home/ciagent/.m2/repository/org/eclipse/jetty/jetty-io/9.2.14.v20151106/jetty-io-9.2.14.v20151106.jar
MD5: 94d0e857144c7615b6fd65019cd32b59
SHA1: dfa4137371a3f08769820138ca1a2184dacda267
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cometd-java-client-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-client/3.0.8/cometd-java-client-3.0.8.jar
MD5: 24f1367fb4d96fe70a3f07a1f48e447e
SHA1: 826d4ae9402e7c48cc98fe287389788134e4986f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cometd-java-websocket-common-client-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-websocket-common-client/3.0.8/cometd-java-websocket-common-client-3.0.8.jar
MD5: c17616c290c54ffc4a70dda2b901919a
SHA1: 8b75f11de5bba306d0bcb20a6c1bed89675579cd
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cometd-java-websocket-javax-client-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-websocket-javax-client/3.0.8/cometd-java-websocket-javax-client-3.0.8.jar
MD5: 433dd449f689697bbe1a75b0ed2788f8
SHA1: b44bcf098667f0112301d75f73adb5ba3295699d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cometd-java-oort-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-oort/3.0.8/cometd-java-oort-3.0.8.jar
MD5: 62dbbecedab27927495fc9c9e0b70505
SHA1: a72695546e010c250ba65519fc91867b208fc8f9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jetty-jmx-9.2.14.v20151106.jar

Description: JMX management artifact for jetty.

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.php
File Path: /home/ciagent/.m2/repository/org/eclipse/jetty/jetty-jmx/9.2.14.v20151106/jetty-jmx-9.2.14.v20151106.jar
MD5: 5eccc25d22921cb4787812d0687a2978
SHA1: 617edc5e966b4149737811ef8b289cd94b831bab
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:jetty:jetty:9.2.14.v20151106   Confidence:Low   
  • maven: org.eclipse.jetty:jetty-jmx:9.2.14.v20151106    Confidence:Highest
  • cpe: cpe:/a:eclipse:jetty:9.2.14.v20151106   Confidence:Low   

CVE-2017-7656  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-284 Improper Access Control

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.

Vulnerable Software & Versions: (show all)

CVE-2017-7657  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.

Vulnerable Software & Versions: (show all)

CVE-2017-7658  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-19 Data Handling

In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.

Vulnerable Software & Versions: (show all)

CVE-2017-9735  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

Vulnerable Software & Versions:

cometd-java-server-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-server/3.0.8/cometd-java-server-3.0.8.jar
MD5: c55eb617762fad72683da9de856e008c
SHA1: 11d535c657bdb491abc2ccd820118f9d6a8f44e0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-comet-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-comet-service/5.2.x-SNAPSHOT/commons-comet-service-5.2.x-SNAPSHOT.jar
MD5: 9d5ff65ae05bc0ed86f8a62d757e5ac3
SHA1: 10e03b7669b9edc05ca270e24accab990a460311
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-comet-service:5.2.x-SNAPSHOT   Confidence:High

commons-webui-ext-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-webui-ext/5.2.x-SNAPSHOT/commons-webui-ext-5.2.x-SNAPSHOT.jar
MD5: bdda496675ba016ed855107d58fc4ecf
SHA1: 7e15f4840d6e2604cdc31d6be057b6680ba2b32e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-webui-ext:5.2.x-SNAPSHOT   Confidence:High

chromattic.core-1.3.0.jar

Description: Chromattic Framework Core

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.core/1.3.0/chromattic.core-1.3.0.jar
MD5: 9ece56be0e1e1b3289bbe177e8e1b4ab
SHA1: 1bc4ebc89d7b47af394b920f44a0b51409343034
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

aspectjrt-1.8.8.jar

Description: The runtime needed to execute a program using AspectJ

License:

Eclipse Public License - v 1.0: http://www.eclipse.org/legal/epl-v10.html
File Path: /home/ciagent/.m2/repository/org/aspectj/aspectjrt/1.8.8/aspectjrt-1.8.8.jar
MD5: 2e448cd7ae0bdc357cb2b6e892ba9c9d
SHA1: 7c5b26f24375685e34a50c2d765ebc40a96a5280
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

owasp-java-html-sanitizer-20160413.1.jar

File Path: /home/ciagent/.m2/repository/com/googlecode/owasp-java-html-sanitizer/owasp-java-html-sanitizer/20160413.1/owasp-java-html-sanitizer-20160413.1.jar
MD5: f2dbfedbd7bea844cedc1fc1e95fca80
SHA1: 61780b5d65c39013d733b70b2d2968f72f83aa0a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jrcs.diff-0.4.2.jar

File Path: /home/ciagent/.m2/repository/org/suigeneris/jrcs.diff/0.4.2/jrcs.diff-0.4.2.jar
MD5: a05e71b59b7099da7844fd3b5f38e299
SHA1: 6e8eea2281426cd791a64b348c0932c88b966f39
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

ecs-1.4.2.jar

File Path: /home/ciagent/.m2/repository/ecs/ecs/1.4.2/ecs-1.4.2.jar
MD5: 62d53be190ca9cbfe01bec9fc3396934
SHA1: f9bc5fdde56d60876c1785087ce2a301b4e4a676
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

liquibase-core-3.4.2.jar

File Path: /home/ciagent/.m2/repository/org/liquibase/liquibase-core/3.4.2/liquibase-core-3.4.2.jar
MD5: d4ad6d5f7958b69b8fbd01a5564ae45b
SHA1: c91ccf342466857251cf6795b0cecc42509206f2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

dom4j-1.6.1.jar

Description: dom4j: the flexible XML framework for Java

File Path: /home/ciagent/.m2/repository/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar
MD5: 4d8f51d3fe3900efc6e395be48030d6d
SHA1: 5d3ccc056b6f056dbf0dddfdf43894b9065a8f94
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2018-1000632  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CWE: CWE-91 XML Injection (aka Blind XPath Injection)

dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.

Vulnerable Software & Versions: (show all)

javassist-3.20.0-GA.jar

Description:  Javassist (JAVA programming ASSISTant) makes Java bytecode manipulation simple. It is a class library for editing bytecodes in Java.

License:

MPL 1.1: http://www.mozilla.org/MPL/MPL-1.1.html
LGPL 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
Apache License 2.0: http://www.apache.org/licenses/
File Path: /home/ciagent/.m2/repository/org/javassist/javassist/3.20.0-GA/javassist-3.20.0-GA.jar
MD5: a89dd7907d76e061ec2c07e762a74256
SHA1: a9cbcdfb7e9f86fbc74d3afae65f2248bfbf82a0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

hibernate-jpa-2.0-api-1.0.1.Final.jar

Description:  Hibernate definition of the Java Persistence 2.0 (JSR 317) API.

License:

license.txt
File Path: /home/ciagent/.m2/repository/org/hibernate/javax/persistence/hibernate-jpa-2.0-api/1.0.1.Final/hibernate-jpa-2.0-api-1.0.1.Final.jar
MD5: d7e7d8f60fc44a127ba702d43e71abec
SHA1: 3306a165afa81938fc3d8a0948e891de9f6b192b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

hibernate-entitymanager-4.2.21.Final.jar

Description: A module of the Hibernate O/RM project

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-entitymanager/4.2.21.Final/hibernate-entitymanager-4.2.21.Final.jar
MD5: 2c1a3f1c7bb83b730ab3db1fe588904e
SHA1: a6675070b4c7bb843d74d6ab3bc9440fd315dbb3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-component-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-component-common/5.2.x-SNAPSHOT/commons-component-common-5.2.x-SNAPSHOT.jar
MD5: f756a0fd49e90c23a1143866df7cb26b
SHA1: 0eca4101faa065015b6b0e4144d55720d45963e7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-component-common:5.2.x-SNAPSHOT   Confidence:High

antlr-2.7.7.jar

Description:  A framework for constructing recognizers, compilers, and translators from grammatical descriptions containing Java, C#, C++, or Python actions.

License:

BSD License: http://www.antlr.org/license.html
File Path: /home/ciagent/.m2/repository/antlr/antlr/2.7.7/antlr-2.7.7.jar
MD5: f8f1352c52a4c6a500b597596501fc64
SHA1: 83cd2cd674a217ade95a4bb83a8a14f351f48bd0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

hibernate-core-4.2.21.Final.jar

Description: A module of the Hibernate O/RM project

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-core/4.2.21.Final/hibernate-core-4.2.21.Final.jar
MD5: 492567c1f36fb3a5968ca2d3c452edaf
SHA1: bb587d00287c13d9e4324bc76c13abbd493efa81
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jakarta-regexp-1.4.jar

File Path: /home/ciagent/.m2/repository/jakarta-regexp/jakarta-regexp/1.4/jakarta-regexp-1.4.jar
MD5: 5d8b8c601c21b37aa6142d38f45c0297
SHA1: 0ea514a179ac1dd7e81c7e6594468b9b9910d298
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

xpp3-1.1.6.jar

Description: XML Pull parser library developed by Extreme Computing Lab, Indiana University

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/ogce/xpp3/1.1.6/xpp3-1.1.6.jar
MD5: 626a429318310e92e3466151e050bdc5
SHA1: dc87e00ddb69341b46a3eb1c331c6fcebf6c8546
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo.core.component.organization.api-5.2.x-SNAPSHOT.jar

Description: API of Organization Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.organization.api/5.2.x-SNAPSHOT/exo.core.component.organization.api-5.2.x-SNAPSHOT.jar
MD5: d174db562a04290e98b498b15f5a7662
SHA1: f324bbd15946adc41b0d4b42b7d7f7cdff42eb6c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.organization.api:5.2.x-SNAPSHOT   Confidence:High

exo.core.component.security.core-5.2.x-SNAPSHOT.jar

Description: Implementation of 'eXo Security' component of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.security.core/5.2.x-SNAPSHOT/exo.core.component.security.core-5.2.x-SNAPSHOT.jar
MD5: 63a81b349f58a996a0de27807d60c515
SHA1: 5e00af26588ce138dd51717ced1ad89f597242fb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.security.core:5.2.x-SNAPSHOT   Confidence:High

lucene-core-3.6.2.jar

Description: Apache Lucene Java Core

File Path: /home/ciagent/.m2/repository/org/apache/lucene/lucene-core/3.6.2/lucene-core-3.6.2.jar
MD5: ee396d04f5a35557b424025f5382c815
SHA1: 9ec77e2507f9cc01756964c71d91efd8154a8c47
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

lucene-analyzers-3.6.2.jar

Description: Additional Analyzers

File Path: /home/ciagent/.m2/repository/org/apache/lucene/lucene-analyzers/3.6.2/lucene-analyzers-3.6.2.jar
MD5: 13f8241b6991bd1349c05369a7c0f002
SHA1: 3a083510dcb0d0fc67f8456cdac6f48aa0da2993
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

lucene-spellchecker-3.6.2.jar

Description: Spell Checker

File Path: /home/ciagent/.m2/repository/org/apache/lucene/lucene-spellchecker/3.6.2/lucene-spellchecker-3.6.2.jar
MD5: a4b684913f93aea76f5dbd7e479f19c5
SHA1: 15db0c0cfee44e275f15ad046e46b9a05910ad24
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jta-1.1.jar

Description:  The javax.transaction package. It is appropriate for inclusion in a classpath, and may be added to a Java 2 installation.

File Path: /home/ciagent/.m2/repository/javax/transaction/jta/1.1/jta-1.1.jar
MD5: 82a10ce714f411b28f13850059de09ee
SHA1: 2ca09f0b36ca7d71b762e14ea2ff09d5eac57558
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

concurrent-1.3.4.jar

License:

Public domain, Sun Microsoystems: >http://gee.cs.oswego.edu/dl/classes/EDU/oswego/cs/dl/util/concurrent/intro.html
File Path: /home/ciagent/.m2/repository/concurrent/concurrent/1.3.4/concurrent-1.3.4.jar
MD5: f29b9d930d3426ebc56919eba10fbd4d
SHA1: 1cf394c2a388199db550cda311174a4c6a7d117c
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-collections-3.2.2.jar

Description: Types that extend and augment the Java Collections Framework.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-collections/commons-collections/3.2.2/commons-collections-3.2.2.jar
MD5: f54a8510f834a1a57166970bfc982e94
SHA1: 8ad72fe39fa8c91eaaf12aadb21e0c3661fe26d5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jgroups-3.6.13.Final.jar

Description:  Reliable cluster communication toolkit

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jgroups/jgroups/3.6.13.Final/jgroups-3.6.13.Final.jar
MD5: d7a4d1065e9b09e3f48bfa88ab368a0c
SHA1: 1315a8a1aed98dcafc11a850957ced42dc26bf18
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jbossjta-4.16.6.Final.jar

Description: JBossTS - JBoss Transaction Service. JTA, JTS and XTS (WS-AT, WS-BA)

License:

LGPL 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/jboss/jbossts/jbossjta/4.16.6.Final/jbossjta-4.16.6.Final.jar
MD5: 9e3c8d7d93b92ab97489aeb5816370c8
SHA1: 99e79e03ced180bea4e3307511d350eb2b88c91c
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

ws-commons-util-1.0.1.jar

Description: This is a small collection of utility classes, that allow high performance XML processing based on SAX. Basically, it is assumed, that you are using an JAXP 1.1 compliant XML parser and nothing else. In particular, no dependency on the javax.xml.transform package is introduced.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/ws/commons/ws-commons-util/1.0.1/ws-commons-util-1.0.1.jar
MD5: 66919d22287ddab742a135da764c2cd6
SHA1: 126e80ff798fece634bc94e61f8be8a8da00be60
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-10542  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.

Vulnerable Software & Versions:

jboss-common-core-2.2.22.GA.jar

Description: JBoss Common Core Utility classes

File Path: /home/ciagent/.m2/repository/org/jboss/jboss-common-core/2.2.22.GA/jboss-common-core-2.2.22.GA.jar
MD5: 8c415e1467075a90045a7b0fd19886a3
SHA1: ae1a22412d879c4ac48e35cf00f438bb263d41c3
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

stringtemplate-3.2.1.jar

Description: StringTemplate is a java template engine for generating source code, web pages, emails, or any other formatted text output. StringTemplate is particularly good at multi-targeted code generators, multiple site skins, and internationalization/localization. It evolved over years of effort developing jGuru.com. StringTemplate also generates the stringtemplate website: http://www.stringtemplate.org and powers the ANTLR v3 code generator. Its distinguishing characteristic is that unlike other engines, it strictly enforces model-view separation. Strict separation makes websites and code generators more flexible and maintainable; it also provides an excellent defense against malicious template authors. There are currently about 600 StringTemplate source downloads a month.

License:

BSD licence: http://antlr.org/license.html
File Path: /home/ciagent/.m2/repository/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar
MD5: b58ca53e518a92a1991eb63b61917582
SHA1: 59ec8083721eae215c6f3caee944c410d2be34de
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

antlr-runtime-3.5.jar

Description: A framework for constructing recognizers, compilers, and translators from grammatical descriptions containing Java, C#, C++, or Python actions.

File Path: /home/ciagent/.m2/repository/org/antlr/antlr-runtime/3.5/antlr-runtime-3.5.jar
MD5: aa6d7c8b425df59f5f5bc98c58cfd9fc
SHA1: 0baa82bff19059401e90e1b90020beb9c96305d7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo.kernel.component.ext.cache.impl.infinispan.v8-5.2.x-SNAPSHOT.jar

Description: Infinispan Implementation of Cache Service for Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.component.ext.cache.impl.infinispan.v8/5.2.x-SNAPSHOT/exo.kernel.component.ext.cache.impl.infinispan.v8-5.2.x-SNAPSHOT.jar
MD5: b3b2c9a0c18ff3b65cde0d7428693ec7
SHA1: 8c9e47fbdd1c32658dc6fb8e2dd9644755c14920
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.component.ext.cache.impl.infinispan.v8:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:infinispan:infinispan:5.2.0   Confidence:Highest   

CVE-2016-0750  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-15089  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-2638  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CWE: CWE-287 Improper Authentication

It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.

Vulnerable Software & Versions: (show all)

jboss-marshalling-osgi-2.0.0.Beta3.jar

Description: JBoss Marshalling OSGi Bundle with API and implementations

License:

http://repository.jboss.org/licenses/cc0-1.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/marshalling/jboss-marshalling-osgi/2.0.0.Beta3/jboss-marshalling-osgi-2.0.0.Beta3.jar
MD5: 7652392087f6e70312cf0309ab563a4f
SHA1: a55fe6527a2d50dc48ad3f8b9093bd0cb01302b0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

infinispan-core-8.2.6.Final.jar

Description: Infinispan core module

License:

http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/infinispan/infinispan-core/8.2.6.Final/infinispan-core-8.2.6.Final.jar
MD5: 06371c22b39aef4faf1da8d21b2102cb
SHA1: 84937a866a56760b9c50bfbca10442fa14be6375
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-0750  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-15089  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-2638  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CWE: CWE-287 Improper Authentication

It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.

Vulnerable Software & Versions: (show all)

exo.jcr.component.core-5.2.x-SNAPSHOT.jar

Description: Implementation of Core Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.component.core/5.2.x-SNAPSHOT/exo.jcr.component.core-5.2.x-SNAPSHOT.jar
MD5: fb1f3b33ea1d080d79d4d99368c72c71
SHA1: beaff87280de81542a5c014aad497d94b928c8a6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.component.core:5.2.x-SNAPSHOT   Confidence:High

mime-util-2.1.3.jar

Description: mime-util is a simple to use, small, light weight and fast open source java utility library that can detect MIME types from files, input streams, URL's and byte arrays. Due to the use of regular expressions and the java.nio packages it requires at least Java 1.4.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/eu/medsea/mimeutil/mime-util/2.1.3/mime-util-2.1.3.jar
MD5: 3d4f3e1a96eb79683197f1c8b182f4a6
SHA1: 0c9cfae15c74f62491d4f28def0dff1dabe52a47
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

slf4j-api-1.7.7.jar

Description: The slf4j API

File Path: /home/ciagent/.m2/repository/org/slf4j/slf4j-api/1.7.7/slf4j-api-1.7.7.jar
MD5: ca4280bf93d64367723ae5c8d42dd0b9
SHA1: 2b8019b6249bb05d81d3a3094e468753e2b21311
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:slf4j:slf4j:1.7.7   Confidence:Low   
  • maven: org.slf4j:slf4j-api:1.7.7    Confidence:Highest

exo.kernel.commons-5.2.x-SNAPSHOT.jar

Description: Implementation of Commons Utils of Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.commons/5.2.x-SNAPSHOT/exo.kernel.commons-5.2.x-SNAPSHOT.jar
MD5: 4100a23c5e005c4df04f7c1426517fe0
SHA1: 0b9bb334bea12283faddd923ab048b2c4b714aa7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.commons:5.2.x-SNAPSHOT   Confidence:High

commons-dbcp-1.4.jar

Description: Commons Database Connection Pooling

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-dbcp/commons-dbcp/1.4/commons-dbcp-1.4.jar
MD5: b004158fab904f37f5831860898b3cd9
SHA1: 30be73c965cc990b153a100aaaaafcf239f82d39
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-pool-1.6.jar

Description: Commons Object Pooling Library

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-pool/commons-pool/1.6/commons-pool-1.6.jar
MD5: 5ca02245c829422176d23fa530e919cc
SHA1: 4572d589699f09d866a226a14b7f4323c6d8f040
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo.kernel.component.common-5.2.x-SNAPSHOT.jar

Description: Implementation of Common Service of Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.component.common/5.2.x-SNAPSHOT/exo.kernel.component.common-5.2.x-SNAPSHOT.jar
MD5: 85de0b715781922950174eed0475a5a7
SHA1: 945e79cde4c7bb083c0b12739a5e29347ba04f10
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.component.common:5.2.x-SNAPSHOT   Confidence:High

commons-beanutils-1.8.3.jar

Description: BeanUtils provides an easy-to-use but flexible wrapper around reflection and introspection.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-beanutils/commons-beanutils/1.8.3/commons-beanutils-1.8.3.jar
MD5: b45be74134796c89db7126083129532f
SHA1: 686ef3410bcf4ab8ce7fd0b899e832aaba5facf7
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2014-0114  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Vulnerable Software & Versions: (show all)

jibx-run-1.2.6.jar

Description: JiBX runtime code

License:

http://jibx.sourceforge.net/jibx-license.html
File Path: /home/ciagent/.m2/repository/org/jibx/jibx-run/1.2.6/jibx-run-1.2.6.jar
MD5: 4ef53e4279c8440aff2d16c0af024231
SHA1: 544f3ac7887d7eed20ca0420ee1963df6c7ecebb
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cdi-api-1.0-SP4.jar

Description: APIs for JSR-299: Contexts and Dependency Injection for Java EE

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/javax/enterprise/cdi-api/1.0-SP4/cdi-api-1.0-SP4.jar
MD5: 6c1e2b4036d64b6ba1a1136a00c7cdaa
SHA1: 6e38490033eb8b36c4cf1f7605163424a574dcf0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo.kernel.container-5.2.x-SNAPSHOT.jar

Description: Implementation of Container for Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.container/5.2.x-SNAPSHOT/exo.kernel.container-5.2.x-SNAPSHOT.jar
MD5: 2d3b1d1169357cc3cbbdd114632655db
SHA1: 9e3592ba2c41ab665fae259e28cdb5e8aca4209c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.container:5.2.x-SNAPSHOT   Confidence:High

exo.portal.webui.core-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/portal/exo.portal.webui.core/5.2.x-SNAPSHOT/exo.portal.webui.core-5.2.x-SNAPSHOT.jar
MD5: bf01f8452d7ef051729bf38bbfa38332
SHA1: 9507c37b43c80636a4eef52c78a4323cb19b6c45
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.portal:exo.portal.webui.core:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:in-portal:in-portal:5.2.0   Confidence:Highest   

CVE-2014-8304  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in In-Portal CMS 5.2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the next_template parameter to admin/index.php.

Vulnerable Software & Versions:

icu4j-56.1.jar

Description:  International Component for Unicode for Java (ICU4J) is a mature, widely used Java library providing Unicode and Globalization support

License:

ICU License: http://source.icu-project.org/repos/icu/icu/trunk/license.html
File Path: /home/ciagent/.m2/repository/com/ibm/icu/icu4j/56.1/icu4j-56.1.jar
MD5: 7bd1a7a1295868726f991c7593dce442
SHA1: 8dd6671f52165a0419e6de5e1016400875a90fa9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-6293  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument.

Vulnerable Software & Versions:

CVE-2016-7415  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in the Locale class in common/locid.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long locale string.

Vulnerable Software & Versions:

CVE-2017-14952  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-415 Double Free

Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a "redundant UVector entry clean up function call" issue.

Vulnerable Software & Versions:

CVE-2017-15396  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ before 60.2, as used in V8 in Google Chrome prior to 62.0.3202.75 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Vulnerable Software & Versions: (show all)

CVE-2017-15422  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.

Vulnerable Software & Versions: (show all)

CVE-2017-17484  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC.

Vulnerable Software & Versions:

CVE-2017-7867  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-787 Out-of-bounds Write

International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function.

Vulnerable Software & Versions:

CVE-2017-7868  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-787 Out-of-bounds Write

International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function.

Vulnerable Software & Versions:

common-logging-2.2.2.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/common/common-logging/2.2.2.Final/common-logging-2.2.2.Final.jar
MD5: 28b7108ee63899bca08636d360e7df11
SHA1: aee18008518671fb10982c0fe5f7383e98f71c47
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

social-component-core-5.2.x-SNAPSHOT.jar

Description: eXo Social Core Component: People and Space

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-core/5.2.x-SNAPSHOT/social-component-core-5.2.x-SNAPSHOT.jar
MD5: b27fe5a6d5db5ac124ac83cf7d702800
SHA1: 9e59a36f76c44cba4d352d5b9607152fafe10b64
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-core:5.2.x-SNAPSHOT   Confidence:High

social-component-common-5.2.x-SNAPSHOT.jar

Description: eXo Social Common Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-common/5.2.x-SNAPSHOT/social-component-common-5.2.x-SNAPSHOT.jar
MD5: 94292baac3e1a7e764755a6e052890fc
SHA1: 70d7f5323a5859587a0cde76b3c941011afe5bbd
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-common:5.2.x-SNAPSHOT   Confidence:High

staxnav.core-0.9.8.jar

File Path: /home/ciagent/.m2/repository/org/staxnav/staxnav.core/0.9.8/staxnav.core-0.9.8.jar
MD5: 0f786e5be21df9fbe8753175564564c7
SHA1: 27bd12d4d74b0851e38de79f8299462d93ba3d7f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-lang3-3.3.2.jar

Description:  Apache Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/commons/commons-lang3/3.3.2/commons-lang3-3.3.2.jar
MD5: 3128bf75a2549ebe38663401191bacab
SHA1: 90a3822c38ec8c996e84c16a3477ef632cbc87a3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

pc-federation-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/pc/pc-federation/5.2.x-SNAPSHOT/pc-federation-5.2.x-SNAPSHOT.jar
MD5: a3e5c1d110b5f288ab0ca2054c42b43c
SHA1: 0e80b0331a89f438f5c4f66c1e32020328061778
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.pc:pc-federation:5.2.x-SNAPSHOT   Confidence:High

pc-bridge-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/pc/pc-bridge/5.2.x-SNAPSHOT/pc-bridge-5.2.x-SNAPSHOT.jar
MD5: 155c168a85be390acd313918382b5873
SHA1: ae51de50ffd631496f095ae225d5d8e12eeac859
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.pc:pc-bridge:5.2.x-SNAPSHOT   Confidence:High

picketlink-idm-core-1.4.6.Final.jar

Description: PicketLink IDM IMPL contains the implementation of the API and the Identity Model.

License:

lgpl: http://repository.jboss.com/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/org/picketlink/idm/picketlink-idm-core/1.4.6.Final/picketlink-idm-core-1.4.6.Final.jar
MD5: a5c21c2186c186bc296d9909bcb11616
SHA1: 30d4385012393e4c50a82f8b84153eb6ee301a7d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2015-0277  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.

Vulnerable Software & Versions:

CVE-2015-3158  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The invokeNextValve function in identity/federation/bindings/tomcat/idp/AbstractIDPValve.java in PicketLink before 2.8.0.Beta1 does not properly check role based authorization, which allows remote authenticated users to gain access to restricted application resources via a (1) direct request or (2) request through an SP initiated flow.

Vulnerable Software & Versions:

CVE-2015-6254  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)
CWE: CWE-17 Code

The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.

Vulnerable Software & Versions:

mop-api-1.3.2.Final.jar

Description: API of the Object Model for Portal

File Path: /home/ciagent/.m2/repository/org/gatein/mop/mop-api/1.3.2.Final/mop-api-1.3.2.Final.jar
MD5: 4f2c10678f3c5850bb85c25514469e2e
SHA1: 78f9c03a23ec1c3564e827d3927ce53eca6d919d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.mop:mop-api:1.3.2.Final   Confidence:High

mop-spi-1.3.2.Final.jar

Description: SPI of the Object Model for Portal

File Path: /home/ciagent/.m2/repository/org/gatein/mop/mop-spi/1.3.2.Final/mop-spi-1.3.2.Final.jar
MD5: 6ef18d761e625d923ec01c6e5283026e
SHA1: 4fe3a673d58c85d2f6c9ad4446b90229f46c8987
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.mop:mop-spi:1.3.2.Final   Confidence:High

mop-core-1.3.2.Final.jar

Description: Model Object for Portal Core

File Path: /home/ciagent/.m2/repository/org/gatein/mop/mop-core/1.3.2.Final/mop-core-1.3.2.Final.jar
MD5: 7d5eb7a5c2ed2d88362f9d8a9413a475
SHA1: d27e4c960aefd919f7c25049b72a9bc225cd6548
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.mop:mop-core:1.3.2.Final   Confidence:High

gatein-management-spi-2.1.0.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/management/gatein-management-spi/2.1.0.Final/gatein-management-spi-2.1.0.Final.jar
MD5: 4e10565858662ec9eea75cfbd3544ba1
SHA1: 79670b2dd849b49e145b7122cbff4ef83116157f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.management:gatein-management-spi:2.1.0.Final   Confidence:High

args4j-2.0.16.jar

File Path: /home/ciagent/.m2/repository/args4j/args4j/2.0.16/args4j-2.0.16.jar
MD5: 6571d69d142dd2a003c4ffae6138f0ee
SHA1: 9f00fb12820743b9e05c686eba543d64dd43f2b1
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

closure-compiler-v20131014.jar

Description:  Closure Compiler is a JavaScript optimizing compiler. It parses your JavaScript, analyzes it, removes dead code and rewrites and minimizes what's left. It also checks syntax, variable references, and types, and warns about common JavaScript pitfalls. It is used in many of Google's JavaScript apps, including Gmail, Google Web Search, Google Maps, and Google Docs.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/com/google/javascript/closure-compiler/v20131014/closure-compiler-v20131014.jar
MD5: e9b4b20ef9ff13c13fb159a9efff33ea
SHA1: 5be964798a558aa8f7ddff395d5a9e030b49fae2
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

filters-2.0.235.jar

Description: A collection of image processing filters.

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/com/jhlabs/filters/2.0.235/filters-2.0.235.jar
MD5: d91073d6b28e2505e96620709626495f
SHA1: af6a2dfefef70f1ab2d7a8d1f8173f67e276b3f4
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2005-0406  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)

A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.

Vulnerable Software & Versions:

simplecaptcha-1.1.1.Final-gatein-4.jar

File Path: /home/ciagent/.m2/repository/org/gatein/captcha/simplecaptcha/1.1.1.Final-gatein-4/simplecaptcha-1.1.1.Final-gatein-4.jar
MD5: a8b83c67e6fd04cd02d8ebcfd47348c1
SHA1: 964c53fedc87745494c5f8f2cd62b2548dbdeff5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.captcha:simplecaptcha:1.1.1.Final-gatein-4   Confidence:High

gatein-api-1.0.1.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/api/gatein-api/1.0.1.Final/gatein-api-1.0.1.Final.jar
MD5: 04d51eb4e2734df16f83e514b7110000
SHA1: b67727b03994e6081e2e411804c25bd5d0d919a6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

wci-wci-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/wci/wci-wci/5.2.x-SNAPSHOT/wci-wci-5.2.x-SNAPSHOT.jar
MD5: c7871535a78b9bbfda393c3878cfa6a1
SHA1: 81b2c456f9815a29466de9b1d7a6b44f6d32bf5c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.wci:wci-wci:5.2.x-SNAPSHOT   Confidence:High

jcl-over-slf4j-1.7.7.jar

Description: JCL 1.1.1 implemented over SLF4J

File Path: /home/ciagent/.m2/repository/org/slf4j/jcl-over-slf4j/1.7.7/jcl-over-slf4j-1.7.7.jar
MD5: 32ad130f946ef0460af416397b7fc7b7
SHA1: 56003dcd0a31deea6391b9e2ef2f2dc90b205a92
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

rome-1.0.jar

Description: All Roads Lead to ROME. ROME is a set of Atom/RSS Java utilities that make it easy to work in Java with most syndication formats. Today it accepts all flavors of RSS (0.90, 0.91, 0.92, 0.93, 0.94, 1.0 and 2.0), Atom 0.3 and Atom 1.0 feeds. Rome includes a set of parsers and generators for the various flavors of feeds, as well as converters to convert from one format to another. The parsers can give you back Java objects that are either specific for the format you want to work with, or a generic normalized SyndFeed object that lets you work on with the data without bothering about the underlying format.

File Path: /home/ciagent/.m2/repository/rome/rome/1.0/rome-1.0.jar
MD5: 53d38c030287b939f4e6d745ba1269a7
SHA1: 022b33347f315833e9348cec2751af1a5d5656e4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

calendar-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-common/5.2.x-SNAPSHOT/calendar-common-5.2.x-SNAPSHOT.jar
MD5: 326bd547c123673daec8652f7c0547ef
SHA1: 5b26f16cec2c0af82042dab8cdfc290cf8961cb8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-common:5.2.x-SNAPSHOT   Confidence:High

commons-comet-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-comet-webapp/5.2.x-SNAPSHOT/commons-comet-webapp-5.2.x-SNAPSHOT.war
MD5: 4006c92410944502b2b1d9a4c10a2452
SHA1: 6ce3740eef8ed5c5583e43d99c0817892a2a3036
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-comet-webapp:5.2.x-SNAPSHOT   Confidence:High

commons-extension-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-extension-webapp/5.2.x-SNAPSHOT/commons-extension-webapp-5.2.x-SNAPSHOT.war
MD5: 8da8c633b4af6b26fad53d43d8068d3e
SHA1: 9af7ddc63be207ac47b5d31e62edda45d23de97f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-extension-webapp:5.2.x-SNAPSHOT   Confidence:High

jtidy-r938.jar

Description:  JTidy is a Java port of HTML Tidy, a HTML syntax checker and pretty printer. Like its non-Java cousin, JTidy can be used as a tool for cleaning up malformed and faulty HTML. In addition, JTidy provides a DOM interface to the document that is being processed, which effectively makes you able to use JTidy as a DOM parser for real-world HTML.

License:

Java HTML Tidy License: http://jtidy.svn.sourceforge.net/viewvc/jtidy/trunk/jtidy/LICENSE.txt?revision=95
File Path: /home/ciagent/.m2/repository/net/sf/jtidy/jtidy/r938/jtidy-r938.jar
MD5: 6a9121561b8f98c0a8fb9b6e57f50e6b
SHA1: ab08d87a225a715a69107732b67f21e1da930349
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: net.sf.jtidy:jtidy:r938    Confidence:Highest
  • cpe: cpe:/a:html-tidy:tidy:-   Confidence:Low   

exo.core.component.xml-processing-5.2.x-SNAPSHOT.jar

Description: Implementation of XML Processing Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.xml-processing/5.2.x-SNAPSHOT/exo.core.component.xml-processing-5.2.x-SNAPSHOT.jar
MD5: f565f62074d40489f68af0bc6db57a32
SHA1: c4f7e1cad3be063322427ba00bf91ea10ebe97d8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.xml-processing:5.2.x-SNAPSHOT   Confidence:High

exo.jcr.component.ext-5.2.x-SNAPSHOT.jar

Description: Implementation of Extension Service of Exoplatform SAS 'eXo JCR' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.component.ext/5.2.x-SNAPSHOT/exo.jcr.component.ext-5.2.x-SNAPSHOT.jar
MD5: c433207fa70c48e5badb140a512fbd77
SHA1: 95a018f3b5bffa39097791c6da69c370266cc2f1
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.component.ext:5.2.x-SNAPSHOT   Confidence:High

ecms-apps-portlet-administration-5.2.x-SNAPSHOT.war

Description: eXo DMS Portlet Java Content: ECM Admin

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-apps-portlet-administration/5.2.x-SNAPSHOT/ecms-apps-portlet-administration-5.2.x-SNAPSHOT.war
MD5: 88ab17e230ff0dc683f6db164910dab1
SHA1: 8ccfd7d6f184b94ec8dc7a8699faa5fa29a8f425
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-apps-portlet-administration:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-5.2.x-SNAPSHOT.jar

Description: eXo DMS webui extension

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui/5.2.x-SNAPSHOT/ecms-core-webui-5.2.x-SNAPSHOT.jar
MD5: 191d565fbff1364387217462b12eed12
SHA1: f03534afdf816b37107ca6a17804ebc051774e8b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui:5.2.x-SNAPSHOT   Confidence:High

ecms-apps-portlet-presentation-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-apps-portlet-presentation/5.2.x-SNAPSHOT/ecms-apps-portlet-presentation-5.2.x-SNAPSHOT.war
MD5: 8463c8eb53dec8047483bad7517016d4
SHA1: 75c66a6e3eb9bd3ae1a09a5533df9bb162434297
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-apps-portlet-presentation:5.2.x-SNAPSHOT   Confidence:High

exo.jcr.component.webdav-5.2.x-SNAPSHOT.jar

Description: Implementation of Webdav Service of Exoplatform SAS 'eXo JCR' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.component.webdav/5.2.x-SNAPSHOT/exo.jcr.component.webdav-5.2.x-SNAPSHOT.jar
MD5: a867ea07d5cecd53aef8d34084ff0898
SHA1: 4c410a469ff89899aa6094e4de216c177abc1f3a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.component.webdav:5.2.x-SNAPSHOT   Confidence:High

ecms-core-publication-5.2.x-SNAPSHOT.jar

Description: eXo Publication Service

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-publication/5.2.x-SNAPSHOT/ecms-core-publication-5.2.x-SNAPSHOT.jar
MD5: 85759c4e61fc80a11f403596801d2b7b
SHA1: f7c6d608d5ba3432e476d0aaf15a6228e08363aa
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-publication:5.2.x-SNAPSHOT   Confidence:High

ecms-core-search-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-search/5.2.x-SNAPSHOT/ecms-core-search-5.2.x-SNAPSHOT.jar
MD5: b434502a2b857d91185d474927df9ef0
SHA1: 4247a5d36a73af965953a1313a1eceec1297966d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:pro_search:pro_search:5.2.20181206   Confidence:Low   
  • maven: org.exoplatform.ecms:ecms-core-search:5.2.x-SNAPSHOT   Confidence:High

itunes-com-podcast-0.2.jar

Description: A ROME Plug In that supports the Apple iTunes extensions to RSS 2.0 for podcasting

File Path: /home/ciagent/.m2/repository/com/totsp/feedpod/itunes-com-podcast/0.2/itunes-com-podcast-0.2.jar
MD5: 1a9da03053fb0e8d05b6268300f41fea
SHA1: cd1afe7a55b92769f6b1594540230c1b591fe480
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2006-1467  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the AAC file parsing code in Apple iTunes before 6.0.5 on Mac OS X 10.2.8 or later, and Windows XP and 2000, allows remote user-assisted attackers to execute arbitrary code via an AAC (M4P, M4A, or M4B) file with a sample table size (STSZ) atom with a "malformed" sample_size_table value.

Vulnerable Software & Versions:

CVE-2007-3752  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in Apple iTunes before 7.4 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted album cover art in the covr atom of an MP4/AAC file.

Vulnerable Software & Versions:

CVE-2008-3434  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')

Apple iTunes before 10.5.1 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.

Vulnerable Software & Versions: (show all)

CVE-2008-3634  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apple iTunes before 8.0 on Mac OS X 10.4.11, when iTunes Music Sharing is enabled but blocked by the host-based firewall, presents misleading information about firewall security, which might allow remote attackers to leverage an exposure that would be absent if the administrator were given better information.

Vulnerable Software & Versions: (show all)

CVE-2008-3636  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in the IopfCompleteRequest API in the kernel in Microsoft Windows 2000, XP, Server 2003, and Vista allows context-dependent attackers to gain privileges. NOTE: this issue was originally reported for GEARAspiWDM.sys 2.0.7.5 in Gear Software CD DVD Filter driver before 4.001.7, as used in other products including Apple iTunes and multiple Symantec and Norton products, which allows local users to gain privileges via repeated IoAttachDevice IOCTL calls to \\.\GEARAspiWDMDevice in this GEARAspiWDM.sys. However, the root cause is the integer overflow in the API call itself.

Vulnerable Software & Versions: (show all)

CVE-2009-0016  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Apple iTunes before 8.1 on Windows allows remote attackers to cause a denial of service (infinite loop) via a Digital Audio Access Protocol (DAAP) message with a crafted Content-Length header.

Vulnerable Software & Versions: (show all)

CVE-2009-0143  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apple iTunes before 8.1 does not properly inform the user about the origin of an authentication request, which makes it easier for remote podcast servers to trick a user into providing a username and password when subscribing to a crafted podcast.

Vulnerable Software & Versions: (show all)

CVE-2009-0950  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in Apple iTunes before 8.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an itms: URL with a long URL component after a colon.

Vulnerable Software & Versions: (show all)

CVE-2009-2817  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in Apple iTunes before 9.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted .pls file.

Vulnerable Software & Versions: (show all)

CVE-2010-0531  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

Apple iTunes before 9.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted MP4 podcast file.

Vulnerable Software & Versions: (show all)

CVE-2010-0532  

Severity: Medium
CVSS Score: 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Race condition in the installation package in Apple iTunes before 9.1 on Windows allows local users to gain privileges by replacing an unspecified file with a Trojan horse.

Vulnerable Software & Versions: (show all)

CVE-2010-1387  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

Use-after-free vulnerability in JavaScriptCore in WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page transitions, a different vulnerability than CVE-2010-1763 and CVE-2010-1769.

Vulnerable Software & Versions: (show all)

CVE-2010-1763  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in WebKit in Apple iTunes before 9.2 on Windows has unknown impact and attack vectors, a different vulnerability than CVE-2010-1387 and CVE-2010-1769.

Vulnerable Software & Versions: (show all)

CVE-2010-1768  

Severity: Medium
CVSS Score: 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in Apple iTunes before 9.1 allows local users to gain console privileges via vectors related to log files, "insecure file operation," and syncing an iPhone, iPad, or iPod touch.

Vulnerable Software & Versions: (show all)

CVE-2010-1769  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, accesses out-of-bounds memory during the handling of tables, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, a different vulnerability than CVE-2010-1387 and CVE-2010-1763.

Vulnerable Software & Versions: (show all)

CVE-2010-1777  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in Apple iTunes before 9.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted itpc: URL.

Vulnerable Software & Versions: (show all)

CVE-2011-0111  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0112  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0113  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0114  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0115  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The DOM level 2 implementation in WebKit, as used in Apple iTunes before 10.2 on Windows and Apple Safari, does not properly handle DOM manipulations associated with event listeners during processing of range objects, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0116  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

Use-after-free vulnerability in the setOuterText method in the htmlelement library in WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to DOM manipulations during iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0117  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0118  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0119  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0120  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0121  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0122  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0123  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0124  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0125  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0126  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0127  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0128  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0129  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0130  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0131  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0132  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

Use-after-free vulnerability in the Runin box functionality in the Cascading Style Sheets (CSS) 2.1 Visual Formatting Model implementation in WebKit, as used in Apple iTunes before 10.2 on Windows and Apple Safari, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0133  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, does not properly access glyph data during layout actions for floating blocks associated with pseudo-elements, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0134  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0135  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0136  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0137  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0138  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0139  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0140  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0141  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0142  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0143  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0144  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0145  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0146  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0147  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0148  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0149  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, does not properly parse HTML elements associated with document namespaces, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to a "dangling pointer" and iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0150  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0151  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0152  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0153  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0154  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows and Apple iOS, does not properly implement the .sort function for JavaScript arrays, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0155  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0156  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0164  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0165  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0168  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0170  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image.

Vulnerable Software & Versions: (show all)

CVE-2011-0191  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with JPEG encoding.

Vulnerable Software & Versions: (show all)

CVE-2011-0192  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h. NOTE: some of these details are obtained from third party information.

Vulnerable Software & Versions: (show all)

CVE-2011-0259  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreFoundation, as used in Apple iTunes before 10.5, does not properly perform string tokenization, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.

Vulnerable Software & Versions: (show all)

CVE-2011-2338  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2339  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2341  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2352  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2354  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2356  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2391  

Severity: Medium
CVSS Score: 6.1 (AV:A/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

The IPv6 implementation in the kernel in Apple iOS before 7 allows remote attackers to cause a denial of service (CPU consumption) via crafted ICMPv6 packets.

Vulnerable Software & Versions: (show all)

CVE-2011-2809  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2811  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2813  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2814  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2815  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2816  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2817  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2820  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2831  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2833  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2866  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2867  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2868  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2869  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2870  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2871  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2872  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2873  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-3219  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in CoreMedia, as used in Apple iTunes before 10.5, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.264 encoding.

Vulnerable Software & Versions: (show all)

CVE-2011-3233  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3235  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3236  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3237  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3238  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3239  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3241  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3244  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3252  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in CoreAudio, as used in Apple iTunes before 10.5, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Advanced Audio Coding (AAC) stream.

Vulnerable Software & Versions: (show all)

CVE-2012-0591  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0592  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0593  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0594  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0595  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0596  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0597  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0598  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0599  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0600  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0601  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0602  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0603  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0604  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0605  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0606  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0607  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0608  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0609  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0610  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0611  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0612  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0613  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0614  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0615  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0616  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0617  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0618  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0619  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0620  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0621  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0622  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0623  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0624  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0625  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0626  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0627  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0628  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0629  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0630  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0631  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0632  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0633  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0634  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0635  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0636  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0637  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0638  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0639  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0648  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0677  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in Apple iTunes before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted .m3u playlist.

Vulnerable Software & Versions: (show all)

CVE-2012-3598  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3601  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3602  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3606  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3607  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3612  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3613  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3614  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3616  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3617  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3621  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3622  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3623  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3624  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3632  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3643  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3647  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3648  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3649  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3651  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3652  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3654  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3657  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3658  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3659  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3660  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3671  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3672  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3673  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3675  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3676  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3677  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3684  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3685  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3687  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3688  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3692  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3699  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3700  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3701  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3702  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3703  

Severity: High
CVSS Score: 8.3 (AV:N/AC:M/Au:N/C:P/I:P/A:C)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3704  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3705  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3706  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3707  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3708  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3709  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3710  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3711  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3712  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0991  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0992  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0993  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0994  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0995  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0996  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0997  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0998  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0999  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1000  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1001  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1002  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1003  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1004  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1005  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1006  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1007  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1008  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1010  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1011  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1014  

Severity: Medium
CVSS Score: 4.3 (AV:A/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apple iTunes before 11.0.3 does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.

Vulnerable Software & Versions: (show all)

CVE-2013-1035  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The iTunes ActiveX control in Apple iTunes before 11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2013-1037  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1038  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1039  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1040  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1041  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1047  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-5195  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5196  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5197  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5198  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5199  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5225  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5228  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2014-1242  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)
CWE: CWE-310 Cryptographic Issues

Apple iTunes before 11.1.4 uses HTTP for the iTunes Tutorials window, which allows man-in-the-middle attackers to spoof content by gaining control over the client-server data stream.

Vulnerable Software & Versions: (show all)

CVE-2014-1301  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1.

Vulnerable Software & Versions: (show all)

CVE-2014-1347  

Severity: Medium
CVSS Score: 4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Apple iTunes before 11.2.1 on OS X sets world-writable permissions for /Users and /Users/Shared during reboots, which allows local users to modify files, and consequently obtain access to arbitrary user accounts, via standard filesystem operations.

Vulnerable Software & Versions: (show all)

CVE-2014-3192  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-416 Use After Free

Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in core/dom/ProcessingInstruction.cpp in the DOM implementation in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2014-4452  

Severity: Medium
CVSS Score: 5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4462.

Vulnerable Software & Versions: (show all)

CVE-2014-4459  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Use-after-free vulnerability in WebKit, as used in Apple OS X before 10.10.1, allows remote attackers to execute arbitrary code via crafted page objects in an HTML document.

Vulnerable Software & Versions: (show all)

CVE-2014-4466  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4468  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4469  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4470  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4471  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4472  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4473  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4474  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4475  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4476  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4477 and CVE-2014-4479.

Vulnerable Software & Versions: (show all)

CVE-2014-4477  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4476 and CVE-2014-4479.

Vulnerable Software & Versions: (show all)

CVE-2014-4479  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4476 and CVE-2014-4477.

Vulnerable Software & Versions: (show all)

CVE-2014-8146  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text.

Vulnerable Software & Versions: (show all)

CVE-2015-1068  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1069  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1070  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1071  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1072  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1073  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1074  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1075  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1076  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1077  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1078  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1079  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1080  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1081  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1082  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1083  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1119  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1120  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1121  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1122  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1124  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1152  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1153 and CVE-2015-1154.

Vulnerable Software & Versions: (show all)

CVE-2015-1153  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154.

Vulnerable Software & Versions: (show all)

CVE-2015-1154  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1153.

Vulnerable Software & Versions: (show all)

CVE-2015-1157  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-17 Code

CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2) a WhatsApp message.

Vulnerable Software & Versions: (show all)

CVE-2015-3686  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3687, CVE-2015-3688, and CVE-2015-3689.

Vulnerable Software & Versions: (show all)

CVE-2015-3687  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3688, and CVE-2015-3689.

Vulnerable Software & Versions: (show all)

CVE-2015-3688  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3687, and CVE-2015-3689.

Vulnerable Software & Versions: (show all)

CVE-2015-3730  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3731  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3733  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3734  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3736  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3737  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3738  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3739  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3740  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3741  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3742  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3743  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3744  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3745  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3746  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3747  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3748  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3749  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5755  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5761.

Vulnerable Software & Versions: (show all)

CVE-2015-5761  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5755.

Vulnerable Software & Versions: (show all)

CVE-2015-5789  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5790  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5791  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5792  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5793  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5794  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5796  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5797  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5798  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 12.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5799  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5800  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5801  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5802  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5803  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5804  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5805  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5806  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5807  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5808  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 12.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5809  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5810  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5811  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5812  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5813  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5814  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5815  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 12.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5816  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5817  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5818  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5819  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5821  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5822  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5823  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5874  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 9 and iTunes before 12.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file.

Vulnerable Software & Versions: (show all)

CVE-2015-5920  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

The Software Update component in Apple iTunes before 12.3 does not properly handle redirection, which allows man-in-the-middle attackers to discover encrypted SMB credentials via unspecified vectors.

Vulnerable Software & Versions:

CVE-2015-5928  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-5929  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-5930  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-5931  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-3 and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-6975  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6992 and CVE-2015-7017.

Vulnerable Software & Versions: (show all)

CVE-2015-6992  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6975 and CVE-2015-7017.

Vulnerable Software & Versions: (show all)

CVE-2015-7002  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7011  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-3 and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7012  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7013  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-3 and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7014  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7017  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6975 and CVE-2015-6992.

Vulnerable Software & Versions: (show all)

CVE-2016-1742  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Untrusted search path vulnerability in the installer in Apple iTunes before 12.4 allows local users to gain privileges via a Trojan horse DLL in the current working directory.

Vulnerable Software & Versions:

CVE-2016-4448  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2016-4613  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. Safari before 10.0.1 is affected. iCloud before 6.0.1 is affected. iTunes before 12.5.2 is affected. tvOS before 10.0.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4692  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4728  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 mishandles error prototypes, which allows remote attackers to execute arbitrary code via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4743  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4758  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 does not properly restrict access to the location variable, which allows remote attackers to obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4759  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4765, CVE-2016-4766, CVE-2016-4767, and CVE-2016-4768.

Vulnerable Software & Versions: (show all)

CVE-2016-4760  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-284 Improper Access Control

WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to conduct DNS rebinding attacks against non-HTTP Safari sessions by leveraging HTTP/0.9 support.

Vulnerable Software & Versions: (show all)

CVE-2016-4763  

Severity: Medium
CVSS Score: 4.9 (AV:N/AC:M/Au:S/C:P/I:P/A:N)
CWE: CWE-310 Cryptographic Issues

WKWebView in WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 does not properly verify X.509 certificates from HTTPS servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Vulnerable Software & Versions: (show all)

CVE-2016-4764  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10 is affected. Safari before 10 is affected. iTunes before 12.5.1 is affected. tvOS before 10 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4765  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4766, CVE-2016-4767, and CVE-2016-4768.

Vulnerable Software & Versions: (show all)

CVE-2016-4766  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4767, and CVE-2016-4768.

Vulnerable Software & Versions: (show all)

CVE-2016-4767  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4766, and CVE-2016-4768.

Vulnerable Software & Versions: (show all)

CVE-2016-4768  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4766, and CVE-2016-4767.

Vulnerable Software & Versions: (show all)

CVE-2016-4769  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iTunes before 12.5.1 on Windows and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7578  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.1 is affected. Safari before 10.0.1 is affected. iCloud before 6.0.1 is affected. iTunes before 12.5.2 is affected. tvOS before 10.0.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7586  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7589  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. watchOS before 3.1.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7592  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component, which allows remote attackers to obtain sensitive information via crafted JavaScript prompts on a web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7598  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7599  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses HTTP redirects.

Vulnerable Software & Versions: (show all)

CVE-2016-7610  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7611  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7632  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7635  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7639  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7640  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7641  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7642  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7645  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7646  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7648  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7649  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7652  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7654  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7656  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13783  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13784  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13785  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13788  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13791  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13792  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13793  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13794  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13795  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13796  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13797  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13798  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13802  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13803  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13856  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13864  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. The issue involves the "APNs Server" component. It allows man-in-the-middle attackers to track users by leveraging mishandling of client certificates.

Vulnerable Software & Versions: (show all)

CVE-2017-13866  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13870  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13884  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13885  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2354  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2355  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2356  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2366  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2383  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)

An issue was discovered in certain Apple products. iCloud before 6.2 on Windows is affected. iTunes before 12.6 on Windows is affected. The issue involves cleartext client-certificate transmission in the "APNs Server" component. It allows man-in-the-middle attackers to track users via correlation with this certificate.

Vulnerable Software & Versions: (show all)

CVE-2017-2463  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-416 Use After Free

An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. iCloud before 6.2 on Windows is affected. iTunes before 12.6 on Windows is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2479  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. iCloud before 6.2 on Windows is affected. iTunes before 12.6 on Windows is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2480  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. iCloud before 6.2 on Windows is affected. iTunes before 12.6 on Windows is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-6984  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. iTunes before 12.6.1 on Windows is affected. tvOS before 10.2.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7010  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-125 Out-of-bounds Read

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "libxml2" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted XML file.

Vulnerable Software & Versions: (show all)

CVE-2017-7012  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the "WebKit Web Inspector" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7013  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-125 Out-of-bounds Read

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "libxml2" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted XML file.

Vulnerable Software & Versions: (show all)

CVE-2017-7018  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7019  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit Page Loading" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7020  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7022  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7023  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7024  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7025  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7030  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7034  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7037  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7039  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7040  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7041  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7042  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7043  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7046  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7048  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7049  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7052  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7053  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-284 Improper Access Control

An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the "iTunes" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.

Vulnerable Software & Versions:

CVE-2017-7055  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7056  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7061  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7064  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the "WebKit" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7079  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

An issue was discovered in certain Apple products. iTunes before 12.7 is affected. The issue involves the "Data Sync" component. It allows attackers to access iOS backups (written by iTunes) via a crafted app.

Vulnerable Software & Versions:

CVE-2017-7081  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7087  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7089  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing.

Vulnerable Software & Versions: (show all)

CVE-2017-7090  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive cookie information via a custom URL scheme.

Vulnerable Software & Versions: (show all)

CVE-2017-7091  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7092  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7093  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7094  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7095  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7096  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7098  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7099  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7100  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7102  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7104  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7107  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7109  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via crafted web content that incorrectly interacts with the Application Cache policy.

Vulnerable Software & Versions: (show all)

CVE-2017-7111  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7117  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7120  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7153  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-601 URL Redirection to Untrusted Site ('Open Redirect')

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to spoof user-interface information (about whether the entire content is derived from a valid TLS session) via a crafted web site that sends a 401 Unauthorized redirect.

Vulnerable Software & Versions: (show all)

CVE-2017-7156  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7157  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7160  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7165  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7172  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "CFNetwork Session" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2018-4088  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4096  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4101  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4113  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves a JavaScriptCore function in the "WebKit" component. It allows attackers to trigger an assertion failure by leveraging improper array indexing.

Vulnerable Software & Versions: (show all)

CVE-2018-4114  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4117  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4118  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4119  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4120  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4121  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4122  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4125  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4127  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4128  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4129  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4130  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4144  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Security" component. A buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2018-4146  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows attackers to cause a denial of service (memory corruption) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4161  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4162  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4163  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4165  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4188  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to spoof the address bar via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4190  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-255 Credentials Management

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch.

Vulnerable Software & Versions: (show all)

CVE-2018-4192  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a race condition.

Vulnerable Software & Versions: (show all)

CVE-2018-4199  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4200  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-416 Use After Free

An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers a WebCore::jsElementScrollHeightGetter use-after-free.

Vulnerable Software & Versions: (show all)

CVE-2018-4201  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4204  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4214  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to cause a denial of service (memory corruption and Safari crash) or possibly have unspecified other impact via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4218  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free.

Vulnerable Software & Versions: (show all)

CVE-2018-4222  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-125 Out-of-bounds Read

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation.

Vulnerable Software & Versions: (show all)

CVE-2018-4224  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on the reading of a persistent device identifier.

Vulnerable Software & Versions: (show all)

CVE-2018-4225  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on Keychain state modifications.

Vulnerable Software & Versions: (show all)

CVE-2018-4226  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on the reading of sensitive user information.

Vulnerable Software & Versions: (show all)

CVE-2018-4232  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-19 Data Handling

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to overwrite cookies via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4233  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4246  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-704 Incorrect Type Conversion or Cast

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages type confusion.

Vulnerable Software & Versions: (show all)

jurt-3.2.1.jar

Description: The core of Java UNO.

License:

GNU Lesser General Public License, Version 3: http://www.openoffice.org/license.html
File Path: /home/ciagent/.m2/repository/org/openoffice/jurt/3.2.1/jurt-3.2.1.jar
MD5: 795ea0041d61b4e66e01d687cdf61f43
SHA1: bcc6e74d8ff0760799ae8bca67b5657091606d0e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2007-0238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.

Vulnerable Software & Versions:

CVE-2007-0239  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.

Vulnerable Software & Versions:

CVE-2008-2237  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.

Vulnerable Software & Versions: (show all)

CVE-2008-2238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.

Vulnerable Software & Versions: (show all)

CVE-2009-3570  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in OpenOffice.org (OOo) has unspecified impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9. NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2009-3571  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2010-2935  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."

Vulnerable Software & Versions:

CVE-2010-2936  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

juh-3.2.1.jar

Description: Allows the boostrapping of a ServicemManager and gives access to the native component loader.

License:

GNU Lesser General Public License, Version 3: http://www.openoffice.org/license.html
File Path: /home/ciagent/.m2/repository/org/openoffice/juh/3.2.1/juh-3.2.1.jar
MD5: 2afc96768d4efeb75136648917bdab98
SHA1: 8596138f58b984196ad4b69d03de534eda4f23af
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2007-0238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.

Vulnerable Software & Versions:

CVE-2007-0239  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.

Vulnerable Software & Versions:

CVE-2008-2237  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.

Vulnerable Software & Versions: (show all)

CVE-2008-2238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.

Vulnerable Software & Versions: (show all)

CVE-2009-3570  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in OpenOffice.org (OOo) has unspecified impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9. NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2009-3571  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2010-2935  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."

Vulnerable Software & Versions:

CVE-2010-2936  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

ridl-3.2.1.jar

Description: The type library and the precompiled Java interfaces of the UDK API.

License:

GNU Lesser General Public License, Version 3: http://www.openoffice.org/license.html
File Path: /home/ciagent/.m2/repository/org/openoffice/ridl/3.2.1/ridl-3.2.1.jar
MD5: eb77b8bbfc54ca8fa869a163acace267
SHA1: c2383e8c2ae1e91e9bf9d115585d15f6806249ea
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2007-0238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.

Vulnerable Software & Versions:

CVE-2007-0239  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.

Vulnerable Software & Versions:

CVE-2008-2237  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.

Vulnerable Software & Versions: (show all)

CVE-2008-2238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.

Vulnerable Software & Versions: (show all)

CVE-2009-3570  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in OpenOffice.org (OOo) has unspecified impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9. NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2009-3571  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2010-2935  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."

Vulnerable Software & Versions:

CVE-2010-2936  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

unoil-3.2.1.jar

Description: The precompiled Java interfaces of the OOo API.

License:

GNU Lesser General Public License, Version 3: http://www.openoffice.org/license.html
File Path: /home/ciagent/.m2/repository/org/openoffice/unoil/3.2.1/unoil-3.2.1.jar
MD5: 907a828f8182ed1b8e140167c1b4078a
SHA1: 3fe6ae6fb39d7404229bf75ae5f56bf1827fa3c9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2007-0238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.

Vulnerable Software & Versions:

CVE-2007-0239  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.

Vulnerable Software & Versions:

CVE-2008-2237  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.

Vulnerable Software & Versions: (show all)

CVE-2008-2238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.

Vulnerable Software & Versions: (show all)

CVE-2009-3570  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in OpenOffice.org (OOo) has unspecified impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9. NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2009-3571  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2010-2935  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."

Vulnerable Software & Versions:

CVE-2010-2936  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

jodconverter-core-3.0-eXo03.jar

Description:  JODConverter converts office documents using OpenOffice.org

License:

GNU Lesser General Public License, Version 3 or later: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/org/artofsolving/jodconverter/jodconverter-core/3.0-eXo03/jodconverter-core-3.0-eXo03.jar
MD5: 2d98dedc495be2e71d41b709a5fb71f0
SHA1: bed32f1e7f039a2f637156ec99ba401f0eae0fba
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.artofsolving.jodconverter:jodconverter-core:3.0-eXo03   Confidence:High

groovy-all-2.4.12.jar

Description: Groovy: A powerful, dynamic language for the JVM

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/codehaus/groovy/groovy-all/2.4.12/groovy-all-2.4.12.jar
MD5: dddb0b3d3619875fa1c538c743ae8f99
SHA1: 760afc568cbd94c09d78f801ce51aed1326710af
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jai-core-1.1.3.jar

Description:  The Java Advanced Imaging API extends the Java 2 platform by allowing sophisticated, high-performance image processing to be incorporated into Java applets and applications. It is a set of classes providing imaging functionality beyond that of Java 2D and the Java Foundation classes, though it is designed for compatibility with those APIs. This API implements a set of core image processing capabilities including image tiling, regions of interest, deferred execution and a set of core image processing operators, including many common point, area, and frequency domain operators.

License:

 Sun Microsystems, Inc. Binary Code License Agreement : 
        http://java.sun.com/products/java-media/jai/downloads/download-1_1_2_01.html
      
File Path: /home/ciagent/.m2/repository/javax/media/jai-core/1.1.3/jai-core-1.1.3.jar
MD5: f398bc038307ee434bac1b93ba3ab02d
SHA1: b179d2efb1174658483e8b41bf4ac9d2eb5de438
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: javax.media:jai-core:1.1.3   Confidence:High

jai-codec-1.1.3.jar

Description:  Java Advanced Imaging Codecs supporting support BMP, GIF (read only), FlashPix (read only), JPEG, PNG, PNM, TIFF, and WBMP.

License:

 Sun Microsystems, Inc. Binary Code License Agreement : 
        http://java.sun.com/products/java-media/jai/downloads/download-1_1_2_01.html
      
File Path: /home/ciagent/.m2/repository/com/sun/media/jai-codec/1.1.3/jai-codec-1.1.3.jar
MD5: 1b0f328c9eda0992167ce503b0a5afcc
SHA1: 34a67ba62097778e4695c951156bf189c2c8e016
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: com.sun.media:jai-codec:1.1.3   Confidence:High

icepdf-core-5.1.1.jar

Description: ICEpdf core rendering library.

File Path: /home/ciagent/.m2/repository/org/icepdf/os/icepdf-core/5.1.1/icepdf-core-5.1.1.jar
MD5: 049fc6292cd8378b3974bff95d580b5f
SHA1: a677b063a38bfa801e7969ee0d3f2dcedb527760
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.icepdf.os:icepdf-core:5.1.1   Confidence:High

imgscalr-lib-4.2.jar

Description: imgscalr is an simple and efficient best-practices image-scaling and manipulation library implemented in pure Java.

License:

ASF 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/imgscalr/imgscalr-lib/4.2/imgscalr-lib-4.2.jar
MD5: 1c4860cbc02f8c1766396d68636ab9ab
SHA1: e2838f7119361511ef7d54fe0d502bf07f3325eb
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jdom-1.1.3.jar

Description:  A complete, Java-based solution for accessing, manipulating, and outputting XML data

License:

Similar to Apache License but with the acknowledgment clause removed: https://raw.github.com/hunterhacker/jdom/master/LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/jdom/jdom/1.1.3/jdom-1.1.3.jar
MD5: 140bfed13341fe2039eee0f26a16d705
SHA1: 8bdfeb39fa929c35f5e4f0b02d34350db39a1efc
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

ecms-core-services-5.2.x-SNAPSHOT.jar

Description: eXo CMS Service

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-services/5.2.x-SNAPSHOT/ecms-core-services-5.2.x-SNAPSHOT.jar
MD5: f9d05eb1e738bad8925fb4bb5120039d
SHA1: f7c30ccbc9cd7a5eea4b555ab4ef5207f333ef15
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-services:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-presentation-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui-presentation/5.2.x-SNAPSHOT/ecms-core-webui-presentation-5.2.x-SNAPSHOT.jar
MD5: 6e5c9294a7cf7d1b0855da42a58c44ab
SHA1: c19f313ccb606436fbd78c1023191c863fc58e3a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui-presentation:5.2.x-SNAPSHOT   Confidence:High

ecms-ext-authoring-services-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-ext-authoring-services/5.2.x-SNAPSHOT/ecms-ext-authoring-services-5.2.x-SNAPSHOT.jar
MD5: 84d9e4659cac35ad22f15fe6e97ad29e
SHA1: b6e2ba477cff3f752207d7c27353593b096c26e4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-ext-authoring-services:5.2.x-SNAPSHOT   Confidence:High

json-20070829.jar

Description:  JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.

File Path: /home/ciagent/.m2/repository/org/json/json/20070829/json-20070829.jar
MD5: 4a913140f9099519dfc0212fa5d9a457
SHA1: 89190ff77b57203c3417555f32226998da97ff38
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

ecms-apps-portlet-seo-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-apps-portlet-seo/5.2.x-SNAPSHOT/ecms-apps-portlet-seo-5.2.x-SNAPSHOT.war
MD5: 4f33b779b9ba349f2e32312205d7661d
SHA1: a48715bd803b540817c042063eaa4ffa2d73f82e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-apps-portlet-seo:5.2.x-SNAPSHOT   Confidence:High

ecms-apps-resources-wcm-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-apps-resources-wcm/5.2.x-SNAPSHOT/ecms-apps-resources-wcm-5.2.x-SNAPSHOT.war
MD5: bc2f9ef011040c66b147151106632b5d
SHA1: 760a9fb568c09ef44bed8830ea31b73911554e33
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-apps-resources-wcm:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webapp-5.2.x-SNAPSHOT.war

Description: eXo WCM Core Services Configuration WAR

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webapp/5.2.x-SNAPSHOT/ecms-core-webapp-5.2.x-SNAPSHOT.war
MD5: a0a681fcbcca6f2317395a0e718b3a63
SHA1: 18abe97c7f2ebff9f9dd92bb38cee093b0956579
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webapp:5.2.x-SNAPSHOT   Confidence:High

commons-component-upgrade-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-component-upgrade/5.2.x-SNAPSHOT/commons-component-upgrade-5.2.x-SNAPSHOT.jar
MD5: 66034f9de908e03640eabe918224d329
SHA1: 294bc3cba7c8b629e2fe72939815443d11330caa
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-component-upgrade:5.2.x-SNAPSHOT   Confidence:High

json-simple-1.1.1.jar

Description: A simple Java toolkit for JSON

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar
MD5: 5cc2c478d73e8454b4c369cee66c5bc7
SHA1: c9ad4a0850ab676c5c64461a05ca524cdfff59f1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-io-2.4.jar

Description:  The Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar
MD5: 7f97854dc04c119d461fed14f5d8bb96
SHA1: b1b6ea3b7e4aa4f492509a4952029cd8e48019ad
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

ecms-core-connector-5.2.x-SNAPSHOT.jar

Description: eXo ECMS REST Services

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-connector/5.2.x-SNAPSHOT/ecms-core-connector-5.2.x-SNAPSHOT.jar
MD5: 221abb615bf299959b9ecf89a794dc9f
SHA1: 81995b690ee222bf948cd37b4dd146012d8066d9
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-connector:5.2.x-SNAPSHOT   Confidence:High

exo.kernel.component.cache-5.2.x-SNAPSHOT.jar

Description: Implementation of Cache Service of Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.component.cache/5.2.x-SNAPSHOT/exo.kernel.component.cache-5.2.x-SNAPSHOT.jar
MD5: 25a15173e1c71e993a66f1488f37eb6a
SHA1: 5d5cf98e47e52a4d7037190309a1e1f6ddc0d802
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.component.cache:5.2.x-SNAPSHOT   Confidence:High

ecms-ext-authoring-apps-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-ext-authoring-apps/5.2.x-SNAPSHOT/ecms-ext-authoring-apps-5.2.x-SNAPSHOT.war
MD5: 4340e7f8c4f54a1b0d0df6dd0593cdf1
SHA1: 8c13971fd102392d311ad00c5a39c4c29096e721
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-ext-authoring-apps:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-fcc-5.2.x-SNAPSHOT.jar

Description: >eXo Fast Content Creator webui component

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui-fcc/5.2.x-SNAPSHOT/ecms-core-webui-fcc-5.2.x-SNAPSHOT.jar
MD5: 1cbe5c93b4a1b583e546cb2c293ea0ac
SHA1: 16991ab1e8026c1bff3470f527dec57c9f4d6f38
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui-fcc:5.2.x-SNAPSHOT   Confidence:High

ecms-packaging-wcm-webapp-5.2.x-SNAPSHOT.war

Description: eXo WCM Extension WAR's configuration

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-packaging-wcm-webapp/5.2.x-SNAPSHOT/ecms-packaging-wcm-webapp-5.2.x-SNAPSHOT.war
MD5: fb7fcefa9559c23c16884e8a49af9025
SHA1: 08d0279dd8eab4ff89ff0e8383b62ffc745a0127
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-packaging-wcm-webapp:5.2.x-SNAPSHOT   Confidence:High

exo-jcr-services-5.2.x-SNAPSHOT.jar

Description: Exoplatform SAS 'eXo JCR Ext Services' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/exo-jcr-services/5.2.x-SNAPSHOT/exo-jcr-services-5.2.x-SNAPSHOT.jar
MD5: 1e7c5637df888900ae04a4ff00bd9cff
SHA1: 75bd54ba161e076a7c8e965d6e203f0df142ce0e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform:exo-jcr-services:5.2.x-SNAPSHOT   Confidence:High

fontbox-1.8.14.jar

Description:  The Apache FontBox library is an open source Java tool to obtain low level information from font files. FontBox is a subproject of Apache PDFBox.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/pdfbox/fontbox/1.8.14/fontbox-1.8.14.jar
MD5: 901640f7e2bd12508ae4a7cccba3df79
SHA1: 9c7caec614a6a132bedc83f1d6d247bb96ca0df3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jempbox-1.8.14.jar

Description:  The Apache JempBox library is an open source Java tool that implements Adobe's XMP(TM) specification. JempBox is a subproject of Apache PDFBox.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/pdfbox/jempbox/1.8.14/jempbox-1.8.14.jar
MD5: 393135759731daf4e301903b3de2fbbb
SHA1: 7f94c7cd4efc21e78729436cc4cf0c09eeea0f38
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

pdfbox-1.8.14.jar

Description:  The Apache PDFBox library is an open source Java tool for working with PDF documents.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/pdfbox/pdfbox/1.8.14/pdfbox-1.8.14.jar
MD5: c90740e185fc2f8013d1119f509ea4f3
SHA1: 7550298240c8540b721733ede6dc88fcf4fa2b0f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

htmllexer-2.1.jar

Description: HTML Lexer is the low level lexical analyzer.

File Path: /home/ciagent/.m2/repository/org/htmlparser/htmllexer/2.1/htmllexer-2.1.jar
MD5: 1cb7184766a0c52f4d98d671bb08be19
SHA1: 2ebf2c073e649b7e674cddd0558ff102a486402f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

htmlparser-2.1.jar

Description: HTML Parser is the high level syntactical analyzer.

File Path: /home/ciagent/.m2/repository/org/htmlparser/htmlparser/2.1/htmlparser-2.1.jar
MD5: aa05b921026c228f92ef8b4a13c26f8d
SHA1: c752e5984b7767533cbd3fdffa48cecb52fa226c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

poi-3.13.jar

Description: Apache POI - Java API To Access Microsoft Format Files

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/poi/poi/3.13/poi-3.13.jar
MD5: 1b43f32e2211546040597a9e2d07b869
SHA1: 0f59f504ba8c521e61e25f417ec652fd485010f3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-5000  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions:

CVE-2017-5644  

Severity: High
CVSS Score: 7.1 (AV:N/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

Vulnerable Software & Versions:

tika-core-1.5.jar

Description: This is the core Apache Tika™ toolkit library from which all other modules inherit functionality. It also includes the core facades for the Tika API.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tika/tika-core/1.5/tika-core-1.5.jar
MD5: e864bf637f51283dc525087b015d7b1a
SHA1: 194ca0fb3d73b07737524806fbc3bec89063c03a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-6809  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.

Vulnerable Software & Versions:

CVE-2018-11761  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.

Vulnerable Software & Versions: (show all)

CVE-2018-11762  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.

Vulnerable Software & Versions: (show all)

CVE-2018-1335  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-1338  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-1339  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-8017  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser.

Vulnerable Software & Versions: (show all)

vorbis-java-core-0.1-tests.jar

File Path: /home/ciagent/.m2/repository/org/gagravarr/vorbis-java-core/0.1/vorbis-java-core-0.1-tests.jar
MD5: d58f076c08a917277d03f3417aa867a6
SHA1: c849979e199d8a7c3da1a00799c623c00f94efac
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:test,provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:test,provided

Identifiers

vorbis-java-tika-0.1.jar

File Path: /home/ciagent/.m2/repository/org/gagravarr/vorbis-java-tika/0.1/vorbis-java-tika-0.1.jar
MD5: 1fccc6796a0924ba4f32eb1d44b8616b
SHA1: 6966c8663a7f689021accb13cceaa6101f53ea3d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-6809  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.

Vulnerable Software & Versions:

CVE-2018-11761  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.

Vulnerable Software & Versions: (show all)

CVE-2018-1335  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-1338  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-1339  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.

Vulnerable Software & Versions: (show all)

netcdf-4.2-min.jar

Description: The NetCDF-Java Library is a Java interface to NetCDF files, as well as to many other types of scientific data formats.

License:

(MIT-style) netCDF C library license.: http://www.unidata.ucar.edu/software/netcdf/copyright.html
File Path: /home/ciagent/.m2/repository/edu/ucar/netcdf/4.2-min/netcdf-4.2-min.jar
MD5: eb00b40b0511f0fc1dfcfc9cb89e3c53
SHA1: 0f3c3f3db4c54483aa1fbc4497e300879ce24da1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

apache-mime4j-core-0.7.2.jar

Description: Java stream based MIME message parser

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/james/apache-mime4j-core/0.7.2/apache-mime4j-core-0.7.2.jar
MD5: 88f799546eca803c53eee01a4ce5edcd
SHA1: a81264fe0265ebe8fd1d8128aad06dc320de6eef
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

xz-1.2.jar

Description: XZ data compression

License:

Public Domain
File Path: /home/ciagent/.m2/repository/org/tukaani/xz/1.2/xz-1.2.jar
MD5: 04bd31459826c30c2a3c304e3b225ad4
SHA1: bfc66dda280a18ab341b5023248925265c00394c
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.tukaani:xz:1.2    Confidence:Highest
  • cpe: cpe:/a:tukaani:xz:1.2   Confidence:Low   

CVE-2015-4035  

Severity: Medium
CVSS Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.

Vulnerable Software & Versions:

commons-compress-1.5.jar

Description:  Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, xz and ar, cpio, jar, tar, zip, dump.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/commons/commons-compress/1.5/commons-compress-1.5.jar
MD5: 5e18cfcf472548c2e0b90a4ea1cedf42
SHA1: d2bd2c0bd328f1dabdf33e10b6d223ebcbe93343
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

tagsoup-1.2.1.jar

Description: TagSoup is a SAX-compliant parser written in Java that, instead of parsing well-formed or valid XML, parses HTML as it is found in the wild: poor, nasty and brutish, though quite often far from short. TagSoup is designed for people who have to process this stuff using some semblance of a rational application design. By providing a SAX interface, it allows standard XML tools to be applied to even the worst HTML. TagSoup also includes a command-line processor that reads HTML files and can generate either clean HTML or well-formed XML that is a close approximation to XHTML.

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/ccil/cowan/tagsoup/tagsoup/1.2.1/tagsoup-1.2.1.jar
MD5: ae73a52cdcbec10cd61d9ef22fab5936
SHA1: 5584627487e984c03456266d3f8802eb85a9ce97
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

asm-debug-all-4.1.jar

File Path: /home/ciagent/.m2/repository/org/ow2/asm/asm-debug-all/4.1/asm-debug-all-4.1.jar
MD5: 6c3a8842f484dd3d620002b361e3610e
SHA1: dd6ba5c392d4102458494e29f54f70ac534ec2a2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

isoparser-1.0-RC-1.jar

Description: A generic parser and writer for all ISO 14496 based files (MP4, Quicktime, DCF, PDCF, ...)

License:

Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/googlecode/mp4parser/isoparser/1.0-RC-1/isoparser-1.0-RC-1.jar
MD5: b0444fde2290319c9028564c3c3ff1ab
SHA1: 4a5768b1070b9488a433362d736720fd7a7b264f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2013-0259  

Severity: Low
CVSS Score: 2.1 (AV:N/AC:H/Au:S/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the Boxes module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with administer or edit boxes permissions to inject arbitrary web script or HTML via the subject parameter.

Vulnerable Software & Versions: (show all)

xmpcore-5.1.2.jar

Description:  The XMP Library for Java is based on the C++ XMPCore library and the API is similar.

License:

The BSD License: http://www.adobe.com/devnet/xmp/library/eula-xmp-library-java.html
File Path: /home/ciagent/.m2/repository/com/adobe/xmp/xmpcore/5.1.2/xmpcore-5.1.2.jar
MD5: 0b2cf2a09d32abdedd17de864e93ad25
SHA1: 55615fa2582424e38705487d1d3969af8554f637
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

metadata-extractor-2.6.2.jar

Description: Java library for reading metadata from image files.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/drewnoakes/metadata-extractor/2.6.2/metadata-extractor-2.6.2.jar
MD5: 8f3acbee87dbd5b0cdfacee3bb3aff8b
SHA1: 13930ff22d3f152bd969a63e88537d2f2adc2cd5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

vorbis-java-core-0.1.jar

File Path: /home/ciagent/.m2/repository/org/gagravarr/vorbis-java-core/0.1/vorbis-java-core-0.1.jar
MD5: b88115be2754cb6883e652ba68ca46c8
SHA1: 662a02b94701947e6e66e7793d996043f05fad4a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

juniversalchardet-1.0.3.jar

Description: Java port of universalchardet

License:

Mozilla Public License 1.1 (MPL 1.1): http://www.mozilla.org/MPL/MPL-1.1.html
File Path: /home/ciagent/.m2/repository/com/googlecode/juniversalchardet/juniversalchardet/1.0.3/juniversalchardet-1.0.3.jar
MD5: d9ea0a9a275336c175b343f2e4cd8f27
SHA1: cd49678784c46aa8789c060538e0154013bb421b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jhighlight-1.0.jar

Description:  JHighlight is an embeddable pure Java syntax highlighting library that supports Java, HTML, XHTML, XML and LZX languages and outputs to XHTML. It also supports RIFE templates tags and highlights them clearly so that you can easily identify the difference between your RIFE markup and the actual marked up source.

License:

CDDL, v1.0: http://www.opensource.org/licenses/cddl1.php
LGPL, v2.1 or later: http://www.opensource.org/licenses/lgpl-license.php
File Path: /home/ciagent/.m2/repository/com/uwyn/jhighlight/1.0/jhighlight-1.0.jar
MD5: 0ad5cf1bc56657f5e9e327e5e768da0a
SHA1: 0b1774029ee29472df8c25e5ba796431f7689fd6
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

xmlbeans-2.6.0.jar

Description: XmlBeans main jar

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/xmlbeans/xmlbeans/2.6.0/xmlbeans-2.6.0.jar
MD5: 6591c08682d613194dacb01e95c78c2c
SHA1: 29e80d2dd51f9dcdef8f9ffaee0d4dc1c9bbfc87
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo.core.component.document-5.2.x-SNAPSHOT.jar

Description: Implementation of Document Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.document/5.2.x-SNAPSHOT/exo.core.component.document-5.2.x-SNAPSHOT.jar
MD5: 07bcc5b7afd6e4e1c9d0b5fd42851f74
SHA1: b40b01bda5d53288d76cf740fd918849c0d49538
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.document:5.2.x-SNAPSHOT   Confidence:High

ecms-core-publication-plugins-5.2.x-SNAPSHOT.jar

Description: eXo Publication Plugins

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-publication-plugins/5.2.x-SNAPSHOT/ecms-core-publication-plugins-5.2.x-SNAPSHOT.jar
MD5: 357590e17e0e58d111b97e28f9e2d7f6
SHA1: 95070b86ab162f94fd11b4eee0973af2606ed023
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-publication-plugins:5.2.x-SNAPSHOT   Confidence:High

ecms-core-viewer-5.2.x-SNAPSHOT.jar

Description: eXo PDF Viewer

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-viewer/5.2.x-SNAPSHOT/ecms-core-viewer-5.2.x-SNAPSHOT.jar
MD5: 00ff5d338220293ad5b69fa11df0e4d2
SHA1: df4a8515402439128980731145dabb5919621dcb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-viewer:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-administration-5.2.x-SNAPSHOT.jar

Description: eXo DMS Portlet Java Content: ECM Admin

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui-administration/5.2.x-SNAPSHOT/ecms-core-webui-administration-5.2.x-SNAPSHOT.jar
MD5: f9a3e9dc6b7e34ac9bb2df18e11e0cfc
SHA1: a21b7b938fe95eedd0a8eaf40cb60129da4d6972
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui-administration:5.2.x-SNAPSHOT   Confidence:High

ecms-ext-authoring-webui-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-ext-authoring-webui/5.2.x-SNAPSHOT/ecms-ext-authoring-webui-5.2.x-SNAPSHOT.jar
MD5: 6f622ef20f0a985e21ed4c2c3fc6797c
SHA1: 0f2d49fe31c0f8b8fb505ee94e1a7dace43d6ce0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-ext-authoring-webui:5.2.x-SNAPSHOT   Confidence:High

ecms-ext-webui-5.2.x-SNAPSHOT.jar

Description: Action View Information on Right click popup menu

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-ext-webui/5.2.x-SNAPSHOT/ecms-ext-webui-5.2.x-SNAPSHOT.jar
MD5: cd6a744e58702d238693c6df663b9501
SHA1: 22e95050a7ac4ce8c8e630e8a42c5da1680fc5eb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-ext-webui:5.2.x-SNAPSHOT   Confidence:High

ecms-upgrade-plugins-5.2.x-SNAPSHOT.jar

Description: eXo ECMS Upgrade Plugins

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-upgrade-plugins/5.2.x-SNAPSHOT/ecms-upgrade-plugins-5.2.x-SNAPSHOT.jar
MD5: 6fc1be4e9338e6e794328bf8778e1fcf
SHA1: d873ebbc1548f7b5916d78d7fbe68d86450a24dc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-upgrade-plugins:5.2.x-SNAPSHOT   Confidence:High

forum-forum-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-forum-webapp/5.2.x-SNAPSHOT/forum-forum-webapp-5.2.x-SNAPSHOT.war
MD5: 2b897ecbbe9751a72db901f467bb913e
SHA1: 88291f762da89e20c9b1897a6926422d738539c3
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-forum-webapp:5.2.x-SNAPSHOT   Confidence:High

commons-webui-component-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-webui-component/5.2.x-SNAPSHOT/commons-webui-component-5.2.x-SNAPSHOT.jar
MD5: eda0715aa62eb978f7369d992027b4f6
SHA1: 6938ded4bb42471626ee1727eb5c74c4ae6288c7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-webui-component:5.2.x-SNAPSHOT   Confidence:High

forum-application-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-application-common/5.2.x-SNAPSHOT/forum-application-common-5.2.x-SNAPSHOT.jar
MD5: e9c94697d83f43f92fd77f55fb0b1aa6
SHA1: cf204c2dd20ae7d48235910cb4760be4996d8fa5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-application-common:5.2.x-SNAPSHOT   Confidence:High

htmlcleaner-2.7.jar

Description:  HtmlCleaner is an HTML parser written in Java. It transforms dirty HTML to well-formed XML following the same rules that most web-browsers use.

License:

BSD License: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/net/sourceforge/htmlcleaner/htmlcleaner/2.7/htmlcleaner-2.7.jar
MD5: 59c43d382a268e31867fcd3de90991a0
SHA1: e2f6f5e109695701578258934d9819379c5bffe4
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

stax-utils-20070216.jar

Description: Provides a set of utility classes to integrate StAX into existing XML processing applications.

License:

BSD: http://www.opensource.org/licenses/bsd-license.html
File Path: /home/ciagent/.m2/repository/net/java/dev/stax-utils/stax-utils/20070216/stax-utils-20070216.jar
MD5: e4e3c9cad3b8289b1f905d6705bb6368
SHA1: 1d9fc60be26a0482c36b7a04d2c581ddf758b6ea
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

xwiki-commons-xml-5.4.7.jar

Description: XWiki Commons - XML

License:

http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/xwiki/commons/xwiki-commons-xml/5.4.7/xwiki-commons-xml-5.4.7.jar
MD5: 292ec670c150223faee3a24a5288b9bd
SHA1: 788b59fc9ea9109aacc237a15f059530b1afb793
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.xwiki.commons:xwiki-commons-xml:5.4.7   Confidence:High
  • cpe: cpe:/a:xwiki:xwiki:5.4.7   Confidence:Low   

CVE-2018-16277  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The Image Import function in XWiki through 10.7 has XSS.

Vulnerable Software & Versions:

wiki-renderer-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-renderer/5.2.x-SNAPSHOT/wiki-renderer-5.2.x-SNAPSHOT.jar
MD5: a99d318948aa83ce2ac16166c1310301
SHA1: ac28f60d431ce0f3f438caa5f688479adaef9686
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-renderer:5.2.x-SNAPSHOT   Confidence:High

forum-component-bbcode-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-component-bbcode/5.2.x-SNAPSHOT/forum-component-bbcode-5.2.x-SNAPSHOT.jar
MD5: cf9494c38feb350d2ac261f29eabcaab
SHA1: 99e9d7a22b8654529470333dfd780c2586e355f2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-component-bbcode:5.2.x-SNAPSHOT   Confidence:High

forum-component-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-component-common/5.2.x-SNAPSHOT/forum-component-common-5.2.x-SNAPSHOT.jar
MD5: 393ecf51e1b7ec450a05e253ac6bad65
SHA1: 8d9975c015728948100339139657e0906e27a426
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-component-common:5.2.x-SNAPSHOT   Confidence:High

forum-component-rendering-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-component-rendering/5.2.x-SNAPSHOT/forum-component-rendering-5.2.x-SNAPSHOT.jar
MD5: 0bd1b1fe4d4eac5e59eed44dd38ed283
SHA1: 039939ad9d3da1c241ea74fdd16420b0cf6d8585
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-component-rendering:5.2.x-SNAPSHOT   Confidence:High

forum-forum-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-forum-service/5.2.x-SNAPSHOT/forum-forum-service-5.2.x-SNAPSHOT.jar
MD5: a74df29052d0f6808b5329ed2a0c16b9
SHA1: c1db38d110d74206c0e402007f1488293ad492ab
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-forum-service:5.2.x-SNAPSHOT   Confidence:High

xpp3-1.1.4c.jar

Description: MXP1 is a stable XmlPull parsing engine that is based on ideas from XPP and in particular XPP2 but completely revised and rewritten to take the best advantage of latest JIT JVMs such as Hotspot in JDK 1.4+.

License:

Indiana University Extreme! Lab Software License, vesion 1.1.1: http://www.extreme.indiana.edu/viewcvs/~checkout~/XPP3/java/LICENSE.txt
Public Domain: http://creativecommons.org/licenses/publicdomain
Apache Software License, version 1.1: http://www.apache.org/licenses/LICENSE-1.1
File Path: /home/ciagent/.m2/repository/xpp3/xpp3/1.1.4c/xpp3-1.1.4c.jar
MD5: 6e3c39f391e4994888b7d0030f775804
SHA1: 9b988ea84b9e4e9f1874e390ce099b8ac12cfff5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

integ-search-portlet-5.2.x-SNAPSHOT.war

Description: Integration search portlet

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-search-portlet/5.2.x-SNAPSHOT/integ-search-portlet-5.2.x-SNAPSHOT.war
MD5: f705243f12f97407e727da22a8ecd06d
SHA1: 2ad6400328ec2f958b077c47d5fa2096a427c974
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-search-portlet:5.2.x-SNAPSHOT   Confidence:High

juzu-core-1.2.x-SNAPSHOT.jar

Description: Where all the magic happens

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-core/1.2.x-SNAPSHOT/juzu-core-1.2.x-SNAPSHOT.jar
MD5: 8b16381ec811e61fe6cb9d81e69801ac
SHA1: 22ec9f14010963031f0f3bbe41354a1bf52e4839
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-core:1.2.x-SNAPSHOT   Confidence:High

rhino-1.7R3.jar

Description: Rhino is an open-source implementation of JavaScript written entirely in Java. It is typically embedded into Java applications to provide scripting to end users.

License:

Mozilla Public License, Version 1.1: http://www.mozilla.org/MPL/MPL-1.1.txt
GNU General Public License, Version 2: http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt
File Path: /home/ciagent/.m2/repository/org/mozilla/rhino/1.7R3/rhino-1.7R3.jar
MD5: 9dbdb24663f20db43a2c29467c13a204
SHA1: 3bff1e632c665f8cf2d438f77a9f4d0758277db5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

juzu-plugins-less-1.2.x-SNAPSHOT.jar

Description: The Less plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-less/1.2.x-SNAPSHOT/juzu-plugins-less-1.2.x-SNAPSHOT.jar
MD5: 48276aec3ffa94fcd553118fda33d567
SHA1: 97caaa2eb6fe395b4536eff41b715ffa95d31001
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-less:1.2.x-SNAPSHOT   Confidence:High

juzu-plugins-portlet-1.2.x-SNAPSHOT.jar

Description: The Portlet plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-portlet/1.2.x-SNAPSHOT/juzu-plugins-portlet-1.2.x-SNAPSHOT.jar
MD5: eca5f23d7ebdb486da65ae488f774758
SHA1: 321f5284f45640e7c3f49c81ff9b57aa0b3f6b2a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-portlet:1.2.x-SNAPSHOT   Confidence:High

javax.inject-1.jar

Description: The javax.inject API

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/javax/inject/javax.inject/1/javax.inject-1.jar
MD5: 289075e48b909e9e74e6c915b3631d2e
SHA1: 6975da39a7040257bd51d21a231b76c915872d38
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-api-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-api/5.2.x-SNAPSHOT/commons-api-5.2.x-SNAPSHOT.jar
MD5: 6c64b2ae0c0e14317a18342ba9e0feff
SHA1: 3fd09d25b100ea509b9d1e921b82e8c44cf68cab
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-api:5.2.x-SNAPSHOT   Confidence:High

integ-search-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-search-service/5.2.x-SNAPSHOT/integ-search-service-5.2.x-SNAPSHOT.jar
MD5: 4f19143b30e8bc38f39389f47de7effa
SHA1: c9924a83c3ee99b81658606cd1ab8e3fa19b313e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-search-service:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:pro_search:pro_search:5.2.20181206   Confidence:Low   

exo.jcr.framework.command-5.2.x-SNAPSHOT.jar

Description: Implementation of Command Framework of Exoplatform SAS 'eXo JCR' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.framework.command/5.2.x-SNAPSHOT/exo.jcr.framework.command-5.2.x-SNAPSHOT.jar
MD5: f971acabd4cfb47be060381e2669fbbe
SHA1: 1b9945990085beb173f24d4fcadd533df9fd4158
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.framework.command:5.2.x-SNAPSHOT   Confidence:High

exo.jcr.framework.web-5.2.x-SNAPSHOT.jar

Description: Implementation of JCR REST adapter of Exoplatform SAS 'eXo JCR' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.framework.web/5.2.x-SNAPSHOT/exo.jcr.framework.web-5.2.x-SNAPSHOT.jar
MD5: 105b31d784d49310e3c25e72a15d8ae9
SHA1: d34b6c8212771bbd6b3952c04e7ebaeb6f341343
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.framework.web:5.2.x-SNAPSHOT   Confidence:High

commons-component-product-5.2.x-SNAPSHOT.jar

Description: Product informations: version, revision and build numbers

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-component-product/5.2.x-SNAPSHOT/commons-component-product-5.2.x-SNAPSHOT.jar
MD5: 9e312bdf8582c6068bb300dc15a2696e
SHA1: 63927fa571ffe964fecd55dc4e9dc94a7002f7d5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-component-product:5.2.x-SNAPSHOT   Confidence:High

platform-component-upgrade-plugins-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-upgrade-plugins/5.2.x-SNAPSHOT/platform-component-upgrade-plugins-5.2.x-SNAPSHOT.jar
MD5: b0690212e27b143ee8d31f2b6b76938d
SHA1: 7a58c1e9b71c6a3c0195927c8a951742cc46d64d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-upgrade-plugins:5.2.x-SNAPSHOT   Confidence:High

platform-exo-gadget-pack-gadget-pack-5.2.x-SNAPSHOT.war

Description: eXo gadgets

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-exo-gadget-pack-gadget-pack/5.2.x-SNAPSHOT/platform-exo-gadget-pack-gadget-pack-5.2.x-SNAPSHOT.war
MD5: 5f8455fda6f07b5b46cd85966a6916f1
SHA1: 39822119c0871a80469f812e7798c889d7b0b7ea
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-exo-gadget-pack-gadget-pack:5.2.x-SNAPSHOT   Confidence:High

exo.core.component.script.groovy-5.2.x-SNAPSHOT.jar

Description: Groovy Scripts Instantiator of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.script.groovy/5.2.x-SNAPSHOT/exo.core.component.script.groovy-5.2.x-SNAPSHOT.jar
MD5: 6bcbf1aa558884789c18302e40f80a12
SHA1: 1ed5a04ca621202edf9a45937892cb2fce81effc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.script.groovy:5.2.x-SNAPSHOT   Confidence:High

platform-exo-gadget-pack-gadget-pack-services-5.2.x-SNAPSHOT.jar

Description: Gadget pack services

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-exo-gadget-pack-gadget-pack-services/5.2.x-SNAPSHOT/platform-exo-gadget-pack-gadget-pack-services-5.2.x-SNAPSHOT.jar
MD5: 417e3abdade676984a8a690d1db0b552
SHA1: 4b7e542b581c67c748ee3909e31c70b87505b4a6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-exo-gadget-pack-gadget-pack-services:5.2.x-SNAPSHOT   Confidence:High

platform-extension-portlet-branding-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-portlet-branding/5.2.x-SNAPSHOT/platform-extension-portlet-branding-5.2.x-SNAPSHOT.war
MD5: 8f42fff6945b5628a7d7ba62ad8d94cb
SHA1: 182bb4010352d9eab4fbf024e70bf353287809e5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-portlet-branding:5.2.x-SNAPSHOT   Confidence:High

commons-fileupload-1.3.3.jar

Description:  The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-fileupload/commons-fileupload/1.3.3/commons-fileupload-1.3.3.jar
MD5: dd77e787b7b5dc56f6a1cb658716d55d
SHA1: 04ff14d809195b711fd6bcc87e6777f886730ca1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-juzu-5.2.x-SNAPSHOT.jar

Description: This module contains : - assemblies for Juzu application packaging inside eXoPlatform - eXo Kernel Provider Factory

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-juzu/5.2.x-SNAPSHOT/commons-juzu-5.2.x-SNAPSHOT.jar
MD5: 5c85bf3c05969dad5efcad33ced89b30
SHA1: 1671677aa64cadc270452f3393eeb41b462aa6d4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-juzu:5.2.x-SNAPSHOT   Confidence:High

juzu-plugins-upload-1.2.x-SNAPSHOT.jar

Description: The File Upload plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-upload/1.2.x-SNAPSHOT/juzu-plugins-upload-1.2.x-SNAPSHOT.jar
MD5: 171f88678e004dca75dc6d32b8c11ead
SHA1: 9daf827a472310b35a5da48f77d313273e089b55
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-upload:1.2.x-SNAPSHOT   Confidence:High

platform-extension-portlets-homepage-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-portlets-homepage/5.2.x-SNAPSHOT/platform-extension-portlets-homepage-5.2.x-SNAPSHOT.war
MD5: 877da34789e3a20fbb3f1f974aacc133
SHA1: 0b33980444ccb7abe1dec74fb51791954beb0a6f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-portlets-homepage:5.2.x-SNAPSHOT   Confidence:High

aopalliance-1.0.jar

Description: AOP Alliance

License:

Public Domain
File Path: /home/ciagent/.m2/repository/aopalliance/aopalliance/1.0/aopalliance-1.0.jar
MD5: 04177054e180d09e3998808efa0401c7
SHA1: 0235ba8b489512805ac13a8f9ea77a1ca5ebe3e8
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

guice-3.0.jar

Description: Guice is a lightweight dependency injection framework for Java 5 and above

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/google/inject/guice/3.0/guice-3.0.jar
MD5: ca1c7ba366884cfcd2cfb48d2395c400
SHA1: 9d84f15fe35e2c716a02979fb62f50a29f38aefa
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

guice-multibindings-3.0.jar

Description: Guice is a lightweight dependency injection framework for Java 5 and above

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/google/inject/extensions/guice-multibindings/3.0/guice-multibindings-3.0.jar
MD5: 4be1e91408e173eb10ed53a1a565a793
SHA1: 5e670615a927571234df68a8b1fe1a16272be555
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-codec-1.10.jar

Description:  The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar
MD5: 353cf6a2bdba09595ccfa073b78c7fcb
SHA1: 4b95f4897fa13f2cd904aee711aeafc0c5295cd8
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

guava-18.0.jar

Description:  Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more. Guava has only one code dependency - javax.annotation, per the JSR-305 spec.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/google/guava/guava/18.0/guava-18.0.jar
MD5: 947641f6bb535b1d942d1bc387c45290
SHA1: cce0823396aa693798f8882e64213b1772032b09
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2018-10237  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable.

Vulnerable Software & Versions: (show all)

oauth-provider-20100527.jar

File Path: /home/ciagent/.m2/repository/net/oauth/core/oauth-provider/20100527/oauth-provider-20100527.jar
MD5: afdc85d3f14481e4842c317c4f414f7e
SHA1: 165bfc97e63e5af8e052a47f4dee832ce06bf7d7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

oauth-consumer-20090617.jar

File Path: /home/ciagent/.m2/repository/net/oauth/core/oauth-consumer/20090617/oauth-consumer-20090617.jar
MD5: f0e2849d152f4d8bf725aa4e11b8f969
SHA1: fb70a4c98119c27e78320c5e42a99f0b9eb7c356
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: net.oauth.core:oauth-consumer:20090617   Confidence:High

oauth-httpclient4-20090913.jar

File Path: /home/ciagent/.m2/repository/net/oauth/core/oauth-httpclient4/20090913/oauth-httpclient4-20090913.jar
MD5: 577e1f28c28bc5006b8adcf838ffd46d
SHA1: a42f9135d3d72e77274982c4aa14fa0f4dab882f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: net.oauth.core:oauth-httpclient4:20090913   Confidence:High

httpcore-4.3.3.jar

Description:  HttpComponents Core (blocking I/O)

File Path: /home/ciagent/.m2/repository/org/apache/httpcomponents/httpcore/4.3.3/httpcore-4.3.3.jar
MD5: c26171852f9810cd3d2416604a387e71
SHA1: f91b7a4aadc5cf486df6e4634748d7dd7a73f06d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

httpclient-4.3.6.jar

Description:  HttpComponents Client

File Path: /home/ciagent/.m2/repository/org/apache/httpcomponents/httpclient/4.3.6/httpclient-4.3.6.jar
MD5: 2d29a27bb6c6b44bc8a608a0e5d09735
SHA1: 4c47155e3e6c9a41a28db36680b828ced53b8af4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

platform-extension-portlets-platformNavigation-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-portlets-platformNavigation/5.2.x-SNAPSHOT/platform-extension-portlets-platformNavigation-5.2.x-SNAPSHOT.war
MD5: e13db9312e3efe1f17bd54acf87edc14
SHA1: d57782824a17308e81d5ac0355aa3a612b0d98b5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-portlets-platformNavigation:5.2.x-SNAPSHOT   Confidence:High

calendar-component-create-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-component-create/5.2.x-SNAPSHOT/calendar-component-create-5.2.x-SNAPSHOT.jar
MD5: e86b6fb835ad4ccf6054d417cc367750
SHA1: 6cbe36386e18c01469a107360362cb14a4a440f7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-component-create:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-seo-5.2.x-SNAPSHOT.jar

Description: eXo SEO Portlet Java Content

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui-seo/5.2.x-SNAPSHOT/ecms-core-webui-seo-5.2.x-SNAPSHOT.jar
MD5: 83e8f9da8df1d0d68e2a9bfb585d73a9
SHA1: ec7046fd0b693c69d40795e2624fbae56b1aab46
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui-seo:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:content_project:content:5.2.20181206   Confidence:Low   

forum-application-create-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-application-create/5.2.x-SNAPSHOT/forum-application-create-5.2.x-SNAPSHOT.jar
MD5: 30672e78a25006e85ec3cd7216f66490
SHA1: 52037f891b3136d26ea6d54b5fdb3e404e0a36dd
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-application-create:5.2.x-SNAPSHOT   Confidence:High

platform-component-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-common/5.2.x-SNAPSHOT/platform-component-common-5.2.x-SNAPSHOT.jar
MD5: e367991aca07143c11e0564fac41abbc
SHA1: 40a71d53dc446f863f8e88d92002dcb0ab221134
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-common:5.2.x-SNAPSHOT   Confidence:High

platform-component-uxpnavigation-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-uxpnavigation/5.2.x-SNAPSHOT/platform-component-uxpnavigation-5.2.x-SNAPSHOT.jar
MD5: e775a49fa61daf7176e7f988f91d0d7e
SHA1: f08249cffd82b9abdd14c7412b2f8fef0fd160ce
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-uxpnavigation:5.2.x-SNAPSHOT   Confidence:High

platform-component-webui-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-webui/5.2.x-SNAPSHOT/platform-component-webui-5.2.x-SNAPSHOT.jar
MD5: dcbe87420627888885e5d9edb644b93d
SHA1: 6c0bcbf8a9d53659a44455b19a45e5505d818f4c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-webui:5.2.x-SNAPSHOT   Confidence:High

social-component-webui-5.2.x-SNAPSHOT.jar

Description: eXo Social Web UI Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-webui/5.2.x-SNAPSHOT/social-component-webui-5.2.x-SNAPSHOT.jar
MD5: b3ca17a05a7d4cfcb51ddeb753d84fe4
SHA1: 01511f9b4805de6eb0eac64d8ead16d6a730e935
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-webui:5.2.x-SNAPSHOT   Confidence:High

chromattic.common-1.3.0.jar

Description: Chromattic Framework Common

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.common/1.3.0/chromattic.common-1.3.0.jar
MD5: 15bfb4cc0312aefffb25952cdf18b2cd
SHA1: 55470175c1ba46a917504acf97018e6ef2932659
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

chromattic.metamodel-1.3.0.jar

Description: Chromattic Framework Metamodel

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.metamodel/1.3.0/chromattic.metamodel-1.3.0.jar
MD5: 0d534975c688ebabbc232601c6bc13da
SHA1: fbaa10037faf34a2d4d8eeb4e6b5ce28c95a9455
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jboss-logging-annotations-1.2.0.Beta1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/logging/jboss-logging-annotations/1.2.0.Beta1/jboss-logging-annotations-1.2.0.Beta1.jar
MD5: 938e552e319015a8863dd91284aada54
SHA1: 2f437f37bb265d9f8f1392823dbca12d2bec06d6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

hibernate-commons-annotations-4.0.5.Final.jar

Description: Common reflection code used in support of annotation processing

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/hibernate/common/hibernate-commons-annotations/4.0.5.Final/hibernate-commons-annotations-4.0.5.Final.jar
MD5: 5dadbafd7c7bc1168c10a2ba87e927a2
SHA1: 2a581b9edb8168e45060d8bad8b7f46712d2c52c
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jackson-databind-2.3.1.jar

Description: General data-binding functionality for Jackson: works on core streaming API

License:

http://www.apache.org/licenses/LICENSE-2.0.txt, http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.1/jackson-databind-2.3.1.jar
MD5: 4de637793707fdecb1b7a90f677103ec
SHA1: c4096a8323bbbcbeda072e3def123a9b66783361
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2017-15095  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.

Vulnerable Software & Versions: (show all)

CVE-2017-17485  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

Vulnerable Software & Versions: (show all)

CVE-2017-7525  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.

Vulnerable Software & Versions: (show all)

CVE-2018-5968  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-184 Incomplete Blacklist

FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.

Vulnerable Software & Versions: (show all)

CVE-2018-7489  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-184 Incomplete Blacklist

FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.

Vulnerable Software & Versions: (show all)

social-component-service-5.2.x-SNAPSHOT.jar

Description: eXo Social Service Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-service/5.2.x-SNAPSHOT/social-component-service-5.2.x-SNAPSHOT.jar
MD5: 96ff2d4ffe4d745dfecac5f06fdd77fe
SHA1: b8722273ac707bfbe525c2b30eeea0c07a4c339c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-service:5.2.x-SNAPSHOT   Confidence:High

itext-2.1.7.jar

Description: iText, a free Java-PDF library

License:

Mozilla Public License: http://www.mozilla.org/MPL/MPL-1.1.html
File Path: /home/ciagent/.m2/repository/com/lowagie/itext/2.1.7/itext-2.1.7.jar
MD5: 7587a618197a065eac4a453d173d4ed6
SHA1: 892bfb3e97074a61123b3b2d7caa2db112750864
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

validation-api-1.1.0.Final.jar

Description:  Bean Validation API

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar
MD5: 4c257f52462860b62ab3cdab45f53082
SHA1: 8613ae82954779d518631e05daa73a6a954817d5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

sac-1.3.jar

Description: SAC is a standard interface for CSS parsers.

License:

The W3C Software License: http://www.w3.org/Consortium/Legal/copyright-software-19980720
File Path: /home/ciagent/.m2/repository/org/w3c/css/sac/1.3/sac-1.3.jar
MD5: eb04fa63fc70c722f2b8ec156166343b
SHA1: cdb2dcb4e22b83d6b32b93095f644c3462739e82
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cssparser-0.9.18.jar

Description: A CSS parser which implements SAC (the Simple API for CSS).

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/net/sourceforge/cssparser/cssparser/0.9.18/cssparser-0.9.18.jar
MD5: dc57713d4c7a54a569fc67529ce3b525
SHA1: 61c015378d27b5e245a5deb7a324c7e716b4706a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

bcmail-jdk15-1.45.jar

Description: The Bouncy Castle Java CMS and S/MIME APIs for handling the CMS and S/MIME protocols. This jar contains CMS and S/MIME APIs for JDK 1.5. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs. If the S/MIME API is used, the JavaMail API and the Java activation framework will also be needed.

License:

Bouncy Castle Licence: http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/bouncycastle/bcmail-jdk15/1.45/bcmail-jdk15-1.45.jar
MD5: 13321fc7eff7bcada7b4fedfb592025c
SHA1: 3aed7e642dd8d39dc14ed1dec3ff79e084637148
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

bcprov-jdk15-1.45.jar

Description: The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5.

License:

Bouncy Castle Licence: http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/bouncycastle/bcprov-jdk15/1.45/bcprov-jdk15-1.45.jar
MD5: 2062f8e3d15748443ea60a94b266371c
SHA1: 7741883cb07b4634e8b5fd3337113b6ea770a9bb
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:bouncycastle:bouncy-castle-crypto-package:1.45   Confidence:Low   
  • maven: org.bouncycastle:bcprov-jdk15:1.45    Confidence:Highest
  • cpe: cpe:/a:bouncycastle:bouncy_castle_crypto_package:1.45   Confidence:Low   

CVE-2015-7940  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."

Vulnerable Software & Versions: (show all)

bctsp-jdk15-1.45.jar

Description: The Bouncy Castle Java API for handling the Time Stamp Protocol (TSP). This jar contains the TSP API for JDK 1.5. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs.

License:

Bouncy Castle Licence: http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/bouncycastle/bctsp-jdk15/1.45/bctsp-jdk15-1.45.jar
MD5: 84a2c3383fc991fb9d3902e723d96b7a
SHA1: 60647c99cbcd06b27987cb07643fb68b10c2eb74
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

mchange-commons-java-0.2.3.4.jar

Description: a library of arguably useful Java utilities.

License:

GNU Lesser General Public License, Version 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
Eclipse Public License, Version 1.0: http://www.eclipse.org/org/documents/epl-v10.php
File Path: /home/ciagent/.m2/repository/com/mchange/mchange-commons-java/0.2.3.4/mchange-commons-java-0.2.3.4.jar
MD5: cc99f685b11309071e1e94fd758c372b
SHA1: 5eb5a801d96f65912bcf418a831fa23c663b029b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

c3p0-0.9.2.1.jar

Description: a JDBC Connection pooling / Statement caching library

License:

GNU Lesser General Public License, Version 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
Eclipse Public License, Version 1.0: http://www.eclipse.org/org/documents/epl-v10.php
File Path: /home/ciagent/.m2/repository/com/mchange/c3p0/0.9.2.1/c3p0-0.9.2.1.jar
MD5: 35085ff8cfaf6576d118ad4492236ae6
SHA1: 11b29ccb286d34eb804b7f6a3786809c9bd2e1b7
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

hibernate-c3p0-4.2.21.Final.jar

Description: A module of the Hibernate O/RM project

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-c3p0/4.2.21.Final/hibernate-c3p0-4.2.21.Final.jar
MD5: a020364e0f8e4997c889977e491d0084
SHA1: 838aaf84a93af3930c1e30d314a242f34aeee57a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo.core.component.organization.jdbc-5.2.x-SNAPSHOT.jar

Description: Implementation of JDBC Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.organization.jdbc/5.2.x-SNAPSHOT/exo.core.component.organization.jdbc-5.2.x-SNAPSHOT.jar
MD5: 9a1e62495872802d23bf75a401a0af20
SHA1: 5d715cda2e06a6acc6baa1cb27b0e2ca24c20eb0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.organization.jdbc:5.2.x-SNAPSHOT   Confidence:High

jrcs.rcs-0.4.2.jar

File Path: /home/ciagent/.m2/repository/org/suigeneris/jrcs.rcs/0.4.2/jrcs.rcs-0.4.2.jar
MD5: 39a0ad326f371e1b1b0b1f35cf0f6efb
SHA1: 50fde3e7078afa87aea35a11be3ee01e7805a103
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

flying-saucer-core-9.0.8.jar

Description: Flying Saucer is a CSS 2.1 renderer written in Java. This artifact contains the core rendering and layout code as well as Java2D output.

License:

GNU Lesser General Public License (LGPL), version 2.1 or later: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/org/xhtmlrenderer/flying-saucer-core/9.0.8/flying-saucer-core-9.0.8.jar
MD5: f95e2ae188539bb7c4d675c8c435660e
SHA1: 9c5a8fcd423e4a86d9f460a240f43911a5824a40
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

flying-saucer-pdf-9.0.8.jar

Description: Flying Saucer is a CSS 2.1 renderer written in Java. This artifact supports PDF output.

License:

GNU Lesser General Public License (LGPL), version 2.1 or later: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/org/xhtmlrenderer/flying-saucer-pdf/9.0.8/flying-saucer-pdf-9.0.8.jar
MD5: 7e9a77a1e8234ba5f1751376b7f152f9
SHA1: b7f04073f273918f81be38b1db1f3b2a93e7984b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

wiki-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-service/5.2.x-SNAPSHOT/wiki-service-5.2.x-SNAPSHOT.jar
MD5: 8b700c42dfca32c222a42e22acfb378f
SHA1: 99bcaaba57b74ae3b874806e807b848408b7972f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-service:5.2.x-SNAPSHOT   Confidence:High

wiki-macros-iframe-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-macros-iframe/5.2.x-SNAPSHOT/wiki-macros-iframe-5.2.x-SNAPSHOT.jar
MD5: bfe5ee8a7ef719ab4255286488a9c845
SHA1: b9c3a479625cd1dfbb93e2b831eabb3d07a0ade3
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-macros-iframe:5.2.x-SNAPSHOT   Confidence:High

jython-standalone-2.5.4-rc1.jar

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar
MD5: 947e7602dd7ff324e67b0557c088570d
SHA1: 2c7f8e1a5bcc210a686d15f372276365ccd5dffc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

pygments-1.6.jar

Description: pygments

License:

Simplified BSD License: http://www.opensource.org/licenses/BSD-2-Clause
File Path: /home/ciagent/.m2/repository/org/pygments/pygments/1.6/pygments-1.6.jar
MD5: a2522f9d0b69803307071c79d2e6f00f
SHA1: 0ca48ef8f443c2c01679414d15e2f2c525583a43
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jdom2-2.0.5.jar

Description:  A complete, Java-based solution for accessing, manipulating, and outputting XML data

License:

Similar to Apache License but with the acknowledgment clause removed: https://raw.github.com/hunterhacker/jdom/master/LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/jdom/jdom2/2.0.5/jdom2-2.0.5.jar
MD5: 302db3c65c38d3c10ef31bca76bd76b4
SHA1: 2001db51c131e555bafdb77fc52af6a9408c505e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

wiki-webui-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-webui/5.2.x-SNAPSHOT/wiki-webui-5.2.x-SNAPSHOT.jar
MD5: 0eb84dfcc493675e9c57ba55fd2efafa
SHA1: eea123872b04c4e92bc95fe183157d6b60532230
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-webui:5.2.x-SNAPSHOT   Confidence:High

common-common-2.2.2.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/common/common-common/2.2.2.Final/common-common-2.2.2.Final.jar
MD5: 8ce16b5e3991285cd27e553740d09d1f
SHA1: 44522d899e31a5a10dbd70f7b0ca2fe5a614f740
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

platform-extension-portlets-notification-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-portlets-notification/5.2.x-SNAPSHOT/platform-extension-portlets-notification-5.2.x-SNAPSHOT.war
MD5: 905e7f2559de5784d2941a0587142b3a
SHA1: 142d9c00ed3ce187a56d806b81289a44868da541
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-portlets-notification:5.2.x-SNAPSHOT   Confidence:High

platform-extension-resources-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-resources/5.2.x-SNAPSHOT/platform-extension-resources-5.2.x-SNAPSHOT.war
MD5: 5939225497f6114dc78be6399cca3f39
SHA1: 5b8fcd733534a70f9ab2cd84cb0aa2f8fcf021a1
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-resources:5.2.x-SNAPSHOT   Confidence:High

platform-extension-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-webapp/5.2.x-SNAPSHOT/platform-extension-webapp-5.2.x-SNAPSHOT.war
MD5: 1e93e3173a22335f2681d61e2a515656
SHA1: 1664c51fd870ff2fb7f1c5cdb992d71633a0794a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-webapp:5.2.x-SNAPSHOT   Confidence:High

juzu-plugins-validation-1.2.x-SNAPSHOT.jar

Description: The Validation plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-validation/1.2.x-SNAPSHOT/juzu-plugins-validation-1.2.x-SNAPSHOT.jar
MD5: f59f25500234fdc67f9c290467f19390
SHA1: 57aab7a5dd5ce937f535b535f68eede61c8b6b56
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-validation:1.2.x-SNAPSHOT   Confidence:High

protobuf-java-2.5.0.jar

Description:  Protocol Buffers are a way of encoding structured data in an efficient yet extensible format.

License:

New BSD license: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/com/google/protobuf/protobuf-java/2.5.0/protobuf-java-2.5.0.jar
MD5: a44473b98947e2a54c54e0db1387d137
SHA1: a10732c76bfacdbd633a7eb0f7968b1059a65dfa
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

less4j-1.4.0.jar

Description: Less language is an extension of css and less4j compiles it into regular css. It adds several dynamic features into css: variables, expressions, nested rules. Less4j is a port. The original compiler was written in JavaScript and is called less.js. The less language is mostly defined in less.js documentation/issues and by what less.js actually do. Links to less.js: * home page: http://lesscss.org/ * source code & issues: https://github.com/cloudhead/less.js

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
Eclipse Public License (EPL): http://www.eclipse.org/legal/epl-v10.html
Gnu General Public License, Version 3: http://www.gnu.org/licenses/gpl-3.0.html
File Path: /home/ciagent/.m2/repository/com/github/sommeri/less4j/1.4.0/less4j-1.4.0.jar
MD5: 599d020aa5e514142fc4acdfa0549ac8
SHA1: bce0d21fe039f12ffd2b8ac366ce7d9599ace27a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

juzu-plugins-less4j-1.2.x-SNAPSHOT.jar

Description: The Less4j plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-less4j/1.2.x-SNAPSHOT/juzu-plugins-less4j-1.2.x-SNAPSHOT.jar
MD5: 010b185c0908aa32714f84d4a0531ef2
SHA1: 58a000e96f5457431a2d07fdda662357a4b07f36
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-less4j:1.2.x-SNAPSHOT   Confidence:High

webjars-locator-0.4.jar

Description: WebJar Locator

License:

None: http://webjars.org
File Path: /home/ciagent/.m2/repository/org/webjars/webjars-locator/0.4/webjars-locator-0.4.jar
MD5: 396406ea3c611d1448cf4ecf62500dc4
SHA1: 238a9af5803c4ed4321dedd281a0b1e01b8f6e7b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

juzu-plugins-webjars-1.2.x-SNAPSHOT.jar

Description: The Webjars plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-webjars/1.2.x-SNAPSHOT/juzu-plugins-webjars-1.2.x-SNAPSHOT.jar
MD5: 82456cb6da3ab9b8c7d0c2ae58a485cc
SHA1: 89f546a3ff2594f20ff462c7f94e960863a1e272
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-webjars:1.2.x-SNAPSHOT   Confidence:High

jsr311-api-1.1.1.jar

License:

                CDDL License
            : http://www.opensource.org/licenses/cddl1.php
File Path: /home/ciagent/.m2/repository/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar
MD5: c9803468299ec255c047a280ddec510f
SHA1: 59033da2a1afd56af1ac576750a8d0b1830d59e6
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

chromattic.api-1.3.0.jar

Description: Chromattic Framework API

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.api/1.3.0/chromattic.api-1.3.0.jar
MD5: 11f2df6e3a3b4451719710c0f4c08103
SHA1: 4f60a9585bd6e68833eaaea1f1a615c682adbe27
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

reflext.api-1.1.0.jar

Description: The Reflext Framework API

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.api/1.1.0/reflext.api-1.1.0.jar
MD5: fe732172fa2fb5ae4b63866ef15da41f
SHA1: 28374c509099736aeedc52fef3d7b8e78238c2a0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

reflext.core-1.1.0.jar

Description: The Reflect Framework Core

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.core/1.1.0/reflext.core-1.1.0.jar
MD5: cc65231f60a70dec43a57ccba5adce81
SHA1: 56316a714b99d7ac85d23d0f1a4680149c3273d6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

reflext.spi-1.1.0.jar

Description: The Reflext Framework SPI

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.spi/1.1.0/reflext.spi-1.1.0.jar
MD5: 2c967ae0c3078d23b615f8825377f304
SHA1: 4df0428c39922079c53955602bce66735f9d20a8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

reflext.apt-1.1.0.jar

Description: The Reflext Framework Annotation Processing Tool Plugin

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.apt/1.1.0/reflext.apt-1.1.0.jar
MD5: e6bb0195d6cdd15b618939c78999ea4e
SHA1: 093ab21e03197c1c7a2d2d20da4d3dd34a60ac24
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

chromattic.apt-1.3.0.jar

Description: Chromattic Framework APT Plugin

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.apt/1.3.0/chromattic.apt-1.3.0.jar
MD5: 5f51682435a2e2014a9bd9c5936a5cc5
SHA1: f2e219c2b8e13983a26b4c3f4e8eb54d71730b4d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

chromattic.ext-1.3.0.jar

Description: Chromattic Framework Extensions

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.ext/1.3.0/chromattic.ext-1.3.0.jar
MD5: a8482bb9fe7572e77a58627251740ee1
SHA1: ea3bd25892c827d9b830aea768de69e200a93165
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

chromattic.spi-1.3.0.jar

Description: Chromattic Framework SPI

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.spi/1.3.0/chromattic.spi-1.3.0.jar
MD5: e440e3f5a8e5ad38720975546ab7f06d
SHA1: 64c36f826b832acab48fea793b7c70b019a46181
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

pc-api-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/pc/pc-api/5.2.x-SNAPSHOT/pc-api-5.2.x-SNAPSHOT.jar
MD5: 1b471e247697b16e3f409fa7934bd34c
SHA1: 10f199bcaed267fcdc24cec23cb4237bb048d83b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.pc:pc-api:5.2.x-SNAPSHOT   Confidence:High

picocontainer-1.1.jar

Description: Please refer to the main website for documentation.

File Path: /home/ciagent/.m2/repository/picocontainer/picocontainer/1.1/picocontainer-1.1.jar
MD5: 98f476491eed3b106b9a015f15bf5fda
SHA1: a2babe80a3af3a3672095341625e4a9ba4278c1b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

sso-integration-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/sso/sso-integration/5.2.x-SNAPSHOT/sso-integration-5.2.x-SNAPSHOT.jar
MD5: 458ff1890408c5ac829e1028986b4101
SHA1: 30d8537c4972243332db8e42aa9da7393ee2e569
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.sso:sso-integration:5.2.x-SNAPSHOT   Confidence:High

sso-agent-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/sso/sso-agent/5.2.x-SNAPSHOT/sso-agent-5.2.x-SNAPSHOT.jar
MD5: 29283a3108e6a37101e76e5dd7e1d2f0
SHA1: 65db2bc3b1828205ef004cf9312a7614e1969bec
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.sso:sso-agent:5.2.x-SNAPSHOT   Confidence:High

xmlpull-1.1.3.1.jar

License:

Public Domain: http://www.xmlpull.org/v1/download/unpacked/LICENSE.txt
File Path: /home/ciagent/.m2/repository/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar
MD5: cc57dacc720eca721a50e78934b822d2
SHA1: 2b8e230d2ab644e4ecaa94db7cdedbc40c805dfa
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

xstream-1.4.10.jar

Description: XStream is a serialization library from Java objects to XML and back.

License:

http://x-stream.github.io/license.html
File Path: /home/ciagent/.m2/repository/com/thoughtworks/xstream/xstream/1.4.10/xstream-1.4.10.jar
MD5: d00eec778910f95b26201395ac64cca0
SHA1: dfecae23647abc9d9fd0416629a4213a3882b101
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

ccpp-1.0.jar

Description:  To enable interoperability between web servers and access mechanisms, and to facilitate development of device independent web applications, this specification will define a set of APIs for processing CC/PP information.

License:

Sun Microsystems, Inc. Binary Code License Agreement: http://java.sun.com/j2ee/ccpp
File Path: /home/ciagent/.m2/repository/javax/ccpp/ccpp/1.0/ccpp-1.0.jar
MD5: c2139f1a4791279047beac43f8004e92
SHA1: c3d4ca935e954140e325c305126ca1866d6786dd
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

portals-bridges-common-1.0.4.jar

Description:  Apache Portals Bridges Common Utilties and Interfaces

File Path: /home/ciagent/.m2/repository/org/apache/portals/bridges/portals-bridges-common/1.0.4/portals-bridges-common-1.0.4.jar
MD5: ea12be4025e9b906f0d22b5ed130a1f5
SHA1: c7ee4640a35fc158cf8c4a645b8e3e21ca3b52ff
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

asm-3.1.jar

File Path: /home/ciagent/.m2/repository/asm/asm/3.1/asm-3.1.jar
MD5: b9b8d2d556f9458aac8c463fd511f86d
SHA1: c157def142714c544bdea2e6144645702adf7097
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

cglib-2.2.jar

License:

ASF 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/cglib/cglib/2.2/cglib-2.2.jar
MD5: 54bd85d9ebe3f194edba210fe0e5f255
SHA1: 97d03461dc1c04ffc636dcb2579aae7724a78ef2
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

chromattic.cglib-1.3.0.jar

Description: Chromattic Framework CGLib Plugin

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.cglib/1.3.0/chromattic.cglib-1.3.0.jar
MD5: a81fd6fb445a53cc9a1f6e4565674c7f
SHA1: 082e032bfca75a8481bd3cd747beba603ac677b5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

javaparser-1.0.8.jar

Description: A Java 1.5 Parser with AST generation and visitor support. The AST records the source code structure, javadoc and comments. It is also possible to change the AST nodes or create new ones to modify the source code.

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/com/google/code/javaparser/javaparser/1.0.8/javaparser-1.0.8.jar
MD5: 32228e53ef6cc2ebe515bc40d7c9a4f9
SHA1: 9ca2f8ef2233babc53a8c2b6bb21869d94f5fcc1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: com.google.code.javaparser:javaparser:1.0.8   Confidence:High

chromattic.groovy-1.3.0.jar

Description: Chromattic Framework Groovy

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.groovy/1.3.0/chromattic.groovy-1.3.0.jar
MD5: 0380f4b86e1af34ce3ad4f2861a0b059
SHA1: 744c2bb6f74a9bf3d35ffd6ba3540635ce129337
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

reflext.jlr-1.1.0.jar

Description: The Reflext Framework Java Lang Reflect Plugin

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.jlr/1.1.0/reflext.jlr-1.1.0.jar
MD5: 1103f3b1ed3762e0bd100cbee6e7f345
SHA1: 79ad1a5053213cbb350d37ff12d5f767243c8c46
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

chromattic.dataobject-1.3.0.jar

Description: Chromattic Data Object

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.dataobject/1.3.0/chromattic.dataobject-1.3.0.jar
MD5: 3e09c98edcb4ccf64e065e55023e1f18
SHA1: 572d95530907c9a738a2580dc539636a1a519b77
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-search-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-search/5.2.x-SNAPSHOT/commons-search-5.2.x-SNAPSHOT.jar
MD5: 30c29086b15a71f7f5fbf6eb3e194047
SHA1: 58da165383a644979b387b63e847fa1f35020345
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:pro_search:pro_search:5.2.20181206   Confidence:Low   
  • maven: org.exoplatform.commons:commons-search:5.2.x-SNAPSHOT   Confidence:High

commons-file-storage-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-file-storage/5.2.x-SNAPSHOT/commons-file-storage-5.2.x-SNAPSHOT.jar
MD5: de6a0ddae622bd4ad90a414073a89495
SHA1: 98b1a671c2125a1d450a6a6cba7d9e9fb0b3a967
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-file-storage:5.2.x-SNAPSHOT   Confidence:High

jboss-logging-3.3.0.Final.jar

Description: The JBoss Logging Framework

License:

Apache License, version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar
MD5: bc11af4b8ce7138cdc79b7ba8561638c
SHA1: 3616bb87707910296e2c195dc016287080bba5af
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo.core.component.database-5.2.x-SNAPSHOT.jar

Description: Implementation of Database Service of Exoplatform SAS eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.database/5.2.x-SNAPSHOT/exo.core.component.database-5.2.x-SNAPSHOT.jar
MD5: fd39f2923a8c75f9ad143f24474c4bed
SHA1: d0351f937103804f37e3aa17ec3244457ad73732
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.database:5.2.x-SNAPSHOT   Confidence:High

integ-calendar-social-5.2.x-SNAPSHOT.jar

Description: Calendar with Social activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-calendar-social/5.2.x-SNAPSHOT/integ-calendar-social-5.2.x-SNAPSHOT.jar
MD5: 3cfa3c3b9946883e0003a0b53a91ea27
SHA1: 6f0d36d588f1f28c287fe3603e5db7fa713962fd
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-calendar-social:5.2.x-SNAPSHOT   Confidence:High

integ-ecms-social-5.2.x-SNAPSHOT.jar

Description: ECMS with Social activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-ecms-social/5.2.x-SNAPSHOT/integ-ecms-social-5.2.x-SNAPSHOT.jar
MD5: 7c7b755243bf2610e517f1f9fc47319d
SHA1: 25932c061870bd26da202634c7cb4ae92f9294ea
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-ecms-social:5.2.x-SNAPSHOT   Confidence:High

integ-forum-social-5.2.x-SNAPSHOT.jar

Description: Forum with Social activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-forum-social/5.2.x-SNAPSHOT/integ-forum-social-5.2.x-SNAPSHOT.jar
MD5: b6b22c502e365817b06e0d427c881c3c
SHA1: 5049d09f46644126474fda1bafdc0e7672fd9f4b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-forum-social:5.2.x-SNAPSHOT   Confidence:High

integ-social-ecms-5.2.x-SNAPSHOT.jar

Description: Select document to public on activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-social-ecms/5.2.x-SNAPSHOT/integ-social-ecms-5.2.x-SNAPSHOT.jar
MD5: 76388e9eaf71c93ab9518042df2bfa3b
SHA1: dc729cc1b073a9509203a60f297d41929237a947
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-social-ecms:5.2.x-SNAPSHOT   Confidence:High

integ-wiki-social-5.2.x-SNAPSHOT.jar

Description: Wiki with Social activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-wiki-social/5.2.x-SNAPSHOT/integ-wiki-social-5.2.x-SNAPSHOT.jar
MD5: f62914f424c0e04cf4c1093106c2cde1
SHA1: 199bde16dfc5a9ab4747ecabc026516f29ee2fe9
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-wiki-social:5.2.x-SNAPSHOT   Confidence:High

platform-component-gadgets-5.2.x-SNAPSHOT.jar

Description: Populate gadgets for user dashboard and GadgetRegistry

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-gadgets/5.2.x-SNAPSHOT/platform-component-gadgets-5.2.x-SNAPSHOT.jar
MD5: 781640aba2d9e9ca0c515938ee2b843f
SHA1: 179156c83443abef0f329ab0bdb5bf12ad21d992
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:user_dashboard_project:user_dashboard:5.2.20181206   Confidence:Low   
  • maven: org.exoplatform.platform:platform-component-gadgets:5.2.x-SNAPSHOT   Confidence:High

platform-component-organization-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-organization/5.2.x-SNAPSHOT/platform-component-organization-5.2.x-SNAPSHOT.jar
MD5: 148b7db8cb86f06fd1e9e376daf9ad3b
SHA1: 92be7aa5507afba15be02cbe96b17a4479e151b0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-organization:5.2.x-SNAPSHOT   Confidence:High

platform-extension-config-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-config/5.2.x-SNAPSHOT/platform-extension-config-5.2.x-SNAPSHOT.jar
MD5: ea62a517b8e8077e9e36e2b1e7922dac
SHA1: 23fe1e7c56bc2866545e5f44547e3415c26a235b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-config:5.2.x-SNAPSHOT   Confidence:High

exo.ws.rest.core-5.2.x-SNAPSHOT.jar

Description: Implementation of REST Core for Exoplatform SAS 'Web Services' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/ws/exo.ws.rest.core/5.2.x-SNAPSHOT/exo.ws.rest.core-5.2.x-SNAPSHOT.jar
MD5: 3a67ea83963aa3673b5777fcbf7871f7
SHA1: dc6c91ef619cae938a70665b713177a29f21947f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ws:exo.ws.rest.core:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:ws_project:ws:5.2   Confidence:Low   

redirect-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/gatein/web/redirect/5.2.x-SNAPSHOT/redirect-5.2.x-SNAPSHOT.jar
MD5: 0d9388684ad0d72617af874c8e24a628
SHA1: ee0f8a5df2945abc80f2918a7ee7bf327da22a5c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2014-8304  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in In-Portal CMS 5.2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the next_template parameter to admin/index.php.

Vulnerable Software & Versions:

hibernate-validator-4.2.0.Final.jar

Description: Hibernate's Bean Validation (JSR-303) reference implementation.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-validator/4.2.0.Final/hibernate-validator-4.2.0.Final.jar
MD5: 2b6b64bce7156ca6e9b7f5e6a0a6de7c
SHA1: eac2db0a9d86a9749724fe93d43afffa8106f25e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2014-3558  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

ReflectionHelper (org.hibernate.validator.util.ReflectionHelper) in Hibernate Validator 4.1.0 before 4.2.1, 4.3.x before 4.3.2, and 5.x before 5.1.2 allows attackers to bypass Java Security Manager (JSM) restrictions and execute restricted reflection calls via a crafted application.

Vulnerable Software & Versions: (show all)

platform-sample-acme-intranet-portlet-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-acme-intranet-portlet/5.2.x-SNAPSHOT/platform-sample-acme-intranet-portlet-5.2.x-SNAPSHOT.war
MD5: d2c852afb23197c71fde84154b1a4748
SHA1: 27ebcb3cfef4c6f7fee7867b0a40e7c044fb7269
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-acme-intranet-portlet:5.2.x-SNAPSHOT   Confidence:High

platform-sample-acme-intranet-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-acme-intranet-webapp/5.2.x-SNAPSHOT/platform-sample-acme-intranet-webapp-5.2.x-SNAPSHOT.war
MD5: 6ecbe09035b3f9b3e295dbf2e4f479b8
SHA1: 6cfafd52be81b64267fe8b316565b94ca071ff5e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-acme-intranet-webapp:5.2.x-SNAPSHOT   Confidence:High

platform-sample-gadgets-sample-exo-gadget-resources-5.2.x-SNAPSHOT.war

Description: eXo gadget resources

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-gadgets-sample-exo-gadget-resources/5.2.x-SNAPSHOT/platform-sample-gadgets-sample-exo-gadget-resources-5.2.x-SNAPSHOT.war
MD5: 9ecf9dfe609fdde2e9e40d7814685eba
SHA1: 04608ab50e1afa0efd2ae0b12c2fc17d10b28911
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-gadgets-sample-exo-gadget-resources:5.2.x-SNAPSHOT   Confidence:High

platform-sample-gadgets-sample-gadgets-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-gadgets-sample-gadgets/5.2.x-SNAPSHOT/platform-sample-gadgets-sample-gadgets-5.2.x-SNAPSHOT.war
MD5: 7ed11acd76153a77b0b0a2648b456884
SHA1: 96e0e321534a921fcf5f1b7c63553f702f7d820d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-gadgets-sample-gadgets:5.2.x-SNAPSHOT   Confidence:High

platform-sample-gadgets-sample-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-gadgets-sample-service/5.2.x-SNAPSHOT/platform-sample-gadgets-sample-service-5.2.x-SNAPSHOT.jar
MD5: 5deb45c6d53f902e06b8bdcbe2d68030
SHA1: 840279efefd3379f240b56cd21f057376691a130
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-gadgets-sample-service:5.2.x-SNAPSHOT   Confidence:High

platform-registration-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-registration/5.2.x-SNAPSHOT/platform-registration-5.2.x-SNAPSHOT.war
MD5: 52db4d867ac331425f6b7adc43e9861e
SHA1: 8d58c2fc196b558fab49e6d9b0863bb50824331c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-registration:5.2.x-SNAPSHOT   Confidence:High

platform-ui-skin-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform-ui/platform-ui-skin/5.2.x-SNAPSHOT/platform-ui-skin-5.2.x-SNAPSHOT.war
MD5: a14aba27d3e8ea464e32bf9fa541e1db
SHA1: 26db53151c1c2fbc6202cb2bd5b66ba85dd945c9
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform-ui:platform-ui-skin:5.2.x-SNAPSHOT   Confidence:High

plf-root-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/distributions/plf-root-webapp/5.2.x-SNAPSHOT/plf-root-webapp-5.2.x-SNAPSHOT.war
MD5: 68778a47640572463da0e5458478fc97
SHA1: a938d11a026ca295b6a334307934cae4b866e164
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform.distributions:plf-root-webapp:5.2.x-SNAPSHOT   Confidence:High

social-extension-war-5.2.x-SNAPSHOT.war

Description: eXo Social Extension WAR

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-extension-war/5.2.x-SNAPSHOT/social-extension-war-5.2.x-SNAPSHOT.war
MD5: 0115b86c1e5d0d7d553d24654493bc83
SHA1: dc9a7d11f6be45974c38f997588c65221c81fce7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-extension-war:5.2.x-SNAPSHOT   Confidence:High

social-notification-extension-5.2.x-SNAPSHOT.war

Description: eXo Social Notification Extension

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-notification-extension/5.2.x-SNAPSHOT/social-notification-extension-5.2.x-SNAPSHOT.war
MD5: eb2c7e700d26ef7b6ab59b028c2ad8e0
SHA1: 33e338d072daa773cf6405797a7353b6b79f790f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-notification-extension:5.2.x-SNAPSHOT   Confidence:High

social-component-notification-5.2.x-SNAPSHOT.jar

Description: eXo Social Notification Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-notification/5.2.x-SNAPSHOT/social-component-notification-5.2.x-SNAPSHOT.jar
MD5: 75e6733e35b5505b993337f4ecbea39c
SHA1: 67372731f4155a025234e6a92e54dc556e52bc84
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-notification:5.2.x-SNAPSHOT   Confidence:High

social-component-core-jpa-5.2.x-SNAPSHOT.jar

Description: eXo Social Core JPA Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-core-jpa/5.2.x-SNAPSHOT/social-component-core-jpa-5.2.x-SNAPSHOT.jar
MD5: c71f8ce37598ac36d0e9c934d0965bb5
SHA1: 49272571d1cdbc091c897b4621c667b4d8fa1e28
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-core-jpa:5.2.x-SNAPSHOT   Confidence:High

social-extras-feedmash-5.2.x-SNAPSHOT.jar

Description: eXo Social Feedmash

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-extras-feedmash/5.2.x-SNAPSHOT/social-extras-feedmash-5.2.x-SNAPSHOT.jar
MD5: 3105c6dde2ffb69b009837c5dd529f4e
SHA1: d46902605c7f0889c867b53abb1a16a03a730a1b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-extras-feedmash:5.2.x-SNAPSHOT   Confidence:High

oauth-20100527.jar

File Path: /home/ciagent/.m2/repository/net/oauth/core/oauth/20100527/oauth-20100527.jar
MD5: 91c7c70579f95b7ddee95b2143a49b41
SHA1: a84c5331e225bc25a5a288db328048d6b1bb6fd5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

social-component-opensocial-5.2.x-SNAPSHOT.jar

Description: eXo Social OpenSocial Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-opensocial/5.2.x-SNAPSHOT/social-component-opensocial-5.2.x-SNAPSHOT.jar
MD5: a56d8c12db1cb2d274c25a79f28d8e3f
SHA1: 82dd6d6d603ac4978d7edfc034db031134a647f6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-opensocial:5.2.x-SNAPSHOT   Confidence:High

joda-time-2.4.jar

Description: Date and time library to replace JDK date handling

License:

Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/joda-time/joda-time/2.4/joda-time-2.4.jar
MD5: 1231c3e09de6aa5d6b6d9982c0224e20
SHA1: 89e9725439adffbbd41c5f5c215c136082b34a7f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

ehcache-core-2.6.9.jar

Description: This is the ehcache core module. Pair it with other modules for added functionality.

License:

The Apache Software License, Version 2.0: src/assemble/EHCACHE-CORE-LICENSE.txt
File Path: /home/ciagent/.m2/repository/net/sf/ehcache/ehcache-core/2.6.9/ehcache-core-2.6.9.jar
MD5: 521348c6da7c20dba2058917a6a8c0a9
SHA1: e892585cc2cf95d46a2533df438a1d3323034ae8
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

juel-impl-2.2.7.jar

File Path: /home/ciagent/.m2/repository/de/odysseus/juel/juel-impl/2.2.7/juel-impl-2.2.7.jar
MD5: c5d7a62edafb5706b6beadbbcfd8f57d
SHA1: 97958467acef4c2b230b72354a4eefc66628dd99
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

shindig-common-2.5.2.jar

Description: Common java code for Shindig

File Path: /home/ciagent/.m2/repository/org/apache/shindig/shindig-common/2.5.2/shindig-common-2.5.2.jar
MD5: 9deeebec74d0530849d5dd42e19ee9cd
SHA1: 8e3d0ee31607e7a18f20612ef705b32ab8eace2b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

caja-r5054.jar

Description:  Caja is a HTML/CSS/JavaScript compiler which allows websites to safely embed web applications from third parties, and enables rich interaction between the embedding page and the embedded applications using an object-capability security model.

License:

Apache 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/caja/caja/r5054/caja-r5054.jar
MD5: 7379ecf5bc7945ca6ab533b905e449a3
SHA1: 18b47afa0172413346d9c8ae1595b6ffbbddd499
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: com.google.caja:caja:r5054   Confidence:High

htmlparser-r4209.jar

Description:  A patched version of the nu.validator v1.2.1 HTML parser.

License:

No Warranty
File Path: /home/ciagent/.m2/repository/caja/htmlparser/r4209/htmlparser-r4209.jar
MD5: 31c18bc52991e53ed4eaa28347c44189
SHA1: 0573217e5c9bf8fad6ce827a94191ca0f5785087
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: caja:htmlparser:r4209   Confidence:High

nekohtml-1.9.22.jar

Description: An HTML parser and tag balancer.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.22/nekohtml-1.9.22.jar
MD5: a97dfe2d0ceb81ffbdd15436961b0f23
SHA1: 4f54af68ecb345f2453fb6884672ad08414154e3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

xercesImpl-2.9.1.jar

Description:  Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program.

File Path: /home/ciagent/.m2/repository/xerces/xercesImpl/2.9.1/xercesImpl-2.9.1.jar
MD5: f807f86d7d9db25edbfc782aca7ca2a9
SHA1: 7bc7e49ddfe4fb5f193ed37ecc96c12292c8ceb6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: xerces:xercesImpl:2.9.1    Confidence:Highest
  • cpe: cpe:/a:apache:xerces2_java:2.9.1   Confidence:Low   

CVE-2012-0881  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

Apache Xerces2 Java allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.

Vulnerable Software & Versions:

sanselan-0.97-incubator.jar

Description: Apache Sanselan is a pure-Java image library.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/sanselan/sanselan/0.97-incubator/sanselan-0.97-incubator.jar
MD5: 84f823e61d93fcedcb3c10a827c45989
SHA1: 8396778b076a2eaf62024b64f6d924e4e0095fca
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

social-webapp-portlet-5.2.x-SNAPSHOT.war

Description: eXo Social Portlet Web App

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-webapp-portlet/5.2.x-SNAPSHOT/social-webapp-portlet-5.2.x-SNAPSHOT.war
MD5: fea57cb8b021baeb87e24760ccfb5ccd
SHA1: 1a095732fb383fa0510943ef444445edd42bb07d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:app_project:app:5.2.20181206   Confidence:Low   
  • maven: org.exoplatform.social:social-webapp-portlet:5.2.x-SNAPSHOT   Confidence:High

CVE-2018-13661  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-190 Integer Overflow or Wraparound

The mintToken function of a smart contract implementation for APP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.

Vulnerable Software & Versions:

social-webapp-juzu-portlet-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-webapp-juzu-portlet/5.2.x-SNAPSHOT/social-webapp-juzu-portlet-5.2.x-SNAPSHOT.war
MD5: 91cabd6450473e6ad1abee2023c95884
SHA1: 64fb3021c1c5437d431656d4cc5be2c3b7b128ec
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-webapp-juzu-portlet:5.2.x-SNAPSHOT   Confidence:High

social-webapp-resources-5.2.x-SNAPSHOT.war

Description: eXo Social Resources Web App

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-webapp-resources/5.2.x-SNAPSHOT/social-webapp-resources-5.2.x-SNAPSHOT.war
MD5: 69d66a36ddbdae126c91243693cb007a
SHA1: 62abbc8485463bca716805df7706c2f7034d97a2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:app_project:app:5.2   Confidence:Low   
  • maven: org.exoplatform.social:social-webapp-resources:5.2.x-SNAPSHOT   Confidence:High

CVE-2018-13661  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-190 Integer Overflow or Wraparound

The mintToken function of a smart contract implementation for APP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.

Vulnerable Software & Versions:

wiki-upgrade-plugins-5.2.x-SNAPSHOT.jar

Description: eXo Wiki Upgrade Plugins

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-upgrade-plugins/5.2.x-SNAPSHOT/wiki-upgrade-plugins-5.2.x-SNAPSHOT.jar
MD5: 2fd9f331959cdc8944af94ce42d303c1
SHA1: b53bba04f1ca23eebdeefde35c71f2ab50466ae1
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-upgrade-plugins:5.2.x-SNAPSHOT   Confidence:High

wiki-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-webapp/5.2.x-SNAPSHOT/wiki-webapp-5.2.x-SNAPSHOT.war
MD5: 3f85996b17d460dc53c9a239fee99a7e
SHA1: 650377d94abe1dd455313944984f0bcac84a4f6b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-webapp:5.2.x-SNAPSHOT   Confidence:High

gwt-servlet-2.6.1.jar

Description:  Protocol Buffers are a way of encoding structured data in an efficient yet extensible format.

License:

New BSD license: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/com/google/gwt/gwt-servlet/2.6.1/gwt-servlet-2.6.1.jar
MD5: 46fa19a4859520cdf86c083e4c4519a4
SHA1: 983e26ec957ee3463f8554f4f03a58e16129e8f2
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

smartgwt-lgpl-6.0-p20170514.jar

File Path: /home/ciagent/.m2/repository/com/isomorphic/smartgwt/lgpl/smartgwt-lgpl/6.0-p20170514/smartgwt-lgpl-6.0-p20170514.jar
MD5: feef4d7601d4e2ca9cfdaa5315eb17c6
SHA1: b27485a980eca557785290c25f15349075e077b7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2015-6737  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the Widgets extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via vectors involving base64 encoded content.

Vulnerable Software & Versions:

jcommon-1.0.17.jar

Description:  JCommon is a free general purpose Java class library that is used in several projects at www.jfree.org, including JFreeChart and JFreeReport.

License:

GNU Lesser General Public Licence: http://www.gnu.org/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/org/jfree/jcommon/1.0.17/jcommon-1.0.17.jar
MD5: d123cd511e2ebc4542e8b424cd20bbde
SHA1: 7bcb68fde08258e59fe7bcc758c08af830fb2c1d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jfreechart-1.0.14.jar

Description:  JFreeChart is a class library, written in Java, for generating charts. Utilising the Java2D APIs, it currently supports bar charts, pie charts, line charts, XY-plots and time series plots.

License:

GNU Lesser General Public Licence: http://www.gnu.org/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/org/jfree/jfreechart/1.0.14/jfreechart-1.0.14.jar
MD5: e0ac6e8ecb858f946200b326209fe639
SHA1: fa67c798b0ae80b84f3854d69e341abacd3867c5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

velocity-1.7.jar

Description: Apache Velocity is a general purpose template engine.

File Path: /home/ciagent/.m2/repository/org/apache/velocity/velocity/1.7/velocity-1.7.jar
MD5: 3692dd72f8367cb35fb6280dc2916725
SHA1: 2ceb567b8f3f21118ecdec129fe1271dbc09aa7a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

velocity-tools-1.4.jar

File Path: /home/ciagent/.m2/repository/velocity-tools/velocity-tools/1.4/velocity-tools-1.4.jar
MD5: 2ef7ed8b728186558b5d587c38900b84
SHA1: 4e1f4d507030a00959f4c0c7fcc60b3565617d08
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

ezmorph-1.0.6.jar

Description:  Simple java library for transforming an Object to another Object.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/net/sf/ezmorph/ezmorph/1.0.6/ezmorph-1.0.6.jar
MD5: 1fa113c6aacf3a01af1449df77acd474
SHA1: 01e55d2a0253ea37745d33062852fd2c90027432
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

json-lib-2.4-jdk15.jar

File Path: /home/ciagent/.m2/repository/net/sf/json-lib/json-lib/2.4/json-lib-2.4-jdk15.jar
MD5: f5db294d05b3d5a5bfb873455b0a8626
SHA1: 136743e0d12df4e785e62b48618cee169b2ae546
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

commons-configuration-1.10.jar

Description: Tools to assist in the reading of configuration/preferences files in various formats.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-configuration/commons-configuration/1.10/commons-configuration-1.10.jar
MD5: b16511ce540fefd53981245f5f21c5f8
SHA1: 2b36e4adfb66d966c5aef2d73deb6be716389dc9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

snuggletex-core-1.1.0.jar

File Path: /home/ciagent/.m2/repository/uk/ac/ed/ph/snuggletex/snuggletex-core/1.1.0/snuggletex-core-1.1.0.jar
MD5: 1ea61a45bcb155a830d6a149f9f3f845
SHA1: 668865eca57ae9765b042558bc95522763333b70
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: uk.ac.ed.ph.snuggletex:snuggletex-core:1.1.0   Confidence:High

batik-css-1.7.jar

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/xmlgraphics/batik-css/1.7/batik-css-1.7.jar
MD5: b0203e64b3c06729baa0ef84743ab119
SHA1: e6bb5c85753331534593f33fb9236acb41a0ab79
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

CVE-2017-5662  

Severity: High
CVSS Score: 7.9 (AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

Vulnerable Software & Versions:

CVE-2018-8013  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

Vulnerable Software & Versions: (show all)

xmlgraphics-commons-1.3.1.jar

Description:  Apache XML Graphics Commons is a library that consists of several reusable components used by Apache Batik and Apache FOP. Many of these components can easily be used separately outside the domains of SVG and XSL-FO.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/xmlgraphics/xmlgraphics-commons/1.3.1/xmlgraphics-commons-1.3.1.jar
MD5: e63589601d939739349a50a029dab120
SHA1: f7d0fa54e2750acd82b1a241c043be6fce1bf0dc
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jeuclid-core-3.1.5.jar

Description: This is the core module containing the basic JEuclid rendering and document handling classes.

File Path: /home/ciagent/.m2/repository/net/sourceforge/jeuclid/jeuclid-core/3.1.5/jeuclid-core-3.1.5.jar
MD5: ef55609690f186df77611d25e79ae781
SHA1: e7b45abc13ba621b384b475ff6d10aa13e121b02
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

snuggletex-jeuclid-1.1.0.jar

File Path: /home/ciagent/.m2/repository/uk/ac/ed/ph/snuggletex/snuggletex-jeuclid/1.1.0/snuggletex-jeuclid-1.1.0.jar
MD5: 4b84195d37d3ad1ece60e9abb56e9bf7
SHA1: 14c790c08d2ca60b9067b5fd156ba01c83f25a3e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: uk.ac.ed.ph.snuggletex:snuggletex-jeuclid:1.1.0   Confidence:High

serializer-2.7.1.jar

Description:  Serializer to write out XML, HTML etc. as a stream of characters from an input DOM or from input SAX events.

File Path: /home/ciagent/.m2/repository/xalan/serializer/2.7.1/serializer-2.7.1.jar
MD5: a6b64dfe58229bdd810263fa0cc54cff
SHA1: 4b4b18df434451249bb65a63f2fb69e215a6a020
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

xalan-2.7.1.jar

Description:  Xalan-Java is an XSLT processor for transforming XML documents into HTML, text, or other XML document types. It implements XSL Transformations (XSLT) Version 1.0 and XML Path Language (XPath) Version 1.0 and can be used from the command line, in an applet or a servlet, or as a module in other program.

File Path: /home/ciagent/.m2/repository/xalan/xalan/2.7.1/xalan-2.7.1.jar
MD5: d43aad24f2c143b675292ccfef487f9c
SHA1: 75f1d83ce27bab5f29fff034fc74aa9f7266f22a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

wiki-jpa-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-jpa/5.2.x-SNAPSHOT/wiki-jpa-5.2.x-SNAPSHOT.jar
MD5: 9d6ef808a9816a88693bd53a5450a2bf
SHA1: 661d903422d845e4dbf363030ea8733a9d5ca8d7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-jpa:5.2.x-SNAPSHOT   Confidence:High

wiki-jpa-migration-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-jpa-migration/5.2.x-SNAPSHOT/wiki-jpa-migration-5.2.x-SNAPSHOT.jar
MD5: 24f566313a055101cc0f04e1a88eda49
SHA1: 6a4a7c3ca8787773aeb9d088ccd7025feed7f14c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-jpa-migration:5.2.x-SNAPSHOT   Confidence:High

gatein-management-api-2.1.0.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/management/gatein-management-api/2.1.0.Final/gatein-management-api-2.1.0.Final.jar
MD5: dde253e45fefd580cab7a4ee75c6d92e
SHA1: 5c73b152fe9497eb37386052f86bfa7ee7d33b87
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.management:gatein-management-api:2.1.0.Final   Confidence:High

jboss-dmr-1.1.1.Final.jar

File Path: /home/ciagent/.m2/repository/org/jboss/jboss-dmr/1.1.1.Final/jboss-dmr-1.1.1.Final.jar
MD5: d64cccf4531ef61115e70f3d8bb5e2e2
SHA1: 7506200d32c2bb0833969ab13e8a0e4795853198
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

gatein-management-core-2.1.0.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/management/gatein-management-core/2.1.0.Final/gatein-management-core-2.1.0.Final.jar
MD5: a03a655d42f401bc4eca6c95242808aa
SHA1: 146d88fc22a8c25021c62da29f6ec3b51aa1338f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.management:gatein-management-core:2.1.0.Final   Confidence:High

gatein-management-rest-2.1.0.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/management/gatein-management-rest/2.1.0.Final/gatein-management-rest-2.1.0.Final.jar
MD5: 77edd585db54a9c915b1c4a8241bf890
SHA1: e818a46b6f5b74c05a6e181c3ae9ea409b20109f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.management:gatein-management-rest:2.1.0.Final   Confidence:High

twitter4j-core-3.0.5.jar

Description: A Java library for the Twitter API

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/twitter4j/twitter4j-core/3.0.5/twitter4j-core-3.0.5.jar
MD5: e6c8d2b10c621b2bbd7809bad9cedca3
SHA1: c38ad47bc8ba5991886ce2c0e0acd76d0fdd6e6d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:twitter_project:twitter:3.0.5   Confidence:Low   
  • maven: org.twitter4j:twitter4j-core:3.0.5    Confidence:Highest
  • cpe: cpe:/a:twitter:twitter:3.0.5   Confidence:Low   

scribe-1.3.5.jar

Description: The best OAuth library out there

License:

MIT: http://github.com/fernandezpablo85/scribe-java/blob/master/LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/scribe/scribe/1.3.5/scribe-1.3.5.jar
MD5: 0abb910da19741cd84aabf5520385bc2
SHA1: a3b3deded9d241d9f2c8aa9c9bcd90ad29e2581e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:scribe:scribe:1.3.5   Confidence:Low   
  • maven: org.scribe:scribe:1.3.5    Confidence:Highest

google-http-client-1.14.1-beta.jar

Description:  Google HTTP Client Library for Java. Functionality that works on all supported Java platforms, including Java 5 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.

File Path: /home/ciagent/.m2/repository/com/google/http-client/google-http-client/1.14.1-beta/google-http-client-1.14.1-beta.jar
MD5: 8a3711522ebceef2531d455e2f04a639
SHA1: cb503d4021739e6bac39442ac87b4e311ec77b5e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jsr305-1.3.9.jar

Description: JSR305 Annotations for Findbugs

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar
MD5: 1d5a772e400b04bb67a7ef4a0e0996d8
SHA1: 40719ea6961c0cb6afaeb6a921eaa1f6afd4cfdf
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

google-oauth-client-1.14.1-beta.jar

Description:  Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 5 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.

File Path: /home/ciagent/.m2/repository/com/google/oauth-client/google-oauth-client/1.14.1-beta/google-oauth-client-1.14.1-beta.jar
MD5: 71feea1d54eb7878c12855b7c47ef289
SHA1: 7260cd30808a6d1d4ddef6250e3d92d814aaa4cb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

google-api-client-1.14.1-beta.jar

File Path: /home/ciagent/.m2/repository/com/google/api-client/google-api-client/1.14.1-beta/google-api-client-1.14.1-beta.jar
MD5: 6832804471d4d635ed74ae1fbd5d9d86
SHA1: e95d3b6e36fc67bffd7e71ef60bc5af623e73843
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jackson-core-asl-1.9.11.jar

Description: Jackson is a high-performance JSON processor (parser, generator)

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/codehaus/jackson/jackson-core-asl/1.9.11/jackson-core-asl-1.9.11.jar
MD5: 49801a6d43725d5c3a1a52ca021d7dc5
SHA1: e32303ef8bd18a5c9272780d49b81c95e05ddf43
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

google-http-client-jackson-1.14.1-beta.jar

File Path: /home/ciagent/.m2/repository/com/google/http-client/google-http-client-jackson/1.14.1-beta/google-http-client-jackson-1.14.1-beta.jar
MD5: 85d9f42910a68e85ff22d24805688da9
SHA1: 3cfc08bf4b0f62234ff69ff2a0b3c26d7e447829
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

google-api-services-plus-v1-rev69-1.14.2-beta.jar

File Path: /home/ciagent/.m2/repository/com/google/apis/google-api-services-plus/v1-rev69-1.14.2-beta/google-api-services-plus-v1-rev69-1.14.2-beta.jar
MD5: fbddf71619f41f1359f0b3abff442444
SHA1: a6c5cc69690a3bd7777025a65b0f1abe66112a5e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

google-api-services-oauth2-v2-rev36-1.14.2-beta.jar

File Path: /home/ciagent/.m2/repository/com/google/apis/google-api-services-oauth2/v2-rev36-1.14.2-beta/google-api-services-oauth2-v2-rev36-1.14.2-beta.jar
MD5: cd2ac31ad0317e53e660c2a4578749f3
SHA1: c7249e1e4832f6e6585f7b7db307585b3ae53881
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

platform-component-oauth-auth-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-oauth-auth/5.2.x-SNAPSHOT/platform-component-oauth-auth-5.2.x-SNAPSHOT.jar
MD5: f95c574b158dffaa5d3d03b9786f96e1
SHA1: d95816374e4f6420ba27992a0db55c42d05c6cee
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-oauth-auth:5.2.x-SNAPSHOT   Confidence:High

pc-portlet-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/pc/pc-portlet/5.2.x-SNAPSHOT/pc-portlet-5.2.x-SNAPSHOT.jar
MD5: af68e2f8b0ef85a06be313a1ad8ac7eb
SHA1: 3f4219d91935dc28eb6ed8ca92f72def7254d4ba
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.pc:pc-portlet:5.2.x-SNAPSHOT   Confidence:High

gatein-cdi-injection-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/gatein/cdi/gatein-cdi-injection/5.2.x-SNAPSHOT/gatein-cdi-injection-5.2.x-SNAPSHOT.jar
MD5: fc9d36b33ca5c287f9393029332c3bc7
SHA1: b4dd6a2fba1455f7f7d998d95559d751ae034428
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.cdi:gatein-cdi-injection:5.2.x-SNAPSHOT   Confidence:High

gatein-cdi-contexts-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/gatein/cdi/gatein-cdi-contexts/5.2.x-SNAPSHOT/gatein-cdi-contexts-5.2.x-SNAPSHOT.jar
MD5: 763df7285543e9d98c413d81accf7af4
SHA1: 9cfc96a5b6172f3264c83702bdbbb0df67c32c12
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.cdi:gatein-cdi-contexts:5.2.x-SNAPSHOT   Confidence:High

platform-welcome-screens-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-welcome-screens-webapp/5.2.x-SNAPSHOT/platform-welcome-screens-webapp-5.2.x-SNAPSHOT.war
MD5: 5c6607ee9a80bac1b8603d9cb7d3f928
SHA1: 059f58dadae0a249c82b23c7193221d5be7ffe67
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-welcome-screens-webapp:5.2.x-SNAPSHOT   Confidence:High

platform-welcome-screens-component-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-welcome-screens-component/5.2.x-SNAPSHOT/platform-welcome-screens-component-5.2.x-SNAPSHOT.jar
MD5: ab2cb2b2caeeeaa346f1031c38533be1
SHA1: 2a144d6fddd8a0abaf670a1b05c51d6a4c48a9d0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-welcome-screens-component:5.2.x-SNAPSHOT   Confidence:High

platform-component-edition-enterprise-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-edition-enterprise/5.2.x-SNAPSHOT/platform-component-edition-enterprise-5.2.x-SNAPSHOT.jar
MD5: 272eb0acf9a451f7a100ea1083defab2
SHA1: b19e0bfab47d5055ef1d8a8e37a51bae77494bba
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-edition-enterprise:5.2.x-SNAPSHOT   Confidence:High

liquibase-slf4j-2.0.0.jar

Description: Liquibase SLF4J Logger

License:

MIT License: http://www.opensource.org/licenses/mit-license.html
File Path: /home/ciagent/.m2/repository/com/mattbertolini/liquibase-slf4j/2.0.0/liquibase-slf4j-2.0.0.jar
MD5: c0de626cfee6e91f2fe3f28aca48a6f9
SHA1: 15d0d15b546ef66caf3385a3c13aeb75663b3ba4
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

snakeyaml-1.13.jar

Description: YAML 1.1 parser and emitter for Java

License:

Apache License Version 2.0: LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/yaml/snakeyaml/1.13/snakeyaml-1.13.jar
MD5: 88e239ab48632e2eab576ee86f56c47e
SHA1: 73cbb494a912866c4c831a178c3a2a9169f4eaad
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

plf-enterprise-jbosseap-ear-5.2.x-SNAPSHOT.ear

File Path: /home/ciagent/.m2/repository/com/exoplatform/platform/distributions/plf-enterprise-jbosseap-ear/5.2.x-SNAPSHOT/plf-enterprise-jbosseap-ear-5.2.x-SNAPSHOT.ear
MD5: 3dfa74349468baefe2850ea112b0b12d
SHA1: c9dec07937172133d4e56bc9e7da72a21ebfc14b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided

Identifiers

  • None

plf-exo-tools-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/distributions/plf-exo-tools/5.2.x-SNAPSHOT/plf-exo-tools-5.2.x-SNAPSHOT.jar
MD5: e5b9c9742dd6b4fff95fae12b657b35f
SHA1: 77e34330e52401401de404e90b9d2e47d9ced7e5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform.distributions:plf-exo-tools:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:form_tools:form_tools:5.2.20181207   Confidence:Low   

exo-lgpl-license-resource-bundle-2.jar

Description: Header Texts and others License resources

File Path: /home/ciagent/.m2/repository/org/exoplatform/resources/exo-lgpl-license-resource-bundle/2/exo-lgpl-license-resource-bundle-2.jar
MD5: 51f6110e482a3bb59e2920e61284f440
SHA1: 5e0e93e2f9d4a62747ed8642dda37799644061fc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.resources:exo-lgpl-license-resource-bundle:2   Confidence:High

hsqldb-2.4.0.jar

Description: HSQLDB - Lightweight 100% Java SQL Database Engine

License:

HSQLDB License, a BSD open source license: http://hsqldb.org/web/hsqlLicense.html
File Path: /home/ciagent/.m2/repository/org/hsqldb/hsqldb/2.4.0/hsqldb-2.4.0.jar
MD5: 72cae1d3ef411edc74bc3ff4d12bd47c
SHA1: 195957160ed990dbc798207c0d577280d9919208
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war
MD5: 7999ce99a3c172064cec5f5f569d377a
SHA1: ed3e19ae6a06db799d9af96f84bed894f32986d9
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.exo-es-embedded:exo-es-embedded-war:2.2.x-SNAPSHOT   Confidence:High

enterprise-ui-skin-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/enterprise-skin/enterprise-ui-skin/5.2.x-SNAPSHOT/enterprise-ui-skin-5.2.x-SNAPSHOT.war
MD5: 43a0f0814bbc96bbc35546bba37db4db
SHA1: dc5d19efb10330de6de8de46586ae65b4d984137
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.enterprise-skin:enterprise-ui-skin:5.2.x-SNAPSHOT   Confidence:High

wci-wildfly11-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/wci/wci-wildfly11/5.2.x-SNAPSHOT/wci-wildfly11-5.2.x-SNAPSHOT.jar
MD5: 1bcea18783890c26f17d4a1ca68537cb
SHA1: 99c2236ba6b4fabdcb96840cd53e14982402ce1b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile

Identifiers

  • maven: org.exoplatform.gatein.wci:wci-wildfly11:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:5.2   Confidence:Low   

logback-core-1.1.2.jar

Description: logback-core module

License:

Eclipse Public License - v 1.0: http://www.eclipse.org/legal/epl-v10.html
GNU Lesser General Public License: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/ch/qos/logback/logback-core/1.1.2/logback-core-1.1.2.jar
MD5: ae3b1f69540d87c5bb68260818764fe3
SHA1: 2d23694879c2c12f125dac5076bdfd5d771cc4cb
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2017-5929  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.

Vulnerable Software & Versions:

tomcat-catalina-jmx-remote-8.5.35.jar

Description: Tomcat Remote JMX listener

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat-catalina-jmx-remote/8.5.35/tomcat-catalina-jmx-remote-8.5.35.jar
MD5: 768800849b0f32c50fce24cc8674e884
SHA1: 37a100c47c8ecca4ff78ca279a95adeefe53889d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

commons-compiler-2.6.1.jar

File Path: /home/ciagent/.m2/repository/org/codehaus/janino/commons-compiler/2.6.1/commons-compiler-2.6.1.jar
MD5: 502720f1e3cb359c54f794b718cc8b73
SHA1: f81764c6e9199c3ba1b2c525408734c45e772494
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

janino-2.6.1.jar

File Path: /home/ciagent/.m2/repository/org/codehaus/janino/janino/2.6.1/janino-2.6.1.jar
MD5: 88f965703a684a89f42094bfc20113eb
SHA1: 454255eb300ab38db19dd23c1f7ba5168bb646ab
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

plf-tomcat-integration-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/distributions/plf-tomcat-integration-webapp/5.2.x-SNAPSHOT/plf-tomcat-integration-webapp-5.2.x-SNAPSHOT.war
MD5: 200c38c1428647ece3fd97a51201d805
SHA1: ae3497fb3ad3e4b7a050f531b5a71c2249a2719e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform.distributions:plf-tomcat-integration-webapp:5.2.x-SNAPSHOT   Confidence:High

wci-tomcat8-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/wci/wci-tomcat8/5.2.x-SNAPSHOT/wci-tomcat8-5.2.x-SNAPSHOT.jar
MD5: f284d1045f5d155dacff7181b855936b
SHA1: 6c264b291538bf42f6aead6ebe57074fc6a6fc70
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.wci:wci-tomcat8:5.2.x-SNAPSHOT   Confidence:High

plf-tomcat-pc-creator-listener-5.2.x-SNAPSHOT.jar

Description: This module defines a LifecycleListener to attach to a Tomcat host to create all portal containers.

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/distributions/plf-tomcat-pc-creator-listener/5.2.x-SNAPSHOT/plf-tomcat-pc-creator-listener-5.2.x-SNAPSHOT.jar
MD5: eff80739c0b1ebbeae9c0004220b22b9
SHA1: f13c45f4d29c64769bdddeefc523e4dd148dd8dd
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform.distributions:plf-tomcat-pc-creator-listener:5.2.x-SNAPSHOT   Confidence:High

jansi-1.11.jar

Description: Jansi is a java library for generating and interpreting ANSI escape sequences.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/fusesource/jansi/jansi/1.11/jansi-1.11.jar
MD5: e8bd19df14afe8a0f4e2a44d57c0cd8b
SHA1: 655c643309c2f45a56a747fda70e3fadf57e9f11
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jul-to-slf4j-1.7.7.jar

Description: JUL to SLF4J bridge

File Path: /home/ciagent/.m2/repository/org/slf4j/jul-to-slf4j/1.7.7/jul-to-slf4j-1.7.7.jar
MD5: 151a2a6f7f3fff8f5e5324659f6ccdbb
SHA1: def21bc1a6e648ee40b41a84f1db443132913105
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

log4j-over-slf4j-1.7.7.jar

Description: Log4j implemented over SLF4J

License:

Apache Software Licenses: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/slf4j/log4j-over-slf4j/1.7.7/log4j-over-slf4j-1.7.7.jar
MD5: 93ab42a5216afd683c35988c6b6fc3d8
SHA1: d521cb26a9c4407caafcec302e7804b048b07cea
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

jython-standalone-2.5.4-rc1.jar: jline64.dll

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/jline/jline64.dll
MD5: d2f7b0db1231aac1846a857f5c0c4f2c
SHA1: e297e4e990ce820e64d41f3f27b9be90283f3f96
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: jline32.dll

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/jline/jline32.dll
MD5: b3d9a08ff70440ba3638a325512f2cd8
SHA1: 67a55d8f8ca4937d784d4334e554770adc2a1079
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: wininst-7.1.exe

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/Lib/distutils/command/wininst-7.1.exe
MD5: 60ca8d5d30a48745d2918fc59f663d82
SHA1: f1eceea0200b381e8df1bd21febe4d86216d3a9d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: wininst-6.exe

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/Lib/distutils/command/wininst-6.exe
MD5: 2af1ae03a9ada576bbf62fab00b69be9
SHA1: 0f042eb468c23b791446c1594f8f3bb5023eea36
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: jffi-1.0.dll

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/jni/x86_64-Windows/jffi-1.0.dll
MD5: 63e4285e98616f329c88d741ca6f65e8
SHA1: 966259febd6c05d8287b7dd75be57bfcd77fd400
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: jffi-1.0.dll

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/jni/i386-Windows/jffi-1.0.dll
MD5: 570f7ce3eae96b92eb4aab891c076b50
SHA1: c35b34b1cf7a20c0478d34bcfbde3d75905a8b19
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:runtime
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

ehcache-core-2.6.9.jar: sizeof-agent.jar

File Path: /home/ciagent/.m2/repository/net/sf/ehcache/ehcache-core/2.6.9/ehcache-core-2.6.9.jar/net/sf/ehcache/pool/sizeof/sizeof-agent.jar
MD5: 5ad919b3ac0516897bdca079c9a222a8
SHA1: e86399a80ae6a6c7a563717eaa0ce9ba4708571c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: net.sf.ehcache:sizeof-agent:1.0.1   Confidence:High

smartgwt-lgpl-6.0-p20170514.jar: isomorphic_applets.jar

File Path: /home/ciagent/.m2/repository/com/isomorphic/smartgwt/lgpl/smartgwt-lgpl/6.0-p20170514/smartgwt-lgpl-6.0-p20170514.jar/com/smartclient/public/sc/system/helpers/isomorphic_applets.jar
MD5: 0f754cb070377f2176d66ab61c1adafe
SHA1: b1cfc819d68ad2ecb419ce92f2c36bfceebf0d09
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

exo.portal.portlet.dashboard-5.2.x-SNAPSHOT.war: slf4j-api-1.7.5.jar

Description: The slf4j API

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/portal/exo.portal.portlet.dashboard/5.2.x-SNAPSHOT/exo.portal.portlet.dashboard-5.2.x-SNAPSHOT.war/WEB-INF/lib/slf4j-api-1.7.5.jar
MD5: 3b1ececad9ebc3fbad2953ccf4a070ca
SHA1: 6b262da268f8ad9eff941b25503a9198f0a0ac93
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.slf4j:slf4j-api:1.7.5    Confidence:Highest
  • cpe: cpe:/a:slf4j:slf4j:1.7.5   Confidence:Low   

exo.portal.portlet.dashboard-5.2.x-SNAPSHOT.war: jcr-1.0.jar

Description: Content Repository for Java technology API. Specifies a standard API to access content repositories in JavaTM 2 independently of implementation.

License:

Day Specification License: http://www.day.com/maven/jsr170/licenses/day-spec-license.htm
Day Specification License addendum: http://www.day.com/maven/jsr170/jars/LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/portal/exo.portal.portlet.dashboard/5.2.x-SNAPSHOT/exo.portal.portlet.dashboard-5.2.x-SNAPSHOT.war/WEB-INF/lib/jcr-1.0.jar
MD5: 16a1892a7b1e4553f6ce08d800d15687
SHA1: 86b984b459383c8d4ba911785afef426be8fca7e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise EAR for Jboss EAP:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Dependencies:compile
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:content_project:content:1.0   Confidence:Low   
  • maven: javax.jcr:jcr:1.0    Confidence:Highest

CVE-2017-16111  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

The content module is a module to parse HTTP Content-* headers. It is used by the hapijs framework to provide this functionality. The module is vulnerable to regular expression denial of service when passed a specifically crafted Content-Type or Content-Disposition header.

Vulnerable Software & Versions:

web-conferencing-packaging-1.3.x-SNAPSHOT.zip: web-conferencing-webrtc-services-1.3.x-SNAPSHOT.jar

Description: WebRTC services for eXo Web Conferencing

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/web-conferencing/web-conferencing-packaging/1.3.x-SNAPSHOT/web-conferencing-packaging-1.3.x-SNAPSHOT.zip/lib/web-conferencing-webrtc-services-1.3.x-SNAPSHOT.jar
MD5: 73dda6c098543d5eac3429bb24fce62c
SHA1: 24ba3e18f967a0d6a0f314fabfc83e89ea928ec8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.web-conferencing:web-conferencing-webrtc-services:1.3.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:webrtc_project:webrtc:1.3   Confidence:Low   

CVE-2016-1975  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Multiple race conditions in dom/media/systemservices/CamerasChild.cpp in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2016-1976  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Use-after-free vulnerability in the DesktopDisplayDevice class in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Vulnerable Software & Versions: (show all)

web-conferencing-packaging-1.3.x-SNAPSHOT.zip: web-conferencing-services-1.3.x-SNAPSHOT.jar

Description: eXo Web Conferencing services of portal extension

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/web-conferencing/web-conferencing-packaging/1.3.x-SNAPSHOT/web-conferencing-packaging-1.3.x-SNAPSHOT.zip/lib/web-conferencing-services-1.3.x-SNAPSHOT.jar
MD5: e21de5e8825d82ccd8de0f7daa28baef
SHA1: bd449017486db1373f137c25faba6d5461fac627
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.web-conferencing:web-conferencing-services:1.3.x-SNAPSHOT   Confidence:High

web-conferencing-packaging-1.3.x-SNAPSHOT.zip: webconferencing.war

Description: eXo Web Conferencing web application of portal extension

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/web-conferencing/web-conferencing-packaging/1.3.x-SNAPSHOT/web-conferencing-packaging-1.3.x-SNAPSHOT.zip/webapps/webconferencing.war
MD5: 8d3483e9f7ec68e4d8a346f717189bf5
SHA1: 46c346c0f81209f91c755f352307200acfe464e3
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.web-conferencing:web-conferencing-webapp:1.3.x-SNAPSHOT   Confidence:High

web-conferencing-packaging-1.3.x-SNAPSHOT.zip: webrtc.war

Description: WebRTC web application for eXo Web Conferencing

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/web-conferencing/web-conferencing-packaging/1.3.x-SNAPSHOT/web-conferencing-packaging-1.3.x-SNAPSHOT.zip/webapps/webrtc.war
MD5: 1aa936698b13736a0c8f7b83c14e9c50
SHA1: cf0faec41fb234cfcfa57b126141743db4189a17
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.web-conferencing:web-conferencing-webrtc-webapp:1.3.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:webrtc_project:webrtc:1.3   Confidence:Low   

CVE-2016-1975  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Multiple race conditions in dom/media/systemservices/CamerasChild.cpp in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2016-1976  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Use-after-free vulnerability in the DesktopDisplayDevice class in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Vulnerable Software & Versions: (show all)

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar
MD5: 835fc0527eecc869e14616a8d7c289b6
SHA1: 7fc62befb5be4e9dadd593e77b7255b53f4a64a4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:form_manager_project:form_manager:1.4   Confidence:Low   

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management.war
MD5: aba88b99cdc5d27077976755189f2847
SHA1: f563299e3da7c26e43dfc1e6c765c95eebd82680
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.task:task-management:2.2.x-SNAPSHOT   Confidence:High

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management-integration.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management-integration.jar
MD5: 7edc4564226665eb88118a5c33739fa6
SHA1: 7620359c0f64d2a7c7094f593ea7d74e653d7500
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.task:task-management-integration:2.2.x-SNAPSHOT   Confidence:High

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management-services.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management-services.jar
MD5: 32145f61c12bcd3299ed8fe09e1dd69d
SHA1: fb3db2992eb61644bd7cff2bb7e2a30bb18ac89e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.task:task-management-services:2.2.x-SNAPSHOT   Confidence:High

wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: template-pack-config.jar

Description: Template Pack - Config

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/wcm-template/wcm-template-pack-packaging/2.2.x-SNAPSHOT/wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip/template-pack-config.jar
MD5: d05703bb360ccd819330bca09f2e8aeb
SHA1: 31f24b0ff75f71bdde138c62f8dd35983e6ce978
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.wcm-template:template-pack-config:2.2.x-SNAPSHOT   Confidence:High

wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: agital-template.war

Description: WCM Template Pack - Agital

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/wcm-template/wcm-template-pack-packaging/2.2.x-SNAPSHOT/wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip/agital-template.war
MD5: c83a655e60b7f765224fd4ffdfb0000a
SHA1: ca44843142a07cfdc1e3dd2310c87c13eb4261f8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.wcm-template:agital-template:2.2.x-SNAPSHOT   Confidence:High

wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: wai-template.war

Description: WCM Template Pack - WAI

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/wcm-template/wcm-template-pack-packaging/2.2.x-SNAPSHOT/wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip/wai-template.war
MD5: 634bc59712a78f5995a86e843e1acff0
SHA1: 4f9375852540e5ff27069214e46faa4f4c69a9d9
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.wcm-template:wai-template:2.2.x-SNAPSHOT   Confidence:High

wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: responsive-template.war

Description: WCM Template Pack - Responsive

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/wcm-template/wcm-template-pack-packaging/2.2.x-SNAPSHOT/wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip/responsive-template.war
MD5: 48516706f41024323f7c8b3e7135044f
SHA1: 3f779214964b1e7472597da147021dec27335bf6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.wcm-template:responsive-template:2.2.x-SNAPSHOT   Confidence:High

wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip: globex-template.war

Description: WCM Template Pack - Globex

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/wcm-template/wcm-template-pack-packaging/2.2.x-SNAPSHOT/wcm-template-pack-packaging-2.2.x-SNAPSHOT.zip/globex-template.war
MD5: 5925fa43693dbcaf8ad97091667a3271
SHA1: 2d96a1a2440ce45f84cc20219545d177488bfd71
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.wcm-template:globex-template:2.2.x-SNAPSHOT   Confidence:High

bundle-2.2.x-SNAPSHOT.zip: conf-2.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/open-document/bundle/2.2.x-SNAPSHOT/bundle-2.2.x-SNAPSHOT.zip/open-document/lib/conf-2.2.x-SNAPSHOT.jar
MD5: e26d6a265e2ea4e1f8c749bc54f1826c
SHA1: ed14db79327812c311470f7e6dfcb462ad7e9212
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.open-document:conf:2.2.x-SNAPSHOT   Confidence:High

bundle-2.2.x-SNAPSHOT.zip: open-document.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/open-document/bundle/2.2.x-SNAPSHOT/bundle-2.2.x-SNAPSHOT.zip/open-document/webapps/open-document.war
MD5: 1bd25555160f650e072fd045e3a7af45
SHA1: fd9b05c67041387c804cd63dc6f11de64f77207f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.addons.open-document:webapp:2.2.x-SNAPSHOT   Confidence:High

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar: jansi.dll

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/native/windows64/jansi.dll
MD5: fd3a20891286c958103f3ea07174cd3c
SHA1: 829195c9e338d5725cf304ae33fc209db53884eb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar: jansi.dll

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/native/windows32/jansi.dll
MD5: 1e56641bb68937f8e2020cbff5d04a08
SHA1: 97f6e12599bb5848867b9762184d055ed918ab2a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: jquery-1.11.1.jar

Description: WebJar for jQuery

License:

MIT License: https://github.com/jquery/jquery/blob/master/MIT-LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management.war/WEB-INF/lib/jquery-1.11.1.jar
MD5: 66dec8956bb59fd4a8015c21b8673544
SHA1: 195eda53ac8beba7bff08f9919b48c954c858590
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: transport-netty4-client-5.6.11.jar

Description: Netty 4 based transport implementation

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/transport-netty4-client-5.6.11.jar
MD5: cae097bf38006e98a773ff765233ff6b
SHA1: 2869fc32d95c0b10269dee252e7029a70c82e16f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.elasticsearch.plugin:transport-netty4-client:5.6.11    Confidence:Highest
  • cpe: cpe:/a:netty_project:netty:5.6.11   Confidence:Low   
  • cpe: cpe:/a:elastic:elasticsearch:5.6.11   Confidence:Low   
  • cpe: cpe:/a:elasticsearch:elasticsearch:5.6.11   Confidence:Low   

exo-es-embedded-war-2.2.x-SNAPSHOT.war: elasticsearch-5.6.11.jar

Description: Elasticsearch subproject :core

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/elasticsearch-5.6.11.jar
MD5: c6274a6eaf3f868f5b9a2f9594330e6a
SHA1: f36cf681ede555e7393638775f4f15386ada5d49
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.elasticsearch:elasticsearch:5.6.11    Confidence:Highest
  • cpe: cpe:/a:elastic:elasticsearch:5.6.11   Confidence:Low   
  • cpe: cpe:/a:elasticsearch:elasticsearch:5.6.11   Confidence:Low   

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-sandbox-6.6.1.jar

Description: Lucene Sandbox

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-sandbox-6.6.1.jar
MD5: cd7ccb6b30ba0b487e92800cfd6c3905
SHA1: 3a4d147697dfb27b3a0f01f67c0b61175c14b011
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: bootstrap-datepicker-1.4.0.jar

Description: WebJar for Bootstrap Datepicker

License:

Apache License: https://github.com/eternicode/bootstrap-datepicker/blob/master/LICENSE
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management.war/WEB-INF/lib/bootstrap-datepicker-1.4.0.jar
MD5: bc332b6ed9e2237b5eed3e27d3399c25
SHA1: 55f46870810afb87dc8fa54476676534204a8df3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: select2-3.5.2.jar

Description: WebJar for Select2

License:

Copyright 2012 Igor Vaynberg: https://github.com/ivaynberg/select2/blob/master/LICENSE
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management.war/WEB-INF/lib/select2-3.5.2.jar
MD5: 6ed849d9bb15ae1e1d14813c54150136
SHA1: 86e26e40aa0350db68177056a1b5aa344c3dc5b9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: spatial4j-0.6.jar

Description:  Spatial4j is a general purpose spatial / geospatial ASL licensed open-source Java library. It's core capabilities are 3-fold: to provide common geospatially-aware shapes, to provide distance calculations and other math, and to read shape formats like WKT and GeoJSON.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/spatial4j-0.6.jar
MD5: baaffe1b4800337f0856c6160c255c35
SHA1: 21b15310bddcfd8c72611c180f20cf23279809a3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: netty-codec-4.1.13.Final.jar

Description: Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

License:

http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/netty-codec-4.1.13.Final.jar
MD5: 76c24d4287fc1484ef7f62ce82d3cba6
SHA1: 370eeb6e9d92495a2a3be096ab6102755af76730
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: selectize.js-0.12.1.jar

Description: WebJar for selectize.js

License:

Apache 2.0: https://github.com/brianreavis/selectize.js/blob/master/LICENSE
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management.war/WEB-INF/lib/selectize.js-0.12.1.jar
MD5: da0e094c2114b0a947f75f56bad10614
SHA1: 806ab678cd4e95624f3fceea5e0c076a69a65a59
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: bootstrap-2.3.1.jar

Description: WebJar for Bootstrap

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management.war/WEB-INF/lib/bootstrap-2.3.1.jar
MD5: 8b2c45d97723195135568024d22f9487
SHA1: d6d4484e5f8c9dec74da13a6310a232ecc27117f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: jquery-ui-1.11.4.jar

Description: WebJar for jQuery UI

License:

MIT License: https://github.com/jquery/jquery-ui/blob/master/MIT-LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management.war/WEB-INF/lib/jquery-ui-1.11.4.jar
MD5: 8137524c07320f6c4863f2dfab9008ea
SHA1: 6cfa91035974bf658079f1e92e9c6f9878af0eb3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

task-management-packaging-2.2.x-SNAPSHOT.zip: task-management.war: x-editable-bootstrap-1.4.6.jar

Description: WebJar for X-editable Bootstrap

License:

MIT: https://github.com/vitalets/x-editable/blob/master/LICENSE-MIT
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/task/task-management-packaging/2.2.x-SNAPSHOT/task-management-packaging-2.2.x-SNAPSHOT.zip/task-management.war/WEB-INF/lib/x-editable-bootstrap-1.4.6.jar
MD5: 80a9b482797a7e69b5a1772722015b57
SHA1: 736bd967d532392e17c9471b38942f08a5fee639
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: bcpkix-jdk15on-1.55.jar

Description: The Bouncy Castle Java APIs for CMS, PKCS, EAC, TSP, CMP, CRMF, OCSP, and certificate generation. This jar contains APIs for JDK 1.5 to JDK 1.8. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs.

License:

Bouncy Castle Licence: http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/bcpkix-jdk15on-1.55.jar
MD5: 9e17685b340a4e22fec6733cf65ed5ac
SHA1: 6392d8cba22b722c6570d660ca0b3921ff1bae4f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: commons-logging-1.1.3.jar

Description: Commons Logging is a thin adapter allowing configurable bridging to other, well known logging systems.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/commons-logging-1.1.3.jar
MD5: 92eb5aabc1b47287de53d45c086a435c
SHA1: f6f66e966c70a83ffbdb6f17a0919eaf7c8aca7f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-queries-6.6.1.jar

Description: Lucene Queries Module

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-queries-6.6.1.jar
MD5: bb1791a7b4d33d8687af3cd017cb52b4
SHA1: e138ad9807b029ca3ee0276eeb0257812c9c9179
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jbig2-imageio-3.0.1.jar

Description:  Java Image I/O plugin for reading JBIG2-compressed image data. Formerly known as the levigo JBig2 ImageIO plugin (com.levigo.jbig2:levigo-jbig2-imageio).

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jbig2-imageio-3.0.1.jar
MD5: f646e79c1773f93e7fb2977e9f328b50
SHA1: 94db5a684b9bd72e628449ca60c889013fa95cb2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: commons-collections4-4.1.jar

Description: The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/commons-collections4-4.1.jar
MD5: 45af6a8e5b51d5945de6c7411e290bd1
SHA1: a4cf4688fe1c7e3a63aa636cc96d013af537768e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-memory-6.6.1.jar

Description:  High-performance single-document index to compare against Query

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-memory-6.6.1.jar
MD5: 1ea80b782deff68d395e566c8e143736
SHA1: 4df5d3018bf7853b4f44eada0c3d823f25800fc3
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-grouping-6.6.1.jar

Description: Lucene Grouping Module

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-grouping-6.6.1.jar
MD5: ce52fe337751f8021f59f680d43638ad
SHA1: fa9069bd2b75b219a295d15394607350195b0665
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-queryparser-6.6.1.jar

Description: Lucene QueryParsers module

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-queryparser-6.6.1.jar
MD5: b49f72aa804b186df39bebbccdedca50
SHA1: f80e27fee9595ced0276e3caa53b6d12cc779b0e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: objenesis-2.6.jar

Description: A library for instantiating Java objects

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/objenesis-2.6.jar
MD5: 5ffac3f51405ca9b2915970a224b3e8f
SHA1: 639033469776fd37c08358c6b92a4761feb2af4b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: xz-1.8.jar

Description: XZ data compression

License:

Public Domain
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/xz-1.8.jar
MD5: 5f982127e0de85b785c4b2abad21aa2e
SHA1: c4f7d054303948eb6a4066194253886c8af07128
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:tukaani:xz:1.8   Confidence:Low   
  • maven: org.tukaani:xz:1.8    Confidence:Highest

CVE-2015-4035  

Severity: Medium
CVSS Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.

Vulnerable Software & Versions:

exo-es-embedded-war-2.2.x-SNAPSHOT.war: joda-time-2.9.5.jar

Description: Date and time library to replace JDK date handling

License:

Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/joda-time-2.9.5.jar
MD5: 1312d538a0cc48d20366cb4c90f22622
SHA1: 5f01da7306363fad2028b916f3eab926262de928
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: ingest-common-5.6.11.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/ingest-common-5.6.11.jar
MD5: a712c19d7479bdd388adbd16a431b1eb
SHA1: c11482b045e8e39d041c9645f27145eb9479691a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:elasticsearch:elasticsearch:5.6.11   Confidence:Low   

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-spatial3d-6.6.1.jar

Description:  Lucene Spatial shapes implemented using 3D planar geometry

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-spatial3d-6.6.1.jar
MD5: 5820815359a6969fe3115aeba0d74be4
SHA1: 87ed4ef7f3b18bf106c6f780eea39c88c9a39ad1
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

tomcat-8.5.35.zip: tomcat-jni.jar

Description: Interface code to the native connector

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/tomcat-jni.jar
MD5: 8fb29c42b9ff472d8fc78d9f3c320215
SHA1: 23dfd85acc1bccf73a0b1e7822fd1b898c4719a6
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.apache.tomcat:tomcat-jni:8.5.35    Confidence:Highest
  • cpe: cpe:/a:apache:tomcat_native:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache_software_foundation:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache_tomcat:apache_tomcat:8.5.35   Confidence:Low   

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: annotations-api.jar

Description: Annotations Package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/annotations-api.jar
MD5: 1f1b4bd07c4255c6d7f3dcffac2eac71
SHA1: 5e03d5b26a8cdf7368831d35baa323aaae3213b4
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: catalina.jar

Description: Tomcat Servlet Engine Core Classes and Standard implementations

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/catalina.jar
MD5: 382a49c251429f5d9d9f3d92222cb625
SHA1: c871d21a7687eb609f0d42087d8b8a69561195e0
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jts-1.13.jar

Description:  The JTS Topology Suite is an API for modelling and manipulating 2-dimensional linear geometry. It provides numerous geometric predicates and functions. JTS conforms to the Simple Features Specification for SQL published by the Open GIS Consortium.

License:

Lesser General Public License (LGPL): http://www.gnu.org/copyleft/lesser.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jts-1.13.jar
MD5: 35b0e9a867f7c99087874d3d4e084ab7
SHA1: 3ccfb9b60f04d71add996a666ceb8902904fd805
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

tomcat-8.5.35.zip: jsp-api.jar

Description: JSP package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/jsp-api.jar
MD5: 9883f07cc987802e29cd867377d30d17
SHA1: e4ed0de27118645d1e6949939707fe92b19178fd
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

exo-es-embedded-war-2.2.x-SNAPSHOT.war: poi-3.17.jar

Description: Apache POI - Java API To Access Microsoft Format Files

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/poi-3.17.jar
MD5: 243bc3d431e4fadb79738719504c64f7
SHA1: 0ae92292a2043888b40d418da97dc0b669fde326
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:apache:poi:3.17   Confidence:Low   
  • maven: org.apache.poi:poi:3.17    Confidence:Highest

tomcat-8.5.35.zip: servlet-api.jar

Description: javax.servlet package

License:

        Apache License, Version 2.0 and
        Common Development And Distribution License (CDDL) Version 1.0
      : 
        http://www.apache.org/licenses/LICENSE-2.0.txt and
        http://www.opensource.org/licenses/cddl1.txt
      
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/servlet-api.jar
MD5: 2f9ec32baeaba61caaf1441825844dba
SHA1: 39f8dd9a5815b150e7a3ab2a87d5c070b0f3c635
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2000-0672  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.

Vulnerable Software & Versions: (show all)

CVE-2000-0759  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path.

Vulnerable Software & Versions:

CVE-2000-0760  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.

Vulnerable Software & Versions: (show all)

CVE-2000-1210  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.

Vulnerable Software & Versions:

CVE-2001-0590  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).

Vulnerable Software & Versions:

CVE-2002-0493  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-254 Security Features

Apache Tomcat may be started without proper security settings if errors are encountered while reading the web.xml file, which could allow attackers to bypass intended restrictions.

Vulnerable Software & Versions:

CVE-2002-1148  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.

Vulnerable Software & Versions: (show all)

CVE-2002-2006  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.

Vulnerable Software & Versions: (show all)

CVE-2003-0042  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.

Vulnerable Software & Versions: (show all)

CVE-2003-0043  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, uses trusted privileges when processing the web.xml file, which could allow remote attackers to read portions of some files through the web.xml file.

Vulnerable Software & Versions: (show all)

CVE-2003-0044  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.

Vulnerable Software & Versions: (show all)

CVE-2003-0045  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp.

Vulnerable Software & Versions: (show all)

CVE-2005-0808  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.

Vulnerable Software & Versions: (show all)

CVE-2005-4838  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp. NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.

Vulnerable Software & Versions:

CVE-2006-7196  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1.

Vulnerable Software & Versions: (show all)

CVE-2007-1358  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".

Vulnerable Software & Versions: (show all)

CVE-2007-2449  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.

Vulnerable Software & Versions: (show all)

CVE-2008-0128  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-16 Configuration

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Vulnerable Software & Versions:

CVE-2009-2696  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

Vulnerable Software & Versions:

CVE-2009-3548  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-255 Credentials Management

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

Vulnerable Software & Versions: (show all)

CVE-2012-5568  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-16 Configuration

Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.

Vulnerable Software & Versions: (show all)

CVE-2013-2185  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

** DISPUTED ** The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue.

Vulnerable Software & Versions: (show all)

CVE-2013-4286  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

Vulnerable Software & Versions: (show all)

CVE-2013-4322  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.

Vulnerable Software & Versions: (show all)

CVE-2013-4444  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')

Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.

Vulnerable Software & Versions: (show all)

CVE-2013-4590  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2013-6357  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-352

** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator."

Vulnerable Software & Versions: (show all)

CVE-2014-0075  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

Vulnerable Software & Versions: (show all)

CVE-2014-0096  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2014-0099  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-189 Numeric Errors

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

Vulnerable Software & Versions: (show all)

CVE-2014-0119  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

Vulnerable Software & Versions: (show all)

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: jaspic-api.jar

Description: javax.security.auth.message package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/jaspic-api.jar
MD5: f22760c7d43b93cac2bd65b5e5f97378
SHA1: e467215cba84c11e9b0b72d60f433c6b0b466098
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: jasper.jar

Description: Tomcats JSP Parser

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/jasper.jar
MD5: d961549ca96e11902a2906581744cb8d
SHA1: 40f8bea78fd54a3b9ce828b95c2247be4a8fbb64
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: websocket-api.jar

Description: WebSocket (JSR356) API

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/websocket-api.jar
MD5: 90dd0ad5e70b145083eee93eadf4c85d
SHA1: b5054013b7683c51e3843d4825b0ebebceb01360
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: tomcat-coyote.jar

Description: Tomcat Connectors and HTTP parser

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/tomcat-coyote.jar
MD5: 53791305852201a76cb079c2f49918f5
SHA1: da94c8aa9c321d79372657103693da3c1729dbee
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • maven: org.apache.tomcat:tomcat-coyote:8.5.35    Confidence:Highest
  • cpe: cpe:/a:apache:coyote_http_connector:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache_software_foundation:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache:tomcat_connectors:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache_tomcat:apache_tomcat:8.5.35   Confidence:Low   

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.4.0-1.jar

Description: A build of jna which supports all platforms supported by Elasticsearch

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jna-4.4.0-1.jar
MD5: 1d7ca3459848cef578012aa76a032ecd
SHA1: c9dfcec6f07ee4b1d7a6c09a7eaa9dd4fb6d2c79
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: fontbox-2.0.9.jar

Description:  The Apache FontBox library is an open source Java tool to obtain low level information from font files. FontBox is a subproject of Apache PDFBox.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/fontbox-2.0.9.jar
MD5: b7f33a936b8c73d0f93943ca07e5f490
SHA1: f961f17ebdbc307e9055e3cf7c0e207f0895ae55
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

tomcat-8.5.35.zip: el-api.jar

Description: Expression language package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/el-api.jar
MD5: d5c47f9c6038ea2b4acfb355f52ec93c
SHA1: 1ba528480619dfb3ccf3e80759ee225163238872
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2000-0672  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.

Vulnerable Software & Versions: (show all)

CVE-2000-0760  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.

Vulnerable Software & Versions: (show all)

CVE-2000-1210  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.

Vulnerable Software & Versions:

CVE-2001-0590  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).

Vulnerable Software & Versions:

CVE-2002-0493  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-254 Security Features

Apache Tomcat may be started without proper security settings if errors are encountered while reading the web.xml file, which could allow attackers to bypass intended restrictions.

Vulnerable Software & Versions:

CVE-2002-1148  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.

Vulnerable Software & Versions: (show all)

CVE-2002-2006  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.

Vulnerable Software & Versions: (show all)

CVE-2003-0042  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.

Vulnerable Software & Versions: (show all)

CVE-2003-0043  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, uses trusted privileges when processing the web.xml file, which could allow remote attackers to read portions of some files through the web.xml file.

Vulnerable Software & Versions: (show all)

CVE-2003-0044  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.

Vulnerable Software & Versions: (show all)

CVE-2003-0045  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp.

Vulnerable Software & Versions: (show all)

CVE-2005-0808  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.

Vulnerable Software & Versions: (show all)

CVE-2005-4838  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp. NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.

Vulnerable Software & Versions:

CVE-2006-7196  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1.

Vulnerable Software & Versions: (show all)

CVE-2007-1358  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".

Vulnerable Software & Versions: (show all)

CVE-2007-2449  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.

Vulnerable Software & Versions: (show all)

CVE-2008-0128  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-16 Configuration

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Vulnerable Software & Versions:

CVE-2009-2696  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

Vulnerable Software & Versions:

CVE-2009-3548  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-255 Credentials Management

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

Vulnerable Software & Versions: (show all)

CVE-2012-5568  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-16 Configuration

Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.

Vulnerable Software & Versions: (show all)

CVE-2013-2185  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

** DISPUTED ** The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue.

Vulnerable Software & Versions: (show all)

CVE-2013-4286  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

Vulnerable Software & Versions: (show all)

CVE-2013-4322  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.

Vulnerable Software & Versions: (show all)

CVE-2013-4444  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')

Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.

Vulnerable Software & Versions: (show all)

CVE-2013-4590  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2013-6357  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-352

** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator."

Vulnerable Software & Versions: (show all)

CVE-2014-0075  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

Vulnerable Software & Versions: (show all)

CVE-2014-0096  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2014-0099  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-189 Numeric Errors

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

Vulnerable Software & Versions: (show all)

CVE-2014-0119  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

Vulnerable Software & Versions: (show all)

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: ecj-4.6.3.jar

Description: Eclipse Compiler for Java(TM)

License:

Eclipse Public License: http://www.eclipse.org/legal/epl-v10.html
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/ecj-4.6.3.jar
MD5: 33e190a0f0745306de54fba90f381fc3
SHA1: ade950992eb3caf6ab4f1a88706c755f0bf213d9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: mapper-attachments-5.6.11.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/mapper-attachments-5.6.11.jar
MD5: e0474e517731808a862e1c478dfa87d0
SHA1: 6b583804fcc9a6bd58e41f674c82350133402b3d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:elasticsearch:elasticsearch:5.6.11   Confidence:Low   

exo-es-embedded-war-2.2.x-SNAPSHOT.war: commons-compress-1.16.1.jar

Description:  Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE, DEFLATE64, LZ4, Brotli, Zstandard and ar, cpio, jar, tar, zip, dump, 7z, arj.

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/commons-compress-1.16.1.jar
MD5: 3409638d6b6bd23042eeac5cd97e256c
SHA1: 7b5cdabadb4cf12f5ee0f801399e70635583193f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.1.0.jar

Description: Java Native Access

License:

LGPL, version 2.1: http://www.gnu.org/licenses/licenses.html
ASL, version 2: http://www.apache.org/licenses/
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jna-4.1.0.jar
MD5: b0e08c9936dc52aa40439c71fcad6297
SHA1: 1c12d070e602efd8021891cdd7fd18bc129372d4
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

tomcat-8.5.35.zip: tomcat-jdbc.jar

Description: Tomcat JDBC Pool Package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/tomcat-jdbc.jar
MD5: 0b219b99e94a1db1a55a6c29d60faaa0
SHA1: b4b27053b96b70b6e2f3b8de9f5338b0d386386b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

tomcat-8.5.35.zip: tomcat-i18n-ja.jar

Description: Japanese translations

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/tomcat-i18n-ja.jar
MD5: fbb7a75e047e3b9e4c68a8e57c9b0e4f
SHA1: ccb977c788e1891bc77ca3e3a0fbc7a9d3696b93
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: bootstrap.jar

File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/bin/bootstrap.jar
MD5: f3940fdc1b7cf81fee43d6963a4d3740
SHA1: 394ae5d3d92b3c7717c26d529729145c53149a22
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:apache_software_foundation:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache:tomcat:8.5.35   Confidence:Low   

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: commons-daemon.jar

Description:  Apache Commons Daemon software provides an alternative invocation mechanism for unix-daemon-like Java code.

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/bin/commons-daemon.jar
MD5: 6c64006960a9b6b449c32e6ad1b39b1e
SHA1: 96f07daacf0a3c832c47ac6b4052363fe43db9a1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

tomcat-8.5.35.zip: sample.war

File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/webapps/docs/appdev/sample/sample.war
MD5: 570f196c4a1025a717269d16d11d6f37
SHA1: 80f5053b166c69d81697ba21113c673f8372aca0
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

tomcat-8.5.35.zip: taglibs-standard-impl-1.2.5.jar

Description:  An implementation of the JSP Standard Tag Library (JSTL).

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/webapps/examples/WEB-INF/lib/taglibs-standard-impl-1.2.5.jar
MD5: 8e5c8db242fbef3db1acfcbb3bc8ec8b
SHA1: 9b9783ccb2a323383e6e20e36d368f8997b71967
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-spatial-extras-6.6.1.jar

Description:  Advanced Spatial Shape Strategies for Apache Lucene

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-spatial-extras-6.6.1.jar
MD5: c7bd49e37461a0acebc02559e556358e
SHA1: c1a3c9892f1d57b14adc4bcf30509c2bec2ebafb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-analyzers-common-6.6.1.jar

Description: Additional Analyzers

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-analyzers-common-6.6.1.jar
MD5: fda826e0d204291b73c5ec6af3c8157e
SHA1: 52cb2bbc52221d33972faacf67e5da0ab92956bd
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jai-imageio-jpeg2000-1.3.0.jar

Description:  JPEG2000 support for Java Advanced Imaging Image I/O Tools API core. This module is licensed under the [JJ2000 license](LICENSE.txt) and is therefore NOT compatible with the GPL 3 license. It should be compatible with the LGPL 2.1 license.

License:

JJ2000: LICENSE-JJ2000.txt
BSD 3-clause License w/nuclear disclaimer: LICENSE-Sun.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jai-imageio-jpeg2000-1.3.0.jar
MD5: 5303df1931af74fff68ed5470411ce39
SHA1: 94cba6faa03d2a279d00b284b76231ae2f2f67e8
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: bcmail-jdk15on-1.55.jar

Description: The Bouncy Castle Java S/MIME APIs for handling S/MIME protocols. This jar contains S/MIME APIs for JDK 1.5 to JDK 1.8. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs. The JavaMail API and the Java activation framework will also be needed.

License:

Bouncy Castle Licence: http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/bcmail-jdk15on-1.55.jar
MD5: 345855cf1475c42115b2afd3c52362e0
SHA1: 5cea2dada69b98698ea975a5c1dd3c91ac8ffbb6
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: httpcore-4.4.5.jar

Description:  Apache HttpComponents Core (blocking I/O)

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/httpcore-4.4.5.jar
MD5: 77e3c6477ecd4112078869b023d93ae5
SHA1: e7501a1b34325abb00d17dde96150604a0658b54
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: securesm-1.2.jar

Description: SecurityManager implementation that works around design flaws in Java

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/securesm-1.2.jar
MD5: f2875ab206e58b3f881195302955c6c0
SHA1: 4c28f5b634497d64b727961430a516f351a099d5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: tika-core-1.18.jar

Description: This is the core Apache Tika™ toolkit library from which all other modules inherit functionality. It also includes the core facades for the Tika API.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/tika-core-1.18.jar
MD5: 2c318d82d76db77902d71d143a88973f
SHA1: 69556697de96cf0b22df846e970dafd29866eee0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2018-11761  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.

Vulnerable Software & Versions: (show all)

CVE-2018-11762  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.

Vulnerable Software & Versions: (show all)

CVE-2018-8017  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser.

Vulnerable Software & Versions: (show all)

exo-es-embedded-war-2.2.x-SNAPSHOT.war: hppc-0.7.1.jar

Description: High Performance Primitive Collections. Fundamental data structures (maps, sets, lists, stacks, queues) generated for combinations of object and primitive types to conserve JVM memory and speed up execution.

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/hppc-0.7.1.jar
MD5: 2ff89be5b49144c330190cf7137c3a26
SHA1: 8b5057f74ea378c0150a1860874a3ebdcb713767
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jempbox-1.8.13.jar

Description:  The Apache JempBox library is an open source Java tool that implements Adobe's XMP(TM) specification. JempBox is a subproject of Apache PDFBox.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jempbox-1.8.13.jar
MD5: 449968f1151d4a9ce2e8a71f8e2622cf
SHA1: a874cef0ed0e2a8c4cc5ed52c23ba3e6d78eca4e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: pdfbox-2.0.9.jar

Description:  The Apache PDFBox library is an open source Java tool for working with PDF documents.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/pdfbox-2.0.9.jar
MD5: 67c7b5335ae9f440fe86b19a1084964d
SHA1: d0425578218624388f2ec84a0b3a11efd55df0f5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: bcprov-jdk15on-1.55.jar

Description: The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.

License:

Bouncy Castle Licence: http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/bcprov-jdk15on-1.55.jar
MD5: cbf56e979aba0e551a57953080e115f0
SHA1: 935f2e57a00ec2c489cbd2ad830d4a399708f979
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:bouncycastle:bouncy-castle-crypto-package:1.55   Confidence:Low   
  • maven: org.bouncycastle:bcprov-jdk15on:1.55    Confidence:Highest
  • cpe: cpe:/a:bouncycastle:bouncy_castle_crypto_package:1.55   Confidence:Low   

exo-es-embedded-war-2.2.x-SNAPSHOT.war: httpasyncclient-4.1.2.jar

Description:  Apache HttpComponents AsyncClient

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/httpasyncclient-4.1.2.jar
MD5: 262ed539a7d65addfe71b40345671a00
SHA1: 95aa3e6fb520191a0970a73cf09f62948ee614be
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-backward-codecs-6.6.1.jar

Description:  Codecs for older versions of Lucene.

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-backward-codecs-6.6.1.jar
MD5: 04c8e578a113ab452dd83acea4285ba9
SHA1: 4ad390d10b0290af6dac83a519956b98b1fd18f0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jopt-simple-5.0.2.jar

Description: A Java library for parsing command line options

License:

The MIT License: http://www.opensource.org/licenses/mit-license.php
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jopt-simple-5.0.2.jar
MD5: 22d04887411554d11534653a40ea325a
SHA1: 98cafc6081d5632b61be2c9e60650b64ddbc637c
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: reindex-client-5.6.11.jar

Description: The Reindex module adds APIs to reindex from one index to another or update documents in place.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/reindex-client-5.6.11.jar
MD5: 9c54e1e924116fc9a457d9b7b238834e
SHA1: d25a2005c0adf8a5552097923556d4352051b9e1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:elastic:elasticsearch:5.6.11   Confidence:Low   
  • cpe: cpe:/a:elasticsearch:elasticsearch:5.6.11   Confidence:Low   
  • maven: org.elasticsearch.plugin:reindex-client:5.6.11    Confidence:Highest

exo-es-embedded-war-2.2.x-SNAPSHOT.war: t-digest-3.0.jar

Description: Data structure which allows accurate estimation of quantiles and related rank statistics

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/t-digest-3.0.jar
MD5: e7ede835f73c70cc662ca4d241250f1a
SHA1: 84ccf145ac2215e6bfa63baa3101c0af41017cfc
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jackson-core-2.8.6.jar

Description: Core Jackson abstractions, basic JSON streaming API implementation

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jackson-core-2.8.6.jar
MD5: fc62c06dbb91d1c9130c405edaa35a88
SHA1: 2ef7b1cc34de149600f5e75bc2d5bf40de894e60
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-suggest-6.6.1.jar

Description: Lucene Suggest Module

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-suggest-6.6.1.jar
MD5: c60a4c68b5ad22e44cba7c559f6d9525
SHA1: 9c74240a249fd7c35fdeb6379ed2a929fb7c8acb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: apache-mime4j-core-0.8.1.jar

Description: Java stream based MIME message parser

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/apache-mime4j-core-0.8.1.jar
MD5: d675e31f6dbfb2b4d3c0df666b594cec
SHA1: c62dfe18a3b827a2c626ade0ffba44562ddf3f61
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-highlighter-6.6.1.jar

Description:  This is the highlighter for apache lucene java

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-highlighter-6.6.1.jar
MD5: 4c6ea24152d973aea68c72779082635f
SHA1: 6cc18a6e4a60b8fca62fcfaf8b9fc3ff6bf1864d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: log4j-core-2.7.jar

Description: The Apache Log4j Implementation

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/log4j-core-2.7.jar
MD5: 2b63e0e5063fdaccf669a1e26384f3fd
SHA1: a3f2b4e64c61a7fc1ed8f1e5ba371933404ed98a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

CVE-2017-5645  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

Vulnerable Software & Versions: (show all)

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-misc-6.6.1.jar

Description: Miscellaneous Lucene extensions

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-misc-6.6.1.jar
MD5: 7956cd3fa84a21f38c7c4838d6b265c3
SHA1: 4a434f20c15a1e651ba9d3db1167fec695b557d4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jai-imageio-core-1.3.0.jar

Description:  Java Advanced Imaging Image I/O Tools API core, but without the classes involved with javax.media.jai dependencies, JPEG2000 or codecLibJIIO, meaning that this library can be distributed under the modified BSD license and should be GPL compatible.

License:

BSD 3-clause License: http://opensource.org/licenses/BSD-3-Clause
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jai-imageio-core-1.3.0.jar
MD5: 2945baa56cc352f4b71e93c73a31ba1b
SHA1: 268feccd3a0fe32058ede66db41a21d9c7a9e535
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-join-6.6.1.jar

Description: Lucene Join Module

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-join-6.6.1.jar
MD5: e6489c32f17b2aefe5cc21b526810289
SHA1: 355dc2046a1574cf23d325171372531e687a72cb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: snakeyaml-1.15.jar

Description: YAML 1.1 parser and emitter for Java

License:

Apache License Version 2.0: LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/snakeyaml-1.15.jar
MD5: c6502713ff649a557b767b990830c786
SHA1: 3b132bea69e8ee099f416044970997bde80f4ea6
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: httpcore-nio-4.4.5.jar

Description:  Apache HttpComponents Core (non-blocking I/O)

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/httpcore-nio-4.4.5.jar
MD5: e570d76d11b6fdf941173ab78ae4288b
SHA1: f4be009e7505f6ceddf21e7960c759f413f15056
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: HdrHistogram-2.1.9.jar

Description:  HdrHistogram supports the recording and analyzing sampled data value counts across a configurable integer value range with configurable value precision within the range. Value precision is expressed as the number of significant digits in the value recording, and provides control over value quantization behavior across the value range and the subsequent value resolution at any given level.

License:

Public Domain, per Creative Commons CC0: http://creativecommons.org/publicdomain/zero/1.0/
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/HdrHistogram-2.1.9.jar
MD5: ee302e5e7489719991aa0ca2dd67febd
SHA1: e4631ce165eb400edecfa32e03d3f1be53dee754
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-core-6.6.1.jar

Description: Apache Lucene Java Core

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-core-6.6.1.jar
MD5: 780effce6ab2f1a5f4bc374a7b206460
SHA1: b51e719d781e6ec2dbf6d6eacc20a9c2df30269a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: lucene-spatial-6.6.1.jar

Description:  Geospatial Indexing and Query for Apache Lucene

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/lucene-spatial-6.6.1.jar
MD5: 02b50270de43924dd5bbe86d34473639
SHA1: a83dc0e68cc3aeb8835610022f8d2cff34096d40
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.4.0-1.jar: jnidispatch.dll

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jna-4.4.0-1.jar/com/sun/jna/win32-x86/jnidispatch.dll
MD5: b5d228ec0995e645e6172e40fa6056d6
SHA1: 608b01c2ca4ac56f656117b2e4b66575579fbeff
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.4.0-1.jar: jnidispatch.dll

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jna-4.4.0-1.jar/com/sun/jna/win32-x86-64/jnidispatch.dll
MD5: 68bf293ed84fec43a17dbc830b6001c1
SHA1: e2841508e29f91c168c0a620c57cec387f681a6c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.1.0.jar: jnidispatch.dll

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jna-4.1.0.jar/com/sun/jna/win32-x86/jnidispatch.dll
MD5: 05a72ada9247aeb114a9ef01a394b6c4
SHA1: 8b32cc82740fc62afdf5ea211f1ca8bb72269bbf
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.1.0.jar: jnidispatch.dll

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jna-4.1.0.jar/com/sun/jna/win32-x86-64/jnidispatch.dll
MD5: 06b2f1f909d2436dff20d7a668ef26a9
SHA1: bd1bdda9a91f3b0d9067e323f7394bef933f81f6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

exo-es-embedded-war-2.2.x-SNAPSHOT.war: jna-4.1.0.jar: jnidispatch.dll

File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/jna-4.1.0.jar/com/sun/jna/w32ce-arm/jnidispatch.dll
MD5: 57697cbdd321ae7d06f5da04e821f908
SHA1: 67167f2b2fce8db5f9f64a372b0da54730d3ee51
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Package:provided
  • eXo PLF:: Platform Private Distributions - Enterprise Tomcat Standalone:provided

Identifiers

  • None

jboss-eap-7.1.0.zip: java-getopt-1.0.13.redhat-5.jar

License:

GNU Lesser General Public License, Version 2: http://www.gnu.org/licenses/lgpl-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/gnu/getopt/main/java-getopt-1.0.13.redhat-5.jar
MD5: a92f4cf50145a2113f3a5362210dcbf0
SHA1: 8828d3be783ae3d9f50ce2679c739b4610b676a7
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: gnu.getopt:java-getopt:1.0.13.redhat-5   Confidence:High

jboss-eap-7.1.0.zip: cal10n-api-0.8.1.redhat-1.jar

Description: Compiler assisted localization library (CAL10N)

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/ch/qos/cal10n/main/cal10n-api-0.8.1.redhat-1.jar
MD5: 829f588971ab63ad64f295840852f782
SHA1: 21ac726d553245d80a21f40c06b1001002c85e2a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: ch.qos.cal10n:cal10n-api:0.8.1.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: xom-1.2.10.redhat-1.jar

Description: The XOM Dual Streaming/Tree API for Processing XML

License:

The GNU Lesser General Public License, Version 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/nu/xom/main/xom-1.2.10.redhat-1.jar
MD5: 3832eab202cdad3dc84fc1b16b147042
SHA1: 1972394276173ec14f511dcbf5d6afc85c1f4c0a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.io7m.xom:xom:1.2.10.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: netty-all-4.1.9.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/io/netty/main/netty-all-4.1.9.Final-redhat-1.jar
MD5: bb7c2d345fc4db96d6e431a5e3a34a25
SHA1: 27a6862181361dc60ee4b2f405886de16ada208d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: io.netty:netty-all:4.1.9.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:netty_project:netty:4.1.9   Confidence:Low   

jboss-eap-7.1.0.zip: undertow-websockets-jsr-1.4.18.Final-redhat-2.jar

Description: Undertow

License:

http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/io/undertow/websocket/main/undertow-websockets-jsr-1.4.18.Final-redhat-2.jar
MD5: 219b34dd1da86e82e7bceeb8310a3a2d
SHA1: 2dae2e0160fb7a574145c18826696a41b7d07e54
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: io.undertow:undertow-websockets-jsr:1.4.18.Final-redhat-2   Confidence:High

jboss-eap-7.1.0.zip: jastow-2.0.2.Final-redhat-1.jar

Description: JSP 2.3 container

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/io/undertow/jsp/main/jastow-2.0.2.Final-redhat-1.jar
MD5: e86ee9a119b2629b5657e1768be622ff
SHA1: 686d907a2b769cc545cdf050f0f47601ed888cf8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: io.undertow.jastow:jastow:2.0.2.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:oracle:jsp:2.0.2   Confidence:Low   

jboss-eap-7.1.0.zip: undertow-core-1.4.18.Final-redhat-2.jar

Description: Undertow

License:

http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/io/undertow/core/main/undertow-core-1.4.18.Final-redhat-2.jar
MD5: e2480449c294a0f1438a0bda16cb63a0
SHA1: 74a86ddc0d194deede8c734ce9ef9457f9c3fba1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: io.undertow:undertow-core:1.4.18.Final-redhat-2   Confidence:High

jboss-eap-7.1.0.zip: undertow-js-1.0.2.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/io/undertow/js/main/undertow-js-1.0.2.Final-redhat-1.jar
MD5: 949659be50d3e7f8de54c0aa236bebf6
SHA1: 8834e5d5a1a93044ff1b73a51c24a3e672b993dc
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: io.undertow.js:undertow-js:1.0.2.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: undertow-servlet-1.4.18.Final-redhat-2.jar

Description: Undertow

License:

http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/io/undertow/servlet/main/undertow-servlet-1.4.18.Final-redhat-2.jar
MD5: 32289296ca38877144fdbe747dfda31d
SHA1: 92724fd70ca76bd683dfe7cc07dadf8689d65253
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: io.undertow:undertow-servlet:1.4.18.Final-redhat-2   Confidence:High

jboss-eap-7.1.0.zip: jaxen-1.1.6.redhat-1.jar

Description: Jaxen is a universal Java XPath engine.

License:

http://jaxen.codehaus.org/license.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jaxen/main/jaxen-1.1.6.redhat-1.jar
MD5: 464451a682c3f3940a88d64aedfb5cba
SHA1: 3e32e0f40887de7548f7f4b9df63326717b2b8bb
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: jaxen:jaxen:1.1.6.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jansi-1.16.0.redhat-4.jar

Description: Jansi is a java library for generating and interpreting ANSI escape sequences.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/fusesource/jansi/main/jansi-1.16.0.redhat-4.jar
MD5: 5ec6e2c152bcaf332a7f7ab3c5cd0053
SHA1: 59286ea29b7e39ddb1a024ba843720bc25987ed9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: hibernate-commons-annotations-5.0.1.Final-redhat-2.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/commons-annotations/main/hibernate-commons-annotations-5.0.1.Final-redhat-2.jar
MD5: 40906ccd81f6641accec09bd57554253
SHA1: e99f159958f638b9e6dab831221fe656e89cb008
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jipijapa-hibernate5-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/jipijapa-hibernate5/main/jipijapa-hibernate5-7.1.0.GA-redhat-11.jar
MD5: cb5054ce8a69986595e34848a5655abb
SHA1: ca60311521521600b9871368bdc105ba13a47771
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:jipijapa-hibernate5:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: hibernate-infinispan-5.1.10.Final-redhat-1.jar

Description: A module of the Hibernate O/RM project

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/infinispan/main/hibernate-infinispan-5.1.10.Final-redhat-1.jar
MD5: 07744dc0851a24fa8621965a48b1dc25
SHA1: 33af30a52f19fbabd0966331543e1b97aed066f1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:infinispan:infinispan:5.1.10   Confidence:Low   

CVE-2017-15089  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: hibernate-validator-5.3.5.Final-redhat-2.jar

Description: Hibernate's Bean Validation (JSR-303) reference implementation.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/validator/main/hibernate-validator-5.3.5.Final-redhat-2.jar
MD5: 7ee53432c846f6f0347371202d7d1e61
SHA1: ed63c0aec69bac3f5a7b524becda06a87e186a1d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:hibernate:hibernate_validator:5.3.5   Confidence:Low   
  • maven: org.hibernate:hibernate-validator:5.3.5.Final-redhat-2   Confidence:High

jboss-eap-7.1.0.zip: hibernate-search-engine-5.5.8.Final-redhat-1.jar

Description: Core of the Object/Lucene mapper, query engine and index management

License:

http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/search/engine/main/hibernate-search-engine-5.5.8.Final-redhat-1.jar
MD5: 4df084b3387df6e03c30e62e6893ebac
SHA1: ca7097ce212393112e9172c1433279a498d232d4
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.hibernate:hibernate-search-engine:5.5.8.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: hibernate-search-serialization-avro-5.5.8.Final-redhat-1.jar

Description: Implementation of the Hibernate Search serialization protocol for remote indexing using Avro

License:

http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/search/serialization-avro/main/hibernate-search-serialization-avro-5.5.8.Final-redhat-1.jar
MD5: 34798a5ab9c4bdab27ad67bcc94015e2
SHA1: a8d9f6abc5aec2b098c4470e04d2ddbff330515a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:pro_search:pro_search:5.5.8   Confidence:Low   
  • maven: org.hibernate:hibernate-search-serialization-avro:5.5.8.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: hibernate-search-orm-5.5.8.Final-redhat-1.jar

Description: Hibernate Search integration with Hibernate Core

License:

http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/search/orm/main/hibernate-search-orm-5.5.8.Final-redhat-1.jar
MD5: 725ae3ad4ff6df6fcbca1c1931dafd6a
SHA1: 13c4e67a8493c1b9bb7f14875b7781f1be992f6c
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.hibernate:hibernate-search-orm:5.5.8.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: hibernate-search-backend-jms-5.5.8.Final-redhat-1.jar

Description: Hibernate Search JGroup based backend

License:

http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/search/backend-jms/main/hibernate-search-backend-jms-5.5.8.Final-redhat-1.jar
MD5: 2ec8407f6e3efc5b417c7047d0b0d874
SHA1: 93a13f25dee08e750a4b091d519eb6c61f23c3c9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.hibernate:hibernate-search-backend-jms:5.5.8.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: hibernate-search-backend-jgroups-5.5.8.Final-redhat-1.jar

Description: Hibernate Search JGroup based backend

License:

http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/search/backend-jgroups/main/hibernate-search-backend-jgroups-5.5.8.Final-redhat-1.jar
MD5: ded3984d2798f7e12cb59d60e0eac65a
SHA1: 84724aaf4d2b866208dccb5c12a05840aef5e96a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.hibernate:hibernate-search-backend-jgroups:5.5.8.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jipijapa-hibernate4-3-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/jipijapa-hibernate4-3/main/jipijapa-hibernate4-3-7.1.0.GA-redhat-11.jar
MD5: 795b6bb730af315ab019b24b9e8861da
SHA1: b111dabc47fa64fc179ed833945651d7af7dbad1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:jipijapa-hibernate4-3:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: hibernate-envers-5.1.10.Final-redhat-1.jar

Description: A module of the Hibernate O/RM project

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/main/hibernate-envers-5.1.10.Final-redhat-1.jar
MD5: 44e417debdeb6af1461f8006060b898f
SHA1: 85ee7eb9ee02193e69e7dc750da2e4e5637b124c
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: hibernate-core-5.1.10.Final-redhat-1.jar

Description: A module of the Hibernate O/RM project

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/main/hibernate-core-5.1.10.Final-redhat-1.jar
MD5: d067108dd8730f3aa345cf8851e0deee
SHA1: 67f72b6e08a9d0813cff36bdfb3c7244a9f9e727
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: hibernate-java8-5.1.10.Final-redhat-1.jar

Description: A module of the Hibernate O/RM project

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/main/hibernate-java8-5.1.10.Final-redhat-1.jar
MD5: 9bd5e5cf7272605a77ff95825a63e6c9
SHA1: 64cae77cfec238d0ec0dcef6398efbd20f69f4e7
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: hibernate-entitymanager-5.1.10.Final-redhat-1.jar

Description: A module of the Hibernate O/RM project

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/main/hibernate-entitymanager-5.1.10.Final-redhat-1.jar
MD5: 2838738adfd04513daade3588d817fac
SHA1: bbf389d255ff0d95c7cc17008bc30b10acb94852
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jipijapa-hibernate4-1-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hibernate/4.1/jipijapa-hibernate4-1-7.1.0.GA-redhat-11.jar
MD5: aecbea3fa43747740c14321034e0c8ea
SHA1: d216a81cf5082faad897b0f2063eb66115c597e6
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:jipijapa-hibernate4-1:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: javassist-3.20.0.GA-redhat-3.jar

Description: Javassist (JAVA programming ASSISTant) makes Java bytecode manipulation simple. It is a class library for editing bytecodes in Java.

License:

MPL 1.1: http://www.mozilla.org/MPL/MPL-1.1.html
LGPL 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
Apache License 2.0: http://www.apache.org/licenses/
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/javassist/main/javassist-3.20.0.GA-redhat-3.jar
MD5: 5245b958612aa5b9058439f2b784e4f1
SHA1: 98940002b1f087ee865ad898728ac8f64b32cb06
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.javassist:javassist:3.20.0.GA-redhat-3   Confidence:High

jboss-eap-7.1.0.zip: bcmail-jdk15on-1.56.0.redhat-2.jar

Description: The Bouncy Castle Java S/MIME APIs for handling S/MIME protocols. This jar contains S/MIME APIs for JDK 1.5 to JDK 1.8. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs. The JavaMail API and the Java activation framework will also be needed.

License:

http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/bouncycastle/main/bcmail-jdk15on-1.56.0.redhat-2.jar
MD5: 0657dcce679e40f333a8d902107d4a58
SHA1: 20a143e545eb34530fc80a25ca0c2a1e50d6f901
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.bouncycastle:bcmail-jdk15on:1.56.0.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: bcprov-jdk15on-1.56.0.redhat-2.jar

Description: The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.9.

License:

http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/bouncycastle/main/bcprov-jdk15on-1.56.0.redhat-2.jar
MD5: f18876c45967910d06853460c98f1a21
SHA1: 7dd448b9461326d48cafdddba586b4b7be51dc02
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:bouncycastle:bouncy-castle-crypto-package:1.56.0   Confidence:Low   
  • cpe: cpe:/a:bouncycastle:bouncy_castle_crypto_package:1.56.0   Confidence:Low   
  • maven: org.bouncycastle:bcprov-jdk15on:1.56.0.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: bcpkix-jdk15on-1.56.0.redhat-2.jar

Description: The Bouncy Castle Java APIs for CMS, PKCS, EAC, TSP, CMP, CRMF, OCSP, and certificate generation. This jar contains APIs for JDK 1.5 to JDK 1.8. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs.

License:

http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/bouncycastle/main/bcpkix-jdk15on-1.56.0.redhat-2.jar
MD5: 6f663e6e1d0fbae408ddebe949d71d02
SHA1: debf47deb53e9943b8ba17b047027d078d727263
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.bouncycastle:bcpkix-jdk15on:1.56.0.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: jberet-core-1.2.4.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jberet/jberet-core/main/jberet-core-1.2.4.Final-redhat-1.jar
MD5: 8ff9ef45a6f85e95223e6c972807c7ed
SHA1: 6e9b3e3ec7ef1436b4bc45bd39525fd478591707
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jberet:jberet-core:1.2.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: infinispan-core-8.2.8.Final-redhat-1.jar

Description: Infinispan core module

License:

http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/infinispan/main/infinispan-core-8.2.8.Final-redhat-1.jar
MD5: a60e006b9495daafd0da40e997f42f86
SHA1: 30bb2655f7c03aaaf07f09052b6e1d704d90b399
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

CVE-2016-0750  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-15089  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-2638  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CWE: CWE-287 Improper Authentication

It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: joda-time-2.9.7.redhat-1.jar

Description: Date and time library to replace JDK date handling

License:

Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/joda/time/main/joda-time-2.9.7.redhat-1.jar
MD5: bc326e21d175f5daa147b13251fcecf2
SHA1: 4fc15f6b256df616b39aa5cf99a1ef1d10967ee5
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: joda-time:joda-time:2.9.7.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: slf4j-ext-1.7.22.redhat-1.jar

Description: Extensions to the SLF4J API

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/slf4j/ext/main/slf4j-ext-1.7.22.redhat-1.jar
MD5: a97118b54b9cda5fce3ee20aa6dfebad
SHA1: dab342c7f10fdb287f73a18512962d56f92021ce
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:slf4j:slf4j:1.7.22   Confidence:Low   
  • maven: org.slf4j:slf4j-ext:1.7.22.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: slf4j-jboss-logmanager-1.0.3.GA-redhat-2.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/slf4j/impl/main/slf4j-jboss-logmanager-1.0.3.GA-redhat-2.jar
MD5: 8b6f82e12d86bea08695107150f3f295
SHA1: dac39c79baa50fafdbf3b20422a9de2f75449298
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:slf4j:slf4j:1.0.3   Confidence:Low   
  • maven: org.jboss.slf4j:slf4j-jboss-logmanager:1.0.3.GA-redhat-2   Confidence:High

jboss-eap-7.1.0.zip: vdx-wildfly-1.1.6.redhat-1.jar

Description: VDX WildFly support

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/projectodd/vdx/main/vdx-wildfly-1.1.6.redhat-1.jar
MD5: dfc4bd4c9dd886b385bbee0fd8d923e0
SHA1: 60b2cb0ebf7c326c54143ee56c44d40772e7e5fc
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:1.1.6   Confidence:Low   
  • maven: org.projectodd.vdx:vdx-wildfly:1.1.6.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: vdx-core-1.1.6.redhat-1.jar

Description: VDX Core utils

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/projectodd/vdx/main/vdx-core-1.1.6.redhat-1.jar
MD5: 6e3dabacf4f8d8c5e0a7c896f55002b7
SHA1: 8f4be5738f588e1ab8142b40ed3722c95023f412
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.projectodd.vdx:vdx-core:1.1.6.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: avro-1.7.6.redhat-1.jar

Description: Avro core components

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/avro/main/avro-1.7.6.redhat-1.jar
MD5: 754e105213d1444f1036a1489f67c6e3
SHA1: 52fb6a082de89d34a390b19a225dc3eacd22ea61
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.avro:avro:1.7.6.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: xmlsec-2.0.8.redhat-1.jar

Description: Apache XML Security for Java supports XML-Signature Syntax and Processing, W3C Recommendation 12 February 2002, and XML Encryption Syntax and Processing, W3C Recommendation 10 December 2002. As of version 1.4, the library supports the standard Java API JSR-105: XML Digital Signature APIs.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/santuario/xmlsec/main/xmlsec-2.0.8.redhat-1.jar
MD5: e91c5429976cdfaff64c37d2ae85971d
SHA1: e86b3239a48cd2e436b1faeda8c1c91aa36fa6d1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:apache:santuario_xml_security_for_java:2.0.8   Confidence:Low   
  • cpe: cpe:/a:apache:xml_security_for_java:2.0.8   Confidence:Low   
  • maven: org.apache.santuario:xmlsec:2.0.8.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: apache-mime4j-0.6.0.redhat-6.jar

Description: Java stream based MIME message parser

License:

http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/james/mime4j/main/apache-mime4j-0.6.0.redhat-6.jar
MD5: 187ecd41f3abb3bfb06ed20c4689dd87
SHA1: a70d939ce04dc0e81fc70a29a866e2e8178755db
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.james:apache-mime4j:0.6.0.redhat-6   Confidence:High
  • cpe: cpe:/a:apache:james:0.6.0   Confidence:Low   

jboss-eap-7.1.0.zip: xercesImpl-2.11.0.SP5-redhat-1.jar

Description: Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program. The Apache Xerces2 parser is the reference implementation of XNI but other parser components, configurations, and parsers can be written using the Xerces Native Interface. For complete design and implementation documents, refer to the XNI Manual. Xerces2 is a fully conforming XML Schema 1.0 processor. A partial experimental implementation of the XML Schema 1.1 Structures and Datatypes Working Drafts (December 2009) and an experimental implementation of the XML Schema Definition Language (XSD): Component Designators (SCD) Candidate Recommendation (January 2010) are provided for evaluation. For more information, refer to the XML Schema page. Xerces2 also provides a complete implementation of the Document Object Model Level 3 Core and Load/Save W3C Recommendations and provides a complete implementation of the XML Inclusions (XInclude) W3C Recommendation. It also provides support for OASIS XML Catalogs v1.1. Xerces2 is able to parse documents written according to the XML 1.1 Recommendation, except that it does not yet provide an option to enable normalization checking as described in section 2.13 of this specification. It also handles namespaces according to the XML Namespaces 1.1 Recommendation, and will correctly serialize XML 1.1 documents if the DOM level 3 load/save APIs are in use.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/xerces/main/xercesImpl-2.11.0.SP5-redhat-1.jar
MD5: 15dadb01482afd81e978ab931b8f250e
SHA1: 6ca6421e3ee72f7e1d87bdabd7548a43f2801109
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: xerces:xercesImpl:2.11.0.SP5-redhat-1   Confidence:High
  • cpe: cpe:/a:apache:xerces2_java:2.11.0.sp5   Confidence:Low   

jboss-eap-7.1.0.zip: xml-resolver-1.2.0.redhat-11.jar

Description: xml-commons provides an Apache-hosted set of DOM, SAX, and JAXP interfaces for use in other xml-based projects. Our hope is that we can standardize on both a common version and packaging scheme for these critical XML standards interfaces to make the lives of both our developers and users easier.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/xml-resolver/main/xml-resolver-1.2.0.redhat-11.jar
MD5: 91ee5ee077cd7968879b843c6447a7b3
SHA1: 3d909c579ca846d1977a93ef4df5d3d2b783d99e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: xml-resolver:xml-resolver:1.2.0.redhat-11   Confidence:High

jboss-eap-7.1.0.zip: commons-lang-2.6.0.redhat-6.jar

Description: Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/commons/lang/main/commons-lang-2.6.0.redhat-6.jar
MD5: 036c76bda05c1d2a7151a543b8e3c25b
SHA1: 70a52a6ac8e82ac54a7bf5d9e03bb7934e8e9609
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: commons-lang:commons-lang:2.6.0.redhat-6   Confidence:High

jboss-eap-7.1.0.zip: commons-codec-1.10.0.redhat-5.jar

Description: The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/commons/codec/main/commons-codec-1.10.0.redhat-5.jar
MD5: d5a96576803c9609e252a85c39fee1d5
SHA1: 69d0e5d88f531a41085c7d44932ced922fa718fa
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: commons-codec:commons-codec:1.10.0.redhat-5   Confidence:High

jboss-eap-7.1.0.zip: commons-cli-1.3.1.redhat-1.jar

Description: Apache Commons CLI provides a simple API for presenting, processing and validating a command line interface.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/commons/cli/main/commons-cli-1.3.1.redhat-1.jar
MD5: d5b0d9340a50b22db018bfc1b9c97bc7
SHA1: 842e7396fd2f1cb6e50405b37e9309834eff94d9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: commons-cli:commons-cli:1.3.1.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: commons-collections-3.2.2.redhat-2.jar

Description: Types that extend and augment the Java Collections Framework.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/commons/collections/main/commons-collections-3.2.2.redhat-2.jar
MD5: 11c7a27fc3cb10c663bf1257abce6ea2
SHA1: 00a0c4edc12ac11aacb440c9514c7a9e4c43b873
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:apache:commons_collections:3.2.2   Confidence:Low   
  • maven: commons-collections:commons-collections:3.2.2.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: commons-io-2.5.0.redhat-2.jar

Description: The Apache Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/commons/io/main/commons-io-2.5.0.redhat-2.jar
MD5: 7533e50c0c207bf1e8b72c082a6b79f7
SHA1: 560395e04ceed12b042f0e90de785abc15332906
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: commons-io:commons-io:2.5.0.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: commons-beanutils-1.9.3.redhat-1.jar

Description: Apache Commons BeanUtils provides an easy-to-use but flexible wrapper around reflection and introspection.

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/commons/beanutils/main/commons-beanutils-1.9.3.redhat-1.jar
MD5: 3b866886568d779c784e329018e43ffe
SHA1: 45a8dcb9f19bec453e8f238504cc5e382116e91e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:apache:commons_beanutils:1.9.3   Confidence:Low   
  • maven: commons-beanutils:commons-beanutils:1.9.3.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: commons-pool-1.6.0.redhat-9.jar

Description: Commons Object Pooling Library

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/commons/pool/main/commons-pool-1.6.0.redhat-9.jar
MD5: 7995bcfd81c7eea3d0e3253e580b99fc
SHA1: aab065d4883e1829f824605fc5d6a982068f2d3a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: commons-pool:commons-pool:1.6.0.redhat-9   Confidence:High

jboss-eap-7.1.0.zip: xalan-2.7.1.redhat-11.jar

Description: Xalan-Java is an XSLT processor for transforming XML documents into HTML, text, or other XML document types. It implements XSL Transformations (XSLT) Version 1.0 and XML Path Language (XPath) Version 1.0 and can be used from the command line, in an applet or a servlet, or as a module in other program.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/xalan/main/xalan-2.7.1.redhat-11.jar
MD5: fd7746ac1c5399c1d9160371f3ee314e
SHA1: 2500f883822329b4443c6cc49bcd0e665c381cff
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: serializer-2.7.1.redhat-11.jar

Description: Serializer to write out XML, HTML etc. as a stream of characters from an input DOM or from input SAX events.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/xalan/main/serializer-2.7.1.redhat-11.jar
MD5: 06073e2d30c01446e6f032c7973e6d03
SHA1: ea98db33610c86c9fb6465288752ee377bdfa788
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: httpmime-4.5.2.redhat-1.jar

Description: Apache HttpComponents HttpClient - MIME coded entities

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/httpcomponents/main/httpmime-4.5.2.redhat-1.jar
MD5: a0c7098b0d508d65c2fcb44933d86651
SHA1: cdb75ac553ba2a0a7cb9de6078dd8c0e60b6aa9f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:apache:httpclient:4.5.2   Confidence:Low   
  • maven: org.apache.httpcomponents:httpmime:4.5.2.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: httpcore-4.4.4.redhat-1.jar

Description: Apache HttpComponents Core (blocking I/O)

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/httpcomponents/main/httpcore-4.4.4.redhat-1.jar
MD5: 2c9179c0aa4ad0717366aa2012490334
SHA1: 7b261e9761b4c04265f140799ea0d6023f373988
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.httpcomponents:httpcore:4.4.4.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: httpclient-4.5.2.redhat-1.jar

Description: Apache HttpComponents Client

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/httpcomponents/main/httpclient-4.5.2.redhat-1.jar
MD5: 48dc04303857d05ef23341d78da2a7ba
SHA1: acbcbeb7af4587eb31d210f147e09f629157349c
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.httpcomponents:httpclient:4.5.2.redhat-1   Confidence:High
  • cpe: cpe:/a:apache:httpclient:4.5.2   Confidence:Low   

jboss-eap-7.1.0.zip: httpcore-nio-4.4.4.redhat-1.jar

Description: Apache HttpComponents Core (non-blocking I/O)

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/httpcomponents/main/httpcore-nio-4.4.4.redhat-1.jar
MD5: c90142adc2afe7038f5c6836ff311eec
SHA1: 4265799e15145250f3763b1a47d420581465a52e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.httpcomponents:httpcore-nio:4.4.4.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: httpasyncclient-4.1.2.redhat-1.jar

Description: Apache HttpComponents AsyncClient

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/httpcomponents/main/httpasyncclient-4.1.2.redhat-1.jar
MD5: 0b4c778ef82bcec4f3c6264dfc1102fe
SHA1: 068bf746a6917939db598c13db92fdd7abd0fbf4
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.httpcomponents:httpasyncclient:4.1.2.redhat-1   Confidence:High
  • cpe: cpe:/a:apache:httpasyncclient:4.1.2   Confidence:Low   

jboss-eap-7.1.0.zip: neethi-3.0.3.redhat-1.jar

Description: Apache Neethi provides general framework for the programmers to use WS Policy. It is compliant with latest WS Policy specification which was published in March 2006. This framework is specifically written to enable the Apache Web services stack to use WS Policy as a way of expressing it's requirements and capabilities.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/neethi/main/neethi-3.0.3.redhat-1.jar
MD5: 521bab338cfd67ad2b502abf062cfff2
SHA1: ee5b2281f0e6a240a53bcef912aa458a4a6f03c9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:apache:apache_test:3.0.3   Confidence:Low   
  • maven: org.apache.neethi:neethi:3.0.3.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: wss4j-policy-2.1.10.redhat-1.jar

Description: Apache WSS4J parent pom

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/ws/security/main/wss4j-policy-2.1.10.redhat-1.jar
MD5: d7927c18b3e998dd5a2dfc828b668ee9
SHA1: e471db6811e8308550b282daa92228c9b5b012b8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:apache:wss4j:2.1.10   Confidence:Low   
  • maven: org.apache.wss4j:wss4j-policy:2.1.10.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jasypt-1.9.2.redhat-1.jar

Description: Java library which enables encryption in java apps with minimum effort.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/ws/security/main/jasypt-1.9.2.redhat-1.jar
MD5: cea09f5448a0ace3bfbcfc24e7202f57
SHA1: c679ee4c23ad1023bc64d0b2015845cb62c9f4b5
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jasypt:jasypt:1.9.2.redhat-1   Confidence:High
  • cpe: cpe:/a:jasypt_project:jasypt:1.9.2   Confidence:Low   

jboss-eap-7.1.0.zip: xmlschema-core-2.2.1.redhat-1.jar

Description: Commons XMLSchema is a light weight schema object model that can be used to manipulate or generate XML schema.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/ws/xmlschema/main/xmlschema-core-2.2.1.redhat-1.jar
MD5: 7b835b4cbaa26691db851caab3260198
SHA1: d8731e9bcdf3a2fa30b1b32dd9e72fb566ed6d8f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.ws.xmlschema:xmlschema-core:2.2.1.redhat-1   Confidence:High
  • cpe: cpe:/a:ws_project:ws:2.2.1   Confidence:Low   

jboss-eap-7.1.0.zip: lucene-misc-5.3.1.redhat-2.jar

Description: Miscellaneous Lucene extensions

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/lucene/internal/main/lucene-misc-5.3.1.redhat-2.jar
MD5: ce5a5e21d0d70d357a681c15ca03d42c
SHA1: 45355379b244f445483be35d45a69693797ad40f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.lucene:lucene-misc:5.3.1.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: lucene-backward-codecs-5.3.1.redhat-2.jar

Description: Codecs for older versions of Lucene.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/lucene/internal/main/lucene-backward-codecs-5.3.1.redhat-2.jar
MD5: c1a5374eb5bc08777bf7448f1ea62e0b
SHA1: b49bfc344bc5dd6c3246fec9c465e20fddf61cf5
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.lucene:lucene-backward-codecs:5.3.1.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: lucene-analyzers-common-5.3.1.redhat-2.jar

Description: Additional Analyzers

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/lucene/main/lucene-analyzers-common-5.3.1.redhat-2.jar
MD5: 15ec25113aa2cf95ab1c240b419df1b7
SHA1: 64739646dcbec9e5afcd2da887214e7add0737aa
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.lucene:lucene-analyzers-common:5.3.1.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: lucene-core-5.3.1.redhat-2.jar

Description: Apache Lucene Java Core

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/lucene/main/lucene-core-5.3.1.redhat-2.jar
MD5: 7db495c612be8589df56a6622951cdc4
SHA1: 96011e1819470b066061d6e5a2c7a956a334cc7f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.lucene:lucene-core:5.3.1.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: lucene-queries-5.3.1.redhat-2.jar

Description: Lucene Queries Module

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/lucene/main/lucene-queries-5.3.1.redhat-2.jar
MD5: f460bdf406cea999f9019d1626cb7243
SHA1: 3220df9c6c2fa4c03fba33c7e3dce805579c5b10
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.lucene:lucene-queries:5.3.1.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: lucene-queryparser-5.3.1.redhat-2.jar

Description: Lucene QueryParsers module

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/lucene/main/lucene-queryparser-5.3.1.redhat-2.jar
MD5: e0c505e9f086ad044f40aa2e409b3727
SHA1: 61da5dae165b3195b6c52f9f46794f8cf2f1e3b6
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.lucene:lucene-queryparser:5.3.1.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: lucene-facet-5.3.1.redhat-2.jar

Description: Package for Faceted Indexing and Search

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/lucene/main/lucene-facet-5.3.1.redhat-2.jar
MD5: 57d7803385c30147b1d223c333fb92fd
SHA1: 8a917d1d4c212d23136733e6ef1c735f2c40250d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.lucene:lucene-facet:5.3.1.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: cxf-core-3.1.12.redhat-1.jar

Description: Apache CXF Core

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/cxf/main/cxf-core-3.1.12.redhat-1.jar
MD5: 103917aacd57c7fa314fe36a8c05755c
SHA1: f8a405ca769a72d87482cb449c671b165d4f2520
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:apache:cxf:3.1.12   Confidence:Highest   
  • maven: org.apache.cxf:cxf-core:3.1.12.redhat-1   Confidence:High

CVE-2017-12624  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

Apache CXF supports sending and receiving attachments via either the JAX-WS or JAX-RS specifications. It is possible to craft a message attachment header that could lead to a Denial of Service (DoS) attack on a CXF web service provider. Both JAX-WS and JAX-RS services are vulnerable to this attack. From Apache CXF 3.2.1 and 3.1.14, message attachment headers that are greater than 300 characters will be rejected by default. This value is configurable via the property "attachment-max-header-size".

Vulnerable Software & Versions: (show all)

CVE-2018-8039  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-254 Security Features

It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: cxf-xjc-dv-3.0.5.redhat-2.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/cxf/impl/main/cxf-xjc-dv-3.0.5.redhat-2.jar
MD5: 55ece8a7ae52bc295a33f4486ef20b4a
SHA1: 4f9f7ae931fd643833a67b1c8a72cff9da49109c
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.cxf.xjcplugins:cxf-xjc-dv:3.0.5.redhat-2   Confidence:High
  • cpe: cpe:/a:apache:cxf:3.0.5   Confidence:Highest   

CVE-2015-5253  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The SAML Web SSO module in Apache CXF before 2.7.18, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote authenticated users to bypass authentication via a crafted SAML response with a valid signed assertion, related to a "wrapping attack."

Vulnerable Software & Versions: (show all)

CVE-2016-6812  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client.

Vulnerable Software & Versions: (show all)

CVE-2016-8739  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

The JAX-RS module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 provides a number of Atom JAX-RS MessageBodyReaders. These readers use Apache Abdera Parser which expands XML entities by default which represents a major XXE risk.

Vulnerable Software & Versions: (show all)

CVE-2017-12624  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

Apache CXF supports sending and receiving attachments via either the JAX-WS or JAX-RS specifications. It is possible to craft a message attachment header that could lead to a Denial of Service (DoS) attack on a CXF web service provider. Both JAX-WS and JAX-RS services are vulnerable to this attack. From Apache CXF 3.2.1 and 3.1.14, message attachment headers that are greater than 300 characters will be rejected by default. This value is configurable via the property "attachment-max-header-size".

Vulnerable Software & Versions: (show all)

CVE-2017-3156  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-361 Time and State

The OAuth2 Hawk and JOSE MAC Validation code in Apache CXF prior to 3.0.13 and 3.1.x prior to 3.1.10 is not using a constant time MAC signature comparison algorithm which may be exploited by sophisticated timing attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-5653  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-20 Improper Input Validation

JAX-RS XML Security streaming clients in Apache CXF before 3.1.11 and 3.0.13 do not validate that the service response was signed or encrypted, which allows remote attackers to spoof servers.

Vulnerable Software & Versions: (show all)

CVE-2017-5656  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-384

Apache CXF's STSClient before 3.1.11 and 3.0.13 uses a flawed way of caching tokens that are associated with delegation tokens, which means that an attacker could craft a token which would return an identifer corresponding to a cached token for another user.

Vulnerable Software & Versions: (show all)

CVE-2018-8039  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-254 Security Features

It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: cxf-services-ws-discovery-api-3.1.12.redhat-1.jar

Description: Apache CXF WS-Discovery API

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/cxf/impl/main/cxf-services-ws-discovery-api-3.1.12.redhat-1.jar
MD5: 43bc8903ca3c75df3b97322e880d2ec6
SHA1: b15ae6f68baa11b268de52aae27985925c3f9f5f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:ws_project:ws:3.1.12   Confidence:Low   
  • maven: org.apache.cxf.services.ws-discovery:cxf-services-ws-discovery-api:3.1.12.redhat-1   Confidence:High
  • cpe: cpe:/a:apache:cxf:3.1.12   Confidence:Highest   

CVE-2017-12624  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

Apache CXF supports sending and receiving attachments via either the JAX-WS or JAX-RS specifications. It is possible to craft a message attachment header that could lead to a Denial of Service (DoS) attack on a CXF web service provider. Both JAX-WS and JAX-RS services are vulnerable to this attack. From Apache CXF 3.2.1 and 3.1.14, message attachment headers that are greater than 300 characters will be rejected by default. This value is configurable via the property "attachment-max-header-size".

Vulnerable Software & Versions: (show all)

CVE-2018-8039  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-254 Security Features

It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: cxf-xjc-runtime-3.0.5.redhat-2.jar

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/cxf/impl/main/cxf-xjc-runtime-3.0.5.redhat-2.jar
MD5: 9cca4b4e04f2c5c427b811a61f69b574
SHA1: e9363403e9a0104b86779b04bcdde90976f4c87b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.cxf.xjc-utils:cxf-xjc-runtime:3.0.5.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: velocity-1.7.0.redhat-5.jar

Description: Apache Velocity is a general purpose template engine.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/velocity/main/velocity-1.7.0.redhat-5.jar
MD5: 72e31dd31a1cd4c1340c547d70a870f4
SHA1: 3e68ca164edab3f8e0b8b8f261724b34078c039b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.velocity:velocity:1.7.0.redhat-5   Confidence:High

jboss-eap-7.1.0.zip: jipijapa-openjpa-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/openjpa/main/jipijapa-openjpa-7.1.0.GA-redhat-11.jar
MD5: e16bbe52fa09b5226706d2158f9f9ae0
SHA1: 0bb46716a361b9fdb5ef2e3b6fcdf7d4cf718e6e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:jipijapa-openjpa:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: artemis-journal-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/journal/main/artemis-journal-1.5.5.008-redhat-1.jar
MD5: 25e14771f38b566f843bc43c842206d2
SHA1: c53a9b57a2e72242b7e6fbcff84dda4eb7f7743f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-journal:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-native-1.5.5.008-redhat-1.jar

Description: The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.

License:

http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/journal/main/artemis-native-1.5.5.008-redhat-1.jar
MD5: 66b4b010d98ff00763a1d5a7c1b2179b
SHA1: af8fef2782237b7797e0d57a609958ac99f6bbc9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

CVE-2010-1151  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Race condition in the mod_auth_shadow module for the Apache HTTP Server allows remote attackers to bypass authentication, and read and possibly modify data, via vectors related to improper interaction with an external helper application for validation of credentials.

Vulnerable Software & Versions:

CVE-2014-3581  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: artemis-commons-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/journal/main/artemis-commons-1.5.5.008-redhat-1.jar
MD5: 759e86712382deaaddd3158034f86860
SHA1: 7afb7f0808ead7fdad0bd5f55c167b15119dc2f6
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-commons:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-core-client-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/main/artemis-core-client-1.5.5.008-redhat-1.jar
MD5: 0561afe34f437fcb19eb968473192a85
SHA1: a9d66ed9d17a2bd0fb0b994ca1ce7c777cd3d436
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-core-client:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-jdbc-store-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/main/artemis-jdbc-store-1.5.5.008-redhat-1.jar
MD5: 0a24fd500e771f0f4f4a6a2d674e5fff
SHA1: 8ac1918746185e1c634483f27634562bbf2def5e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-jdbc-store:1.5.5.008-redhat-1   Confidence:High
  • cpe: cpe:/a:oracle:jdbc:1.5.5.008   Confidence:Low   

jboss-eap-7.1.0.zip: artemis-cli-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/main/artemis-cli-1.5.5.008-redhat-1.jar
MD5: fed7861cd698b583ca4b935097d7e444
SHA1: 98f854cae491d60bc8168cc8b3243e7defb8204b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-cli:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-service-extensions-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/main/artemis-service-extensions-1.5.5.008-redhat-1.jar
MD5: 81d2f6382f2da62994663337c562a965
SHA1: 230145084d3007c1dda89b22aea70cf71d512e01
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-service-extensions:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-server-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/main/artemis-server-1.5.5.008-redhat-1.jar
MD5: 51e33376f3964d278fe5cf25a53aa93e
SHA1: 1eb56c4a7edd918c81ef026ed51e4c89d4e29dcc
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-server:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-jms-server-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/main/artemis-jms-server-1.5.5.008-redhat-1.jar
MD5: 678aaf6801cb6232a8c644193c95b003
SHA1: 1050fa07ba7e613b019e5bbf2d76aed0eb775aad
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-jms-server:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-selector-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/main/artemis-selector-1.5.5.008-redhat-1.jar
MD5: b9f626145f8ec03405511387b7da7d50
SHA1: 3979c35eb9dbff6c4d02eb19a673b9daee4a89df
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-selector:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-jms-client-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/main/artemis-jms-client-1.5.5.008-redhat-1.jar
MD5: 8ac5271948d1f081bd27454e6716b42b
SHA1: 918a9af0477ae11bb02e7a1dd482a243ebffd11e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-jms-client:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-dto-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/main/artemis-dto-1.5.5.008-redhat-1.jar
MD5: 31b2affe7830d75e346901a5bf3aced4
SHA1: 24e6f5126b9a9655f1329dab7bcb612453fcae11
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-dto:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: artemis-ra-1.5.5.008-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/apache/activemq/artemis/ra/main/artemis-ra-1.5.5.008-redhat-1.jar
MD5: fd748b8d87be2b279cf2e94acbe7120e
SHA1: d920f28c381ff9420918861f679e38f8fa1c99f7
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.apache.activemq:artemis-ra:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: snakeyaml-1.17.0.redhat-1.jar

Description: YAML 1.1 parser and emitter for Java

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/yaml/snakeyaml/main/snakeyaml-1.17.0.redhat-1.jar
MD5: 76ca8d310e1eb9b74bd2e03b3969008b
SHA1: 3a77d5422693f9dc0339a9642e048f1468368203
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.yaml:snakeyaml:1.17.0.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jsoup-1.8.3.redhat-2.jar

Description: jsoup HTML parser

License:

The MIT License: http://jsoup.org/license
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jsoup/main/jsoup-1.8.3.redhat-2.jar
MD5: a89d8a3f16bd8f01e082a2f4e9bb8856
SHA1: fb92eabbf2ada8cf43590166c027058ec0d0ccfa
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

CVE-2015-6748  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in jsoup before 1.8.3.

Vulnerable Software & Versions:

jboss-eap-7.1.0.zip: jgroups-azure-1.1.0.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jgroups/azure/main/jgroups-azure-1.1.0.Final-redhat-1.jar
MD5: bf8ef87f3a5cabf5c49bc51a9434c15b
SHA1: f685c90614fbf6e9038ddbd4a727612b91f54cad
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jgroups.azure:jgroups-azure:1.1.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jgroups-3.6.13.Final-redhat-2.jar

Description: Reliable cluster communication toolkit

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jgroups/main/jgroups-3.6.13.Final-redhat-2.jar
MD5: 8f0e1e489d080ba12000e81e22f4a73f
SHA1: 4e1ff092afc2b037bdd96f634252f496bf8f1a77
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jgroups:jgroups:3.6.13.Final-redhat-2   Confidence:High

jboss-eap-7.1.0.zip: hornetq-commons-2.4.7.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hornetq/client/main/hornetq-commons-2.4.7.Final-redhat-1.jar
MD5: 420acef6f7b69196e1605a74bda9ca60
SHA1: 65ece1c993295db946dff8bc98a8133a5c9b1d28
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.hornetq:hornetq-commons:2.4.7.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: hornetq-core-client-2.4.7.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hornetq/client/main/hornetq-core-client-2.4.7.Final-redhat-1.jar
MD5: ad5f40402d8d186a0d3361db5c11f8e5
SHA1: abfd4b67aff1821510762e4e9a62df178d251f8f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.hornetq:hornetq-core-client:2.4.7.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: hornetq-jms-client-2.4.7.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/hornetq/client/main/hornetq-jms-client-2.4.7.Final-redhat-1.jar
MD5: 2c3e257d1bf3080175507bfbb0d515a9
SHA1: 7f265ce76486089a68ba9a020006c95d98f67918
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.hornetq:hornetq-jms-client:2.4.7.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: javax.json-1.0.4.redhat-1.jar

Description: Default provider for JSR 353:Java API for Processing JSON

License:

https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/glassfish/javax/json/main/javax.json-1.0.4.redhat-1.jar
MD5: 2bfa4e10093a30d7132c220de8419d75
SHA1: 1bd2941744951fd41e6650a4c96f49d7f3488fe8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.glassfish:javax.json:1.0.4.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: javax.el-impl-3.0.1.b08-redhat-1.jar

Description: Expression Language 3.0 API

License:

https://glassfish.dev.java.net/nonav/public/CDDL+GPL.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/glassfish/javax/el/main/javax.el-impl-3.0.1.b08-redhat-1.jar
MD5: b7188c415257616839693d1ab8596884
SHA1: 5795fba430ef119a1fe99be3dfc2d10009e0218a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

CVE-2013-2566  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-310 Cryptographic Issues

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.

Vulnerable Software & Versions: (show all)

CVE-2015-2808  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-310 Cryptographic Issues

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: javax.enterprise.concurrent-1.0.0.redhat-1.jar

Description: Reference Implementation for JSR 236 - Concurrency Utilities for Java EE

License:

CDDL 1.1: http://glassfish.java.net/public/CDDL+GPL_1_1.html
GPL2 w/ CPE: http://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/glassfish/javax/enterprise/concurrent/main/javax.enterprise.concurrent-1.0.0.redhat-1.jar
MD5: 484ba987a77503d152cb41a23bd0adfe
SHA1: a61545dd0014a3a8ccc663cf368896e943a31e9d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.glassfish:javax.enterprise.concurrent:1.0.0.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jettison-1.3.8.redhat-1.jar

Description: A StAX implementation for JSON.

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/codehaus/jettison/main/jettison-1.3.8.redhat-1.jar
MD5: 3e9b92b9382543f3bfd4ec31cd2cb008
SHA1: 185dc51bc87ebc1f1fd4e2273c45bbbca249c702
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.codehaus.jettison:jettison:1.3.8.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: stax2-api-3.1.4.redhat-1.jar

Description: tax2 API is an extension to basic Stax 1.0 API that adds significant new functionality, such as full-featured bi-direction validation interface and high-performance Typed Access API.

License:

The BSD License: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/codehaus/woodstox/main/stax2-api-3.1.4.redhat-1.jar
MD5: 84d4b3a931c13aa6ff49b05f4cde12e7
SHA1: 01bbf535b4bab8391d3098ec5f668a1571a1fbbb
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.codehaus.woodstox:stax2-api:3.1.4.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: woodstox-core-5.0.3.redhat-1.jar

Description: Woodstox is a high-performance XML processor that implements Stax (JSR-173), SAX2 and Stax2 APIs

License:

The Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/codehaus/woodstox/main/woodstox-core-5.0.3.redhat-1.jar
MD5: 41311aad921b4948c59af34fd8af2e72
SHA1: f7141bae7fdb2ce3e8747ffb0908bb0209eb2bdb
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.fasterxml.woodstox:woodstox-core:5.0.3.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jackson-core-asl-1.9.13.redhat-4.jar

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/codehaus/jackson/jackson-core-asl/main/jackson-core-asl-1.9.13.redhat-4.jar
MD5: 438bc8c814721a3973d05dbd20f62b7d
SHA1: 8bda20c79aae9c56de01d604b80b4f58326b2999
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:fasterxml:jackson:1.9.13   Confidence:Low   

CVE-2016-3720  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

XML external entity (XXE) vulnerability in XmlMapper in the Data format extension for Jackson (aka jackson-dataformat-xml) allows attackers to have unspecified impact via unknown vectors.

Vulnerable Software & Versions:

CVE-2016-7051  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-918 Server-Side Request Forgery (SSRF)

XmlMapper in the Jackson XML dataformat component (aka jackson-dataformat-xml) before 2.7.8 and 2.8.x before 2.8.4 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: dom4j-1.6.1.redhat-7.jar

Description: dom4j: the flexible XML framework for Java

License:

BSD: http://dom4j.sourceforge.net/dom4j-1.6.1/license.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/dom4j/main/dom4j-1.6.1.redhat-7.jar
MD5: 06a3b53d8961f498af8ec66475d0696b
SHA1: f64c7d93fa54ca5f9ab91c0b0cfdea9192f43e57
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

CVE-2018-1000632  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CWE: CWE-91 XML Injection (aka Blind XPath Injection)

dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: picketlink-wildfly8-2.5.5.SP8-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/picketlink/federation/bindings/main/picketlink-wildfly8-2.5.5.SP8-redhat-1.jar
MD5: 3acc86eab9786a258ab74ec156e8e987
SHA1: 801198e45eceb0b77659f6180a2e90c5dd05fd16
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:2.5.5.sp8   Confidence:Low   
  • cpe: cpe:/a:picketlink:picketlink:2.5.5.sp8   Confidence:Low   

CVE-2015-0277  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.

Vulnerable Software & Versions:

CVE-2015-3158  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The invokeNextValve function in identity/federation/bindings/tomcat/idp/AbstractIDPValve.java in PicketLink before 2.8.0.Beta1 does not properly check role based authorization, which allows remote authenticated users to gain access to restricted application resources via a (1) direct request or (2) request through an SP initiated flow.

Vulnerable Software & Versions:

CVE-2015-6254  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)
CWE: CWE-17 Code

The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.

Vulnerable Software & Versions:

jboss-eap-7.1.0.zip: picketlink-api-2.5.5.SP8-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/picketlink/core/api/main/picketlink-api-2.5.5.SP8-redhat-1.jar
MD5: 0ec8043d3c32f4254c67b72f8b220703
SHA1: 8415a072bafa2c4f1750d35f5ab3927c866df06e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.picketlink:picketlink-api:2.5.5.SP8-redhat-1   Confidence:High
  • cpe: cpe:/a:picketlink:picketlink:2.5.5.sp8   Confidence:Low   

CVE-2015-0277  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.

Vulnerable Software & Versions:

CVE-2015-3158  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The invokeNextValve function in identity/federation/bindings/tomcat/idp/AbstractIDPValve.java in PicketLink before 2.8.0.Beta1 does not properly check role based authorization, which allows remote authenticated users to gain access to restricted application resources via a (1) direct request or (2) request through an SP initiated flow.

Vulnerable Software & Versions:

CVE-2015-6254  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)
CWE: CWE-17 Code

The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.

Vulnerable Software & Versions:

jboss-eap-7.1.0.zip: antlr-2.7.7.redhat-7.jar

Description: A framework for constructing recognizers, compilers, and translators from grammatical descriptions containing Java, C#, C++, or Python actions.

License:

BSD License: http://www.antlr.org/license.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/antlr/main/antlr-2.7.7.redhat-7.jar
MD5: b9d43ef33ae3ca88c790868b634a20ea
SHA1: b5ab4ed13ba1acc28719691b1c5f950dfd99f150
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: antlr:antlr:2.7.7.redhat-7   Confidence:High

jboss-eap-7.1.0.zip: ecj-4.6.1.redhat-1.jar

Description: Eclipse JDT Core Batch Compiler

License:

Eclipse Public License v1.0: http://www.eclipse.org/org/documents/epl-v10.php
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/eclipse/jdt/ecj/main/ecj-4.6.1.redhat-1.jar
MD5: 1e2e22133acdb9e0733d387f47cb1c98
SHA1: 29b88b333a77a3dcda995843753a9b7820f73687
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.eclipse.jdt.core.compiler:ecj:4.6.1.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jipijapa-eclipselink-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/eclipse/persistence/main/jipijapa-eclipselink-7.1.0.GA-redhat-11.jar
MD5: 852767930c3ae1a5d6bdf95bc7c229be
SHA1: 4e47b45028356d4c84046c5c9d69d4579a485f29
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:jipijapa-eclipselink:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: netty-xnio-transport-0.1.2.Final-redhat-1.jar

License:

ASL 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xnio/netty/netty-xnio-transport/main/netty-xnio-transport-0.1.2.Final-redhat-1.jar
MD5: 0f8f7affe9d346120c21c77fb1de02df
SHA1: 7661fdca3fabb0a291196ed2b66823c420a5a6b9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.xnio.netty:netty-xnio-transport:0.1.2.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:netty_project:netty:0.1.2   Confidence:Low   

CVE-2014-3488  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

Vulnerable Software & Versions: (show all)

CVE-2015-2156  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-20 Improper Input Validation

Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: xnio-nio-3.5.4.Final-redhat-1.jar

Description: The NIO implementation of the XNIO project

License:

http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xnio/nio/main/xnio-nio-3.5.4.Final-redhat-1.jar
MD5: 7083c77ee808604a66beef83b2ef8732
SHA1: 6453d51a55e02125c63f3a31306a3fb0f19c23bc
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.xnio:xnio-nio:3.5.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: xnio-api-3.5.4.Final-redhat-1.jar

Description: The API JAR of the XNIO project

License:

http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xnio/main/xnio-api-3.5.4.Final-redhat-1.jar
MD5: 8cb5fcf41fc658f480fa1c62e885e6ba
SHA1: 61b5bf2485674d734a7c21e05a32c329d904ddab
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.xnio:xnio-api:3.5.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-integration-5.5.30.Final-redhat-1.jar

Description: Narayana: ArjunaJTS integration (atx)

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/integration/main/narayana-jts-integration-5.5.30.Final-redhat-1.jar
MD5: e52511c23803ed5f7c81772f13f711aa
SHA1: d6928fbcdfd7bae2451939d4b09638447401de83
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.narayana.jts:narayana-jts-integration:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar
MD5: d2982d424db5c09653fa9ee8e47c24e8
SHA1: a5ef8806b6d79fb2969e5d2b1c68c597b24e9923
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jboss-remoting-5.0.5.Final-redhat-1.jar

Description: JBoss Remoting

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/remoting/main/jboss-remoting-5.0.5.Final-redhat-1.jar
MD5: 156becc6dd2e9a88a11a9f136ff17d7f
SHA1: 2e7d7ec96d118354da2817acb3e12ce151af6477
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.remoting:jboss-remoting:5.0.5.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-invocation-1.5.0.Final-redhat-1.jar

Description: Invocation Application Programming Interface

License:

Apache License 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/invocation/main/jboss-invocation-1.5.0.Final-redhat-1.jar
MD5: 3bf3ca1296d605b076628d14bacbcd8c
SHA1: dd910d5ec477a35f68bef9bcdff1ce9bd1fb4ece
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.invocation:jboss-invocation:1.5.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-stdio-1.0.2.GA-redhat-2.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/stdio/main/jboss-stdio-1.0.2.GA-redhat-2.jar
MD5: 3b641b4f682f3dfb698e4a60556f2a9e
SHA1: 684399d0e96b27b70cf6db35a67e30fef646766a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.stdio:jboss-stdio:1.0.2.GA-redhat-2   Confidence:High

jboss-eap-7.1.0.zip: jboss-negotiation-common-3.0.4.Final-redhat-1.jar

Description: JBoss Negotiation Library

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/security/negotiation/main/jboss-negotiation-common-3.0.4.Final-redhat-1.jar
MD5: cb3b09abda8814d033c29308000726cd
SHA1: 1149a6b982ccc3661d06359d82b65abdd0edc44f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.security:jboss-negotiation-common:3.0.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-negotiation-ntlm-3.0.4.Final-redhat-1.jar

Description: JBoss Negotiation Library

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/security/negotiation/main/jboss-negotiation-ntlm-3.0.4.Final-redhat-1.jar
MD5: 9281aec320efb09efb0607277140b1d8
SHA1: d97bf0aa96b78f1a8bd6b76e27054feaeff2b4af
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.security:jboss-negotiation-ntlm:3.0.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-negotiation-extras-3.0.4.Final-redhat-1.jar

Description: JBoss Negotiation Library

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/security/negotiation/main/jboss-negotiation-extras-3.0.4.Final-redhat-1.jar
MD5: 1299405e15878ef996add7eac2d252c2
SHA1: a72ff6a3bd1c7d39bffbc0e640e5261c9d085d31
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.security:jboss-negotiation-extras:3.0.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-negotiation-spnego-3.0.4.Final-redhat-1.jar

Description: JBoss Negotiation Library

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/security/negotiation/main/jboss-negotiation-spnego-3.0.4.Final-redhat-1.jar
MD5: 3618d4e75c46ad68455a5e8c1ebbb625
SHA1: e23978544c6aee6e34cb1ad73b59e02d8de1f007
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.security:jboss-negotiation-spnego:3.0.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxacml-2.0.8.Final-redhat-8.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/security/xacml/main/jbossxacml-2.0.8.Final-redhat-8.jar
MD5: ce9f0692c08f9eef3498559bcf1bfabb
SHA1: 70a6510cfe46d3b82791cc66faf28df8547499d8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jandex-2.0.3.Final-redhat-1.jar

Description: Parent POM for JBoss projects. Provides default project build configuration.

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jandex/main/jandex-2.0.3.Final-redhat-1.jar
MD5: 9051cbe57804d3eb5c7eb82d660ec2ec
SHA1: 09cb2926002f8ca1b77f30fdcb48337713dd94e7
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss:jandex:2.0.3.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-ejb3-ext-api-2.2.0.Final-redhat-1.jar

Description: JBoss EJB 3 API for Bean Providers

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ejb3/main/jboss-ejb3-ext-api-2.2.0.Final-redhat-1.jar
MD5: 61cdd58e39721e42398cf06ca8d51330
SHA1: c716a8c458b0c7c8a49b71f8cff4f459d3d5a8e6
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ejb3:jboss-ejb3-ext-api:2.2.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-classfilewriter-1.2.1.Final-redhat-1.jar

Description: A bytecode writer that creates .class files at runtime

License:

Apache License, version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/classfilewriter/main/jboss-classfilewriter-1.2.1.Final-redhat-1.jar
MD5: 0d72a68927a63dd32b1b829bfa950c5b
SHA1: c292a5131843823c4d42dcedb2f52417065ce6c0
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.classfilewriter:jboss-classfilewriter:1.2.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbossxts-5.5.30.Final-redhat-1.jar
MD5: b919941039f178abce41f6ec55225581
SHA1: 93ab5c186f24221d5de8a3bdf04e572006e7ab75
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jbosstxbridge-5.5.30.Final-redhat-1.jar

Description: Narayana: txbridge

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbosstxbridge-5.5.30.Final-redhat-1.jar
MD5: f7cb1d9a6c16cd55fcff3573f11e62a2
SHA1: 86860cd8a65e7c5b694c32c989149bf87dd6ff1d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.narayana:jbosstxbridge:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: staxmapper-1.3.0.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/staxmapper/main/staxmapper-1.3.0.Final-redhat-1.jar
MD5: 3a9f966db9794035d9dde90973b1fc34
SHA1: 6360bd3dea3263bce07cbe4a1c7a482e3999ebe1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss:staxmapper:1.3.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: remoting-jmx-3.0.0.Final-redhat-1.jar

License:

GNU Lesser General Public License v2.1 or later: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/remoting-jmx/main/remoting-jmx-3.0.0.Final-redhat-1.jar
MD5: 58a5cc62b2c749875d85499196e57d24
SHA1: 04358fb38edff5f84605e789bea3c88796a53692
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.remotingjmx:remoting-jmx:3.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-metadata-ejb-10.0.2.Final-redhat-1.jar

Description: The JavaEE EJB metadata classes

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/metadata/ejb/main/jboss-metadata-ejb-10.0.2.Final-redhat-1.jar
MD5: c581470681c2af80c71d08992f2cf848
SHA1: 2910c39f928d046cae59b54a5ce637ff1644e16b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.metadata:jboss-metadata-ejb:10.0.2.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-metadata-common-10.0.2.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/metadata/common/main/jboss-metadata-common-10.0.2.Final-redhat-1.jar
MD5: e17c9d30a6fa5fb9a45dbbff29a4da8b
SHA1: c8d9c36ca6785b9c40cd5f22fe0c9cb0cbf3e28f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.metadata:jboss-metadata-common:10.0.2.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-metadata-ear-10.0.2.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/metadata/ear/main/jboss-metadata-ear-10.0.2.Final-redhat-1.jar
MD5: 775ba629d7fc7d7a856d53462f3353ac
SHA1: 19c7e81128edf48e95b883b83f9bf2b91e82c875
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.metadata:jboss-metadata-ear:10.0.2.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-metadata-web-10.0.2.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/metadata/web/main/jboss-metadata-web-10.0.2.Final-redhat-1.jar
MD5: ef7a868757f4dccb96355cd830e18556
SHA1: 974f7e423db823d7551e769720ae24a7ca74e362
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.metadata:jboss-metadata-web:10.0.2.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-metadata-appclient-10.0.2.Final-redhat-1.jar

Description: The JavaEE App Client metadata classes

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/metadata/appclient/main/jboss-metadata-appclient-10.0.2.Final-redhat-1.jar
MD5: 34e6a223602ba34fe52b12d4668f7b9f
SHA1: 7585248647822dccc72103102f3ab66026a8ceac
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.metadata:jboss-metadata-appclient:10.0.2.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: ironjacamar-core-api-1.4.6.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ironjacamar/api/main/ironjacamar-core-api-1.4.6.Final-redhat-1.jar
MD5: 924aa54b05acf8eba9da3eb0cd3f0b6a
SHA1: 1e2eb9264e2c78f2797ae27d2b39b8ebadfb3557
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:jboss:ironjacamar:1.4.6   Confidence:Low   

jboss-eap-7.1.0.zip: jboss-transaction-spi-7.6.0.Final-redhat-1.jar

Description: The Java Transaction SPI classes

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jboss-transaction-spi/main/jboss-transaction-spi-7.6.0.Final-redhat-1.jar
MD5: e2a096a38ea30b9827d2d5898dadfc0c
SHA1: 5572ef0f81e7ca0616741314287fe72d1b44a1d3
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss:jboss-transaction-spi:7.6.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-seam-int-jbossas.jar

Description: JBoss Seam Int JBossAS

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/integration/ext-content/main/bundled/jboss-seam-int-jbossas.jar
MD5: 08d171750bfca907627a1dcc041f5e23
SHA1: 8341b8812f153340d67d8bca4672c15e02308d08
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:jboss:seam:7.0.0   Confidence:Low   
  • maven: org.jboss.seam.integration:jboss-seam-int-jbossas:7.0.0.GA-redhat-2   Confidence:High

jboss-eap-7.1.0.zip: aesh-0.66.19.redhat-1.jar

Description: Æsh (Another Extendable SHell)

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/aesh/main/aesh-0.66.19.redhat-1.jar
MD5: 5b9c37bde2d864c32695bc7e402c3cb9
SHA1: 00fdc911148a8fda6c14d46fd0e44ca088489563
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.aesh:aesh:0.66.19.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-cxf-jaspi-5.1.9.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/jaxws-client/main/jbossws-cxf-jaspi-5.1.9.Final-redhat-1.jar
MD5: 1da9afbd076d43aae59ff418685a3940
SHA1: 98f38420f78be655072eef367982df17f3e36d03
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws.cxf:jbossws-cxf-jaspi:5.1.9.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-cxf-client-5.1.9.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/jaxws-client/main/jbossws-cxf-client-5.1.9.Final-redhat-1.jar
MD5: 36d05cc36f115108af52eea731d506d4
SHA1: 709d9ae1953ccbde6a14b1c6df4374436e57e19b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws.cxf:jbossws-cxf-client:5.1.9.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-common-3.1.5.Final-redhat-1.jar

Description: JBossWS Common

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/common/main/jbossws-common-3.1.5.Final-redhat-1.jar
MD5: d4bcafe606d5abdd1299593480693a82
SHA1: 2e958a88330a9d3726f83440bb5f22553f143385
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws:jbossws-common:3.1.5.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-spi-3.1.4.Final-redhat-1.jar

Description: JBossWS SPI

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/spi/main/jbossws-spi-3.1.4.Final-redhat-1.jar
MD5: 102d4668e60a1a9221521ba6f8802f21
SHA1: db77a450e0d618c6ea3591c0fc9debb5aa186955
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws:jbossws-spi:3.1.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-common-tools-1.2.4.Final-redhat-1.jar

Description: JBossWS Common Tools

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/tools/common/main/jbossws-common-tools-1.2.4.Final-redhat-1.jar
MD5: e6bb4b7bc7b5e66ad5f1c262dca651c8
SHA1: 599f53e3d258e95692e20f049cf549d7f6dc2b06
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws:jbossws-common-tools:1.2.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jaxws-undertow-httpspi-1.0.1.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/jaxws-undertow-httpspi/main/jaxws-undertow-httpspi-1.0.1.Final-redhat-1.jar
MD5: 59e448d1ef8430d83e9b3b6c2711689a
SHA1: f9fcd07b2424ff32fc95e2b7a31402c68bc23c4f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws.projects:jaxws-undertow-httpspi:1.0.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-api-1.0.3.Final-redhat-1.jar

Description: JBossWS API

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/api/main/jbossws-api-1.0.3.Final-redhat-1.jar
MD5: 673f6294ba9f91c5bc317130695f8d75
SHA1: bcd58abb64f7b1f8cca355ed36e9a2b287111523
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws:jbossws-api:1.0.3.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-cxf-transports-udp-5.1.9.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/cxf/jbossws-cxf-transports-udp/main/jbossws-cxf-transports-udp-5.1.9.Final-redhat-1.jar
MD5: 2b2ddf12e87770b3689b9bea1b22263a
SHA1: ec681cb24bd1835c703ee70d43db6eb3f986e83b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws.cxf:jbossws-cxf-transports-udp:5.1.9.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-cxf-transports-undertow-5.1.9.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/cxf/jbossws-cxf-transports-undertow/main/jbossws-cxf-transports-undertow-5.1.9.Final-redhat-1.jar
MD5: ff3f096660225db59e227fc6d5f7baa2
SHA1: 48d95a52195dd2f82213609e0ad1c471d99f17d9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws.cxf:jbossws-cxf-transports-undertow:5.1.9.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-cxf-factories-5.1.9.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/cxf/jbossws-cxf-factories/main/jbossws-cxf-factories-5.1.9.Final-redhat-1.jar
MD5: 696650be15b31fb234be31f82b7e311a
SHA1: df57772ea509eb3d9d789386e0840a0070434a82
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws.cxf:jbossws-cxf-factories:5.1.9.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossws-cxf-server-5.1.9.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ws/cxf/jbossws-cxf-server/main/jbossws-cxf-server-5.1.9.Final-redhat-1.jar
MD5: 1275877dfbfbbe071a19b6792785b302
SHA1: 2c753a07f54177a944194f6ac2a5c689df21709b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws.cxf:jbossws-cxf-server:5.1.9.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-threads-2.2.1.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/threads/main/jboss-threads-2.2.1.Final-redhat-1.jar
MD5: 143251aff9d7064b93f4025e239a4a49
SHA1: 916cf66a12307ad9da83212bc6d420f514a26913
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.threads:jboss-threads:2.2.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-marshalling-river-2.0.2.Final-redhat-1.jar

Description: JBoss Marshalling River Implementation

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/marshalling/river/main/jboss-marshalling-river-2.0.2.Final-redhat-1.jar
MD5: 4eabcf2f354781bcfc3b87f97cc0374d
SHA1: 09254fb6d383b4d1d80644a911976d46c86bb1f0
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.marshalling:jboss-marshalling-river:2.0.2.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-marshalling-2.0.2.Final-redhat-1.jar

Description: JBoss Marshalling API

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/marshalling/main/jboss-marshalling-2.0.2.Final-redhat-1.jar
MD5: bc1b17280733b892e5d04dcc5858a56b
SHA1: 8e08cad8214afacea285f72e1f3a4909f4fc5432
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.marshalling:jboss-marshalling:2.0.2.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: txframework-5.5.30.Final-redhat-1.jar

Description: Narayana: txframework

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/narayana/txframework/main/txframework-5.5.30.Final-redhat-1.jar
MD5: 5ac4d4b450965b5e6a089658923442de
SHA1: 0818316a2914b6d482243b158fe07365d9787062
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.narayana.txframework:txframework:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: compensations-5.5.30.Final-redhat-1.jar

Description: Narayana: compensations

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/narayana/compensations/main/compensations-5.5.30.Final-redhat-1.jar
MD5: d8a26cfa42ecfeed934420dadb9d0a5e
SHA1: 6979f185731b525a5cd0eb5b338dcd1bdf9502a2
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.narayana.compensations:compensations:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: restat-integration-5.5.30.Final-redhat-1.jar

Description: REST-AT Integration

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/narayana/rts/main/restat-integration-5.5.30.Final-redhat-1.jar
MD5: 94e27759e679ec92971afc9bec18f141
SHA1: 3f61c952dde3c4161d2842739874da99cd90ca03
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.narayana.rts:restat-integration:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: restat-util-5.5.30.Final-redhat-1.jar

Description: Utility methods to make it easy to conform to the RESTAT specification

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/narayana/rts/main/restat-util-5.5.30.Final-redhat-1.jar
MD5: 3599099e93b5c26b3a80a042a8c30688
SHA1: 7c17e1f8a0ce89f8c99b1182c75d191a1215b702
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.narayana.rts:restat-util:5.5.30.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:util-linux_project:util-linux:5.5.30   Confidence:Low   

CVE-2015-5224  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks.

Vulnerable Software & Versions:

CVE-2016-5011  

Severity: Medium
CVSS Score: 4.7 (AV:L/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: restat-bridge-5.5.30.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/narayana/rts/main/restat-bridge-5.5.30.Final-redhat-1.jar
MD5: 25a24674585af9aadb2b5938628278f3
SHA1: 09d4ad813a9405c5a4cf957606b3a377eb18ae5f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.narayana.rts:restat-bridge:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: restat-api-5.5.30.Final-redhat-1.jar

Description: A JAX-RS service that implements the RESTAT specification

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/narayana/rts/main/restat-api-5.5.30.Final-redhat-1.jar
MD5: 7240d4161295edea689793691d89b89e
SHA1: f49d4a331b59f1567ce32141829d69ab3184ff32
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.narayana.rts:restat-api:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-common-beans-2.0.0.Final-redhat-1.jar

Description: Common classes for Java Beans

License:

lgpl: http://repository.jboss.org/licenses/lgpl-2.1.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/common-beans/main/jboss-common-beans-2.0.0.Final-redhat-1.jar
MD5: d1dde40a57c8b73af9a3fcb663c31ce9
SHA1: 179050f9b6edb94b438074d217f90dee005de62e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.common:jboss-common-beans:2.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-msc-1.2.7.SP1-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/msc/main/jboss-msc-1.2.7.SP1-redhat-1.jar
MD5: 53fc850b283a619f430821c3c7acec8a
SHA1: 3c4b09ad75ac62c4981dbe59fed6781f6eb66bf2
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.msc:jboss-msc:1.2.7.SP1-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-dmr-1.4.1.Final-redhat-1.jar

License:

GNU Lesser General Public License v2.1 only: http://repository.jboss.org/licenses/lgpl-2.1.txt
Apache License 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/dmr/main/jboss-dmr-1.4.1.Final-redhat-1.jar
MD5: 9d2fb18c15e6b23d94ce9e092823cfd1
SHA1: 7c99702849b66e11a9b7da480599000016cc8f7a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss:jboss-dmr:1.4.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: log4j-jboss-logmanager-1.1.4.Final-redhat-1.jar

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/log4j/logmanager/main/log4j-jboss-logmanager-1.1.4.Final-redhat-1.jar
MD5: b64830f927f227c23f417e168b3d6174
SHA1: aa4358a2a69e13567f83b43a2394e61d9530abcf
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.logmanager:log4j-jboss-logmanager:1.1.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-ejb-client-4.0.9.Final-redhat-1.jar

Description: Client library for EJB applications working against Wildfly

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/ejb-client/main/jboss-ejb-client-4.0.9.Final-redhat-1.jar
MD5: bb0eea75dfdb3da2acc7deaab445a003
SHA1: 630e91afa22463acc0765b8fd303e08759b4b2b8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss:jboss-ejb-client:4.0.9.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-iiop-client-1.0.1.Final-redhat-1.jar

Description: Client library for EJB applications working against JBoss AS using the IIOP protocol

License:

Apache License Version 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/iiop-client/main/jboss-iiop-client-1.0.1.Final-redhat-1.jar
MD5: 2f0f7369a2cf42caafdcc90d87fa6801
SHA1: f339e7087939a1115a101a72ba4834594a83c3bf
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss:jboss-iiop-client:1.0.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: commons-logging-jboss-logmanager-1.0.2.Final-redhat-1.jar

Description: An Apache Commons Logging implementation for JBoss Log Manager

License:

Apache License 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/logmanager/commons/logging/main/commons-logging-jboss-logmanager-1.0.2.Final-redhat-1.jar
MD5: 2bed67bb4e2e6652c45167e50ffa5f34
SHA1: 4b8448dee2a16528af738833e065d8b46f0ebdd8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.logmanager:commons-logging-jboss-logmanager:1.0.2.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-logmanager-2.0.7.Final-redhat-1.jar

Description: An implementation of java.util.logging.LogManager

License:

Apache License Version 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/logmanager/main/jboss-logmanager-2.0.7.Final-redhat-1.jar
MD5: b48195da0a320776c749478dcd64f012
SHA1: 71416a62e64487c0b34674a0c22cb4025e69185a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.logmanager:jboss-logmanager:2.0.7.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-vfs-3.2.12.Final-redhat-1.jar

Description: A VFS library

License:

asl: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/vfs/main/jboss-vfs-3.2.12.Final-redhat-1.jar
MD5: ba36c611ac9948f2e8a697e922651d66
SHA1: 61cde620fccd0f9f294aaa5a8a5511a324b8ef83
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss:jboss-vfs:3.2.12.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: mod_cluster-container-spi-1.3.7.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/mod_cluster/container/spi/main/mod_cluster-container-spi-1.3.7.Final-redhat-1.jar
MD5: 1a4c5e17b92b6644c1b881be9aa6df0a
SHA1: 8a316c50ce6571d3f41ce93550e5d5c7f5f49cd9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.mod_cluster:mod_cluster-container-spi:1.3.7.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: mod_cluster-core-1.3.7.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/mod_cluster/core/main/mod_cluster-core-1.3.7.Final-redhat-1.jar
MD5: 5f3c7c9aa575e2dc99fafc9e01fd5325
SHA1: 9350397e7f6101bff92d38f658f9792b7612acb2
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.mod_cluster:mod_cluster-core:1.3.7.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: wildfly-web-common-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/web-common/main/wildfly-web-common-7.1.0.GA-redhat-11.jar
MD5: d0fe6e5f2ab08793cb7fd4c2df291fbd
SHA1: b6e1bed8fd14e7fa469d47d6e43c4871bd9e00e3
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:wildfly-web-common:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: release-stream-2.9.15.Final-redhat-1-resources.jar

Description: HAL release stream master. Implements the assembly.

License:

GNU Lesser General Public License v2.1 only: http://repository.jboss.org/licenses/lgpl-2.1.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/console/eap/release-stream-2.9.15.Final-redhat-1-resources.jar
MD5: ab194e3b015e87d817236921939c87cb
SHA1: de73e5f2e1b125aec7c094114936621a69abb4fc
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.hal:release-stream:2.9.15.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jipijapa-spi-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/jpa/spi/main/jipijapa-spi-7.1.0.GA-redhat-11.jar
MD5: c662ad226496bf22a106ca5cbf5db3c4
SHA1: d2871c9acce3d52a1883710abc522b3ba2f1c84f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:jipijapa-spi:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: wildfly-ejb3-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/ejb3/main/wildfly-ejb3-7.1.0.GA-redhat-11.jar
MD5: b7bbea917e12aa1f1699a4529e426cb2
SHA1: a6fb287bbe907433505b4106b7c2c12ca055a397
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:wildfly-ejb3:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: wildfly-system-jmx-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/system-jmx/main/wildfly-system-jmx-7.1.0.GA-redhat-11.jar
MD5: 27d12d4662511f0423222c4284f5c308
SHA1: b41613742937b809253fd62ac9682c31f50ef7a8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:wildfly-system-jmx:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: wildfly-core-security-3.0.10.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/core-security/main/wildfly-core-security-3.0.10.Final-redhat-1.jar
MD5: 6435cba1b88f800091a5981b2805b209
SHA1: 3b83c00461adad59500eeab27012fa81c79b7832
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.wildfly.core:wildfly-core-security:3.0.10.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:3.0.10   Confidence:Low   

jboss-eap-7.1.0.zip: weld-core-jsf-2.4.3.Final-redhat-1.jar

Description: Weld's JSF support

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/jsf-injection/main/weld-core-jsf-2.4.3.Final-redhat-1.jar
MD5: b50bdca3523d14581a954a59e39f4cfa
SHA1: 3ecfaf4ff9cbd730d62123b367bb43b55c2079d8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.weld:weld-core-jsf:2.4.3.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: wildfly-ee-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/ee/main/wildfly-ee-7.1.0.GA-redhat-11.jar
MD5: 500cad68ca2bd94cf5010ec63761570f
SHA1: 1642aa6860329b22af65719bc24c7af9b675f2bb
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:wildfly-ee:7.1.0.GA-redhat-11   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:7.1.0   Confidence:Low   

jboss-eap-7.1.0.zip: wildfly-jsr77-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/jsr77/main/wildfly-jsr77-7.1.0.GA-redhat-11.jar
MD5: 48eb39b10f17d0e6ff1340872c5ac3b7
SHA1: 93cafbfceee399a519e4143b41cc8314487ecdfc
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:wildfly-jsr77:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: jbossws-cxf-resources-5.1.9.Final-redhat-1-wildfly1100.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/as/webservices/main/jbossws-cxf-resources-5.1.9.Final-redhat-1-wildfly1100.jar
MD5: 87c26335d5160c0ac55fd439e4c0b5ef
SHA1: 2ce077a32e4df52a1482458aee343f685ebd018a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.ws.cxf:jbossws-cxf-resources:5.1.9.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-yaml-provider-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-yaml-provider/main/resteasy-yaml-provider-3.0.24.Final-redhat-1.jar
MD5: 0f30d1c89e6d7f6b18bb2392c24c5cac
SHA1: ae1868ed54c11d934a1d174c74c1b0631229b477
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-yaml-provider:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-cdi-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-cdi/main/resteasy-cdi-3.0.24.Final-redhat-1.jar
MD5: 799bfe5507038d102973f0576b94d121
SHA1: 3c2806d248d82e971b853dcf8093e8074a364edd
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-cdi:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-client-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-jaxrs/main/resteasy-client-3.0.24.Final-redhat-1.jar
MD5: c013818cee11950a7ec50058c0a7a1c8
SHA1: 27ca147993856ef18c684b87c7567e74263a590e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-client:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-jaxrs-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-jaxrs/main/resteasy-jaxrs-3.0.24.Final-redhat-1.jar
MD5: 660a6a872a5dba7f095e550639e8f499
SHA1: 4725619ab02be21d6c4f78f814888625d0f031b0
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-jaxrs:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-crypto-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-crypto/main/resteasy-crypto-3.0.24.Final-redhat-1.jar
MD5: 1e703bfc89abb8528ac81af80d41a302
SHA1: a02359c9fa32b3de5183850e70f85584f3664ec7
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-crypto:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-atom-provider-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-atom-provider/main/resteasy-atom-provider-3.0.24.Final-redhat-1.jar
MD5: 435baa4e661eeee739610f024abd1bea
SHA1: cffdc4cda39eb1b521798cf1d87bb1d73271d740
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-atom-provider:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-multipart-provider-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-multipart-provider/main/resteasy-multipart-provider-3.0.24.Final-redhat-1.jar
MD5: 345485bcbe10491dc7f7326bdb6931ea
SHA1: c25e8a831c1d425122436393ece24c4c8a808fe7
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-multipart-provider:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-jackson-provider-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-jackson-provider/main/resteasy-jackson-provider-3.0.24.Final-redhat-1.jar
MD5: a2f876f78204e08f8299879b3b5c5029
SHA1: 0e2724bb1c72d5aff3c2c11f5bb7175012d54eaf
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-jackson-provider:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-validator-provider-11-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-validator-provider-11/main/resteasy-validator-provider-11-3.0.24.Final-redhat-1.jar
MD5: e95b4bbc86c0c1cb956729ca8e56b42d
SHA1: 3824576a3ce7e8ab0970d6d86fa372bdbb848483
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-validator-provider-11:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-spring-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-spring/main/bundled/resteasy-spring-jar/resteasy-spring-3.0.24.Final-redhat-1.jar
MD5: 8f23642acb703505f8288386e564fcc7
SHA1: a7a45e8eeaeb586e9714df508340f3ffcda9f5db
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-spring:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-jaxb-provider-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-jaxb-provider/main/resteasy-jaxb-provider-3.0.24.Final-redhat-1.jar
MD5: 8dbcb9b4c8243f7a24e138614d0661ee
SHA1: 796415ae3ed0c252db8a72392cb4be874920099e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-jaxb-provider:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-jackson2-provider-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-jackson2-provider/main/resteasy-jackson2-provider-3.0.24.Final-redhat-1.jar
MD5: 8d047208bfb49bbaa9f9ae91a34d9f87
SHA1: 42429a385d0e96a408ceac971f0b21c2373cac51
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-jackson2-provider:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jose-jwt-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/jose-jwt/main/jose-jwt-3.0.24.Final-redhat-1.jar
MD5: eb7396903ea39d6d4ca0cd79217fa298
SHA1: 4c6e3953425754824e5450ddd71b648b9271b8d1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:jwt_project:jwt:3.0.24   Confidence:Low   
  • maven: org.jboss.resteasy:jose-jwt:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-json-p-provider-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-json-p-provider/main/resteasy-json-p-provider-3.0.24.Final-redhat-1.jar
MD5: 80f02980d23961d561ebb0fc259b68ac
SHA1: 6570fb47ff8853fda939b5636ae7cecff080a9a3
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-json-p-provider:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-jettison-provider-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-jettison-provider/main/resteasy-jettison-provider-3.0.24.Final-redhat-1.jar
MD5: 7573ee054ffaafd83b1ff218e02a9c20
SHA1: b5e661966a8b3e9726c675deb10d5541c4fd3830
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-jettison-provider:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: resteasy-jsapi-3.0.24.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/resteasy/resteasy-jsapi/main/resteasy-jsapi-3.0.24.Final-redhat-1.jar
MD5: b9245a5da1b838bc1a2a4a4548edd45b
SHA1: 3b15041d4055ad8d8a0524925d79f0ebd31c34bf
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.resteasy:resteasy-jsapi:3.0.24.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-eap7.1-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-eap7.1-1.0.3.Final-redhat-4.jar
MD5: 034f4b72ce24d9b372b17feed7b80379
SHA1: cc9f2fdeea9b77cc2d6ab276abc94fb71f4d0a55
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-eap7.1:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly10.0-to-eap7.1-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly10.0-to-eap7.1-1.0.3.Final-redhat-4.jar
MD5: dd5eb08ce705617776baac3db541f620
SHA1: 29d5627c92a4525573f0deaa7879ff868014cac1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly10.0-to-eap7.1:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly10.0-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly10.0-1.0.3.Final-redhat-4.jar
MD5: b88a538c7177ccdc0991ea15b3f5ecbb
SHA1: cef3f5421a5a6bdb145242488d69f2bbbf58da6b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly10.0:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly8.2-to-eap7.0-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly8.2-to-eap7.0-1.0.3.Final-redhat-4.jar
MD5: 13d121afcb692a90d9549f0059b104bf
SHA1: f163bf7a3bfe6ef32634e8d90b43fca1cc8b8497
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly8.2-to-eap7.0:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-eap7.0-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-eap7.0-1.0.3.Final-redhat-4.jar
MD5: 32707ca8c13465d654d28693abb88bd2
SHA1: 8d731a8e60ce92c666d652a3a32f806e012089c5
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-eap7.0:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly9.0-to-eap7.1-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly9.0-to-eap7.1-1.0.3.Final-redhat-4.jar
MD5: d83808b91419dbe70bc51e8609e40a64
SHA1: 38f721074062eca72ab644099b238a5cba1e4d82
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly9.0-to-eap7.1:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly8.2-to-eap7.1-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly8.2-to-eap7.1-1.0.3.Final-redhat-4.jar
MD5: e1f17f93bbcce06734db73acaac5c926
SHA1: c143df8f9cd11aec58a717c8db7f003ea82867d5
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly8.2-to-eap7.1:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-eap6.4-to-eap7.1-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-eap6.4-to-eap7.1-1.0.3.Final-redhat-4.jar
MD5: f590a586fe3b70253aa221c92479350b
SHA1: f62955059c1d0f2a99e29b358ab1fd6903d26d72
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-eap6.4-to-eap7.1:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly10.1-to-eap7.1-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly10.1-to-eap7.1-1.0.3.Final-redhat-4.jar
MD5: ac31dbd6b6e161a12814ba818bee3388
SHA1: d7da61fe785d7a5b50d3a3d3f0679c37beb47206
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly10.1-to-eap7.1:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-core-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-core-1.0.3.Final-redhat-4.jar
MD5: 2fbc3f9d342c51ecc40e2906c912c7be
SHA1: 86525c67979e1f9b4c7146a4c9b3125db16070ca
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-core:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-eap7.0-to-eap7.1-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-eap7.0-to-eap7.1-1.0.3.Final-redhat-4.jar
MD5: e1208a2425c586b3e7e662f1b41ae81b
SHA1: 5ea79e88e360d6fe44988580a29ac8527a898bd8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-eap7.0-to-eap7.1:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-cli-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-cli-1.0.3.Final-redhat-4.jar
MD5: ff05cb4e7ceaa47ec3611c7329694972
SHA1: ae7f850813fb99f31236292497e3849e01094d9c
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-cli:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-eap6.4-to-eap7.0-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-eap6.4-to-eap7.0-1.0.3.Final-redhat-4.jar
MD5: d6ec90b4a3d266464eb0ed9bd371e545
SHA1: 7eef267ad5be3b29274224adc6f54ae75cfc9e54
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-eap6.4-to-eap7.0:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly9.0-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly9.0-1.0.3.Final-redhat-4.jar
MD5: 69cd4ffb5b59e8f7d25295dad1ae0468
SHA1: 4a88fc82306d8ef9fc53a7db2bf1e3f61792f356
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly9.0:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly8.2-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly8.2-1.0.3.Final-redhat-4.jar
MD5: 4e4f6651274d542441df1abae4046612
SHA1: fcab4d3da83f54cbf819e916cfcdbd30fede1170
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly8.2:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly10.1-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly10.1-1.0.3.Final-redhat-4.jar
MD5: ee3ea8f9eb18d335fe051c8485099f64
SHA1: fc3d4e364403798bfe6c69c691cf7a6c6479c6df
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly10.1:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-wildfly9.0-to-eap7.0-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-wildfly9.0-to-eap7.0-1.0.3.Final-redhat-4.jar
MD5: 064d48e34e2b2d836463668f29880728
SHA1: f96128036faca9241acd55a5546af5a9cd144f50
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-wildfly9.0-to-eap7.0:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-server-migration-eap6.4-1.0.3.Final-redhat-4.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/migration/cli/main/jboss-server-migration-eap6.4-1.0.3.Final-redhat-4.jar
MD5: be34b52ac0db8e5797fbe96eb0f44164
SHA1: 8783da1b59fe3c5af9b836187b99f5ae7a835218
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.migration:jboss-server-migration-eap6.4:1.0.3.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: generic-jms-ra-jar-2.0.0.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/genericjms/main/generic-jms-ra-jar-2.0.0.Final-redhat-1.jar
MD5: 012fa9898c9a2fc03a88e290d82c60d6
SHA1: fe145a05e09202eabcfef063d3a9f52815b75f80
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.genericjms:generic-jms-ra-jar:2.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-jaxb-intros-1.0.2.GA-redhat-8.jar

License:

lgpl: http://repository.jboss.com/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jaxbintros/main/jboss-jaxb-intros-1.0.2.GA-redhat-8.jar
MD5: f595ca6ad73135ab7e3c2fa4702a0597
SHA1: 716f8a060eb7b1f0b0c1bc7c97b8f57fac3d6397
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: jboss.jaxbintros:jboss-jaxb-intros:1.0.2.GA-redhat-8   Confidence:High

jboss-eap-7.1.0.zip: weld-spi-2.4.0.SP1-redhat-1.jar

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/weld/spi/main/weld-spi-2.4.0.SP1-redhat-1.jar
MD5: 119e4008d76c3d3e154a309067be1dc3
SHA1: 8b84656593ec5dd15af4696b630ced9dee4ac441
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.weld:weld-spi:2.4.0.SP1-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: weld-probe-core-2.4.3.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/weld/probe/main/weld-probe-core-2.4.3.Final-redhat-1.jar
MD5: 27bd12e25eba34552c48cbd9dce01784
SHA1: 106466bec2fcd1a268eed1c2b2944c195b595c11
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.weld.probe:weld-probe-core:2.4.3.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: weld-api-2.4.0.SP1-redhat-1.jar

Description: Weld specifc extensions to the CDI API

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/weld/api/main/weld-api-2.4.0.SP1-redhat-1.jar
MD5: b1c1bfa076b2842aded673a039784c5e
SHA1: 7a30de494b96c6a71e37b993c8fc9b4f8f949cdc
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.weld:weld-api:2.4.0.SP1-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: weld-core-impl-2.4.3.Final-redhat-1.jar

Description: Weld's implementation of CDI

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/weld/core/main/weld-core-impl-2.4.3.Final-redhat-1.jar
MD5: 85f4c84004a55c7d0a8c29ac94b34a2e
SHA1: af048a74919c60f7551916201e217d2d63837d50
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.weld:weld-core-impl:2.4.3.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jul-to-slf4j-stub-1.0.1.Final-redhat-3.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/logging/jul-to-slf4j-stub/main/jul-to-slf4j-stub-1.0.1.Final-redhat-3.jar
MD5: 2934b2b93eb437aa91196a9c90768328
SHA1: 833fd0d67e218b5b3e195928b563f15e2ed13e23
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.logging:jul-to-slf4j-stub:1.0.1.Final-redhat-3   Confidence:High
  • cpe: cpe:/a:slf4j:slf4j:1.0.1   Confidence:Low   

jboss-eap-7.1.0.zip: jboss-logging-3.3.1.Final-redhat-1.jar

Description: The JBoss Logging Framework

License:

Apache License, version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/logging/main/jboss-logging-3.3.1.Final-redhat-1.jar
MD5: 4fb47ba48d1745d153a417ab7426439d
SHA1: fd88ce696154fc637ec195a31706aee0ce82b563
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.logging:jboss-logging:3.3.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jdom-1.1.3.redhat-3.jar

Description: A complete, Java-based solution for accessing, manipulating, and outputting XML data

License:

The Apache Software License, Version 2.0: https://raw.github.com/hunterhacker/jdom/master/LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jdom/main/jdom-1.1.3.redhat-3.jar
MD5: a90fe3210ab260b2df6a9ae4c19c65a4
SHA1: f4f94e407f3922624e438c5744d19a45b16b3c5e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jdom:jdom:1.1.3.redhat-3   Confidence:High

jboss-eap-7.1.0.zip: wildfly-http-ejb-client-1.0.8.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/http-client/ejb/main/wildfly-http-ejb-client-1.0.8.Final-redhat-1.jar
MD5: 7add449a7ad2f1ac8fd03fc0be5431f6
SHA1: 9e0b9eee322925b323aa395372416922eb3b9dcd
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:1.0.8   Confidence:Low   
  • maven: org.wildfly.wildfly-http-client:wildfly-http-ejb-client:1.0.8.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: wildfly-transaction-client-1.0.2.Final-redhat-1.jar

Description: Client library for applications using transactions with Wildfly

License:

Apache License 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/transaction/client/main/wildfly-transaction-client-1.0.2.Final-redhat-1.jar
MD5: 87844e9a0758814b475b19ead1527c9e
SHA1: cc1aa8882f3fb9c446ba9bbd6492b8598d09b80c
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.wildfly.transaction:wildfly-transaction-client:1.0.2.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:1.0.2   Confidence:Low   

jboss-eap-7.1.0.zip: wildfly-elytron-1.1.7.Final-redhat-1.jar

Description: WildFly Security SPIs

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/security/elytron-private/main/wildfly-elytron-1.1.7.Final-redhat-1.jar
MD5: 4a272c9577d882bd1d0b178cf5cb6987
SHA1: 21d3edb4532ea22411e0ed97ed73019a884b334e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:1.1.7   Confidence:Low   
  • maven: org.wildfly.security:wildfly-elytron:1.1.7.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: undertow-server-1.0.1.Final-redhat-1.jar

Description: Integration project for integrating Elytron based HTTP authentication with Undertow.

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/security/elytron-web/undertow-server/main/undertow-server-1.0.1.Final-redhat-1.jar
MD5: e6ba59cf7fc60d1ca272e9b8a95b5446
SHA1: 7275d75d45eccf2c626803ae612aa6743a21826d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.wildfly.security.elytron-web:undertow-server:1.0.1.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:1.0.1   Confidence:Low   

jboss-eap-7.1.0.zip: wildfly-common-1.2.0.Final-redhat-1.jar

Description: Parent POM for JBoss projects. Provides default project build configuration.

License:

Apache License 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/common/main/wildfly-common-1.2.0.Final-redhat-1.jar
MD5: ae04259df4e14621aa36571f5ffca652
SHA1: 23c0657d506f55e33889df0853560083a605c6c1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.wildfly.common:wildfly-common:1.2.0.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:1.2.0   Confidence:Low   

jboss-eap-7.1.0.zip: wildfly-naming-client-1.0.7.Final-redhat-1.jar

License:

Apache License 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/naming-client/main/wildfly-naming-client-1.0.7.Final-redhat-1.jar
MD5: c7d81b6e08b9ccfc5c08b927d7afbd30
SHA1: 1db4a0d8270ae72258ecbce44e503adfe1e4a6e6
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:1.0.7   Confidence:Low   
  • maven: org.wildfly:wildfly-naming-client:1.0.7.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: wfssl.dll

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/openssl/main/lib/win-i386/wfssl.dll
MD5: 99c529048d86412a4dcb685fd004109d
SHA1: 2bbcbc2d52fde8120082f69cec38841b5c8daf93
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: wfssl.dll

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/openssl/main/lib/win-x86_64/wfssl.dll
MD5: b323c2817234903529746f9b40f010f3
SHA1: bc510c6d4374fb70890502e3c6340fe731828675
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: wildfly-openssl-java-1.0.2.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/openssl/main/wildfly-openssl-java-1.0.2.Final-redhat-1.jar
MD5: caa05eb323a23004f27e4671c9a246e1
SHA1: 67c0e5cdda57ab92f453f99eb8c5ab03bdee949c
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:openssl:openssl:1.0.2   Confidence:Highest   
  • maven: org.wildfly.openssl:wildfly-openssl-java:1.0.2.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:openssl_project:openssl:1.0.2   Confidence:Low   
  • cpe: cpe:/a:wildfly:wildfly:1.0.2   Confidence:Low   

CVE-1999-0428  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.

Vulnerable Software & Versions: (show all)

CVE-2007-5536  

Severity: Medium
CVSS Score: 4.9 (AV:L/AC:L/Au:N/C:N/I:N/A:C)

Unspecified vulnerability in OpenSSL before A.00.09.07l on HP-UX B.11.11, B.11.23, and B.11.31 allows local users to cause a denial of service via unspecified vectors.

Vulnerable Software & Versions:

CVE-2009-0590  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.

Vulnerable Software & Versions: (show all)

CVE-2013-0169  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)
CWE: CWE-310 Cryptographic Issues

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

Vulnerable Software & Versions: (show all)

CVE-2014-0160  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Vulnerable Software & Versions: (show all)

CVE-2015-0207  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DTLS 1.0 traffic to a DTLS 1.2 server.

Vulnerable Software & Versions: (show all)

CVE-2015-0208  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verification feature.

Vulnerable Software & Versions: (show all)

CVE-2015-0209  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.

Vulnerable Software & Versions: (show all)

CVE-2015-0285  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-310 Cryptographic Issues

The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.

Vulnerable Software & Versions: (show all)

CVE-2015-0286  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-17 Code

The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.

Vulnerable Software & Versions: (show all)

CVE-2015-0287  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-17 Code

The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.

Vulnerable Software & Versions: (show all)

CVE-2015-0288  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.

Vulnerable Software & Versions: (show all)

CVE-2015-0289  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.

Vulnerable Software & Versions: (show all)

CVE-2015-0290  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-17 Code

The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I/O cases, which allows remote attackers to cause a denial of service (pointer corruption and application crash) via unspecified vectors.

Vulnerable Software & Versions: (show all)

CVE-2015-0291  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.

Vulnerable Software & Versions: (show all)

CVE-2015-0293  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.

Vulnerable Software & Versions: (show all)

CVE-2015-1787  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a ClientKeyExchange message with a length of zero.

Vulnerable Software & Versions: (show all)

CVE-2015-1788  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.

Vulnerable Software & Versions: (show all)

CVE-2015-1789  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.

Vulnerable Software & Versions: (show all)

CVE-2015-1790  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.

Vulnerable Software & Versions: (show all)

CVE-2015-1791  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.

Vulnerable Software & Versions: (show all)

CVE-2015-1792  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.

Vulnerable Software & Versions: (show all)

CVE-2015-1794  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.

Vulnerable Software & Versions: (show all)

CVE-2015-3193  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.

Vulnerable Software & Versions: (show all)

CVE-2015-3194  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.

Vulnerable Software & Versions: (show all)

CVE-2015-3195  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-200 Information Exposure

The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.

Vulnerable Software & Versions: (show all)

CVE-2015-3197  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.

Vulnerable Software & Versions: (show all)

CVE-2015-4000  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-310 Cryptographic Issues

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

Vulnerable Software & Versions: (show all)

CVE-2016-0701  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.

Vulnerable Software & Versions: (show all)

CVE-2016-0702  

Severity: Low
CVSS Score: 1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.

Vulnerable Software & Versions: (show all)

CVE-2016-0703  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

Vulnerable Software & Versions: (show all)

CVE-2016-0704  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

Vulnerable Software & Versions: (show all)

CVE-2016-0705  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.

Vulnerable Software & Versions: (show all)

CVE-2016-0797  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.

Vulnerable Software & Versions: (show all)

CVE-2016-0798  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.

Vulnerable Software & Versions: (show all)

CVE-2016-0799  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.

Vulnerable Software & Versions: (show all)

CVE-2016-0800  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

Vulnerable Software & Versions: (show all)

CVE-2016-2105  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.

Vulnerable Software & Versions: (show all)

CVE-2016-2106  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.

Vulnerable Software & Versions: (show all)

CVE-2016-2107  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.

Vulnerable Software & Versions: (show all)

CVE-2016-2108  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.

Vulnerable Software & Versions: (show all)

CVE-2016-2109  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.

Vulnerable Software & Versions: (show all)

CVE-2016-2176  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.

Vulnerable Software & Versions: (show all)

CVE-2016-2177  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.

Vulnerable Software & Versions: (show all)

CVE-2016-2178  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.

Vulnerable Software & Versions: (show all)

CVE-2016-2179  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.

Vulnerable Software & Versions: (show all)

CVE-2016-2180  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-125 Out-of-bounds Read

The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.

Vulnerable Software & Versions: (show all)

CVE-2016-2181  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.

Vulnerable Software & Versions: (show all)

CVE-2016-2182  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-787 Out-of-bounds Write

The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2016-2842  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799.

Vulnerable Software & Versions: (show all)

CVE-2016-6302  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.

Vulnerable Software & Versions: (show all)

CVE-2016-6303  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-787 Out-of-bounds Write

Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2016-6304  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.

Vulnerable Software & Versions: (show all)

CVE-2016-6306  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-125 Out-of-bounds Read

The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.

Vulnerable Software & Versions: (show all)

CVE-2016-7055  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)
CWE: CWE-320 Key Management Errors

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.

Vulnerable Software & Versions: (show all)

CVE-2016-8610  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

Vulnerable Software & Versions: (show all)

CVE-2017-3731  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-125 Out-of-bounds Read

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

Vulnerable Software & Versions: (show all)

CVE-2017-3732  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.

Vulnerable Software & Versions: (show all)

CVE-2017-3735  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

Vulnerable Software & Versions: (show all)

CVE-2017-3736  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.

Vulnerable Software & Versions: (show all)

CVE-2017-3738  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.

Vulnerable Software & Versions: (show all)

CVE-2018-0732  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-320 Key Management Errors

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

Vulnerable Software & Versions: (show all)

CVE-2018-12433  

Severity: Low
CVSS Score: 1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

** DISPUTED ** cryptlib through 3.4.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. NOTE: the vendor does not include side-channel attacks within its threat model.

Vulnerable Software & Versions: (show all)

CVE-2018-12437  

Severity: Low
CVSS Score: 1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

LibTomCrypt through 1.18.1 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Vulnerable Software & Versions: (show all)

CVE-2018-12438  

Severity: Low
CVSS Score: 1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The Elliptic Curve Cryptography library (aka sunec or libsunec) allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: wildfly-clustering-marshalling-jboss-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/clustering/marshalling/jboss/main/wildfly-clustering-marshalling-jboss-7.1.0.GA-redhat-11.jar
MD5: 1130a9742297a414f0bcb798eb580f7d
SHA1: 3df00a60b533b5e9f36636845c71cdf15e786b94
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:wildfly-clustering-marshalling-jboss:7.1.0.GA-redhat-11   Confidence:High

jboss-eap-7.1.0.zip: wildfly-clustering-ee-infinispan-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/clustering/ee/infinispan/main/wildfly-clustering-ee-infinispan-7.1.0.GA-redhat-11.jar
MD5: 00763bd4fdd4c2d7586dfa8fdc3f6474
SHA1: 4b32446c327d4dacc602b50a1cb32f6bc6ef5fe6
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:7.1.0   Confidence:Low   
  • cpe: cpe:/a:infinispan:infinispan:7.1.0   Confidence:Highest   
  • maven: org.jboss.eap:wildfly-clustering-ee-infinispan:7.1.0.GA-redhat-11   Confidence:High

CVE-2016-0750  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-15089  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-2638  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CWE: CWE-287 Improper Authentication

It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: wildfly-client-config-1.0.0.Final-redhat-1.jar

Description: Library for supporting WildFly common client configuration

License:

Apache License 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/client/config/main/wildfly-client-config-1.0.0.Final-redhat-1.jar
MD5: 31ed2839f63468ebc141f98810b87f7e
SHA1: 82b23f17749d65014caab7725f1ddf78296a7565
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.wildfly.client:wildfly-client-config:1.0.0.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:1.0.0   Confidence:Low   

jboss-eap-7.1.0.zip: artemis-wildfly-integration-1.0.2.redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/extension/messaging-activemq/main/artemis-wildfly-integration-1.0.2.redhat-1.jar
MD5: 307cb91f63d4e5bc5497187f9fd9eaf4
SHA1: 340301400b9899050a9529139ace0fb0ea97f528
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.activemq.artemis.integration:artemis-wildfly-integration:1.0.2.redhat-1   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:1.0.2   Confidence:Low   

jboss-eap-7.1.0.zip: wildfly-picketlink-7.1.0.GA-redhat-11.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/wildfly/extension/picketlink/main/wildfly-picketlink-7.1.0.GA-redhat-11.jar
MD5: a50acaf4dec0e97d09d061e3f46c5bf8
SHA1: 46075fbb53e81bab420a91f0facdb897e0286aff
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.eap:wildfly-picketlink:7.1.0.GA-redhat-11   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:7.1.0   Confidence:Low   
  • cpe: cpe:/a:picketlink:picketlink:7.1.0   Confidence:Low   

plf-enterprise-jbosseap-package-5.2.x-SNAPSHOT.zip: exo-push-notifications-service-1.1.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/com/exoplatform/platform/distributions/plf-enterprise-jbosseap-package/5.2.x-SNAPSHOT/plf-enterprise-jbosseap-package-5.2.x-SNAPSHOT.zip/platform-5.2.x-SNAPSHOT-jboss/standalone/deployments/platform.ear/lib/exo-push-notifications-service-1.1.x-SNAPSHOT.jar
MD5: 82ec1ece3f59c43757d272646b6601e0
SHA1: 44facda227287a98386bb59f7c46c1aaf8a15b04
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.exoplatform.addons.push-notifications:exo-push-notifications-service:1.1.x-SNAPSHOT   Confidence:High

jboss-eap-7.1.0.zip: cryptacular-1.2.0.redhat-1.jar

Description: The spectacular complement to the Bouncy Castle crypto API for Java.

License:

Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt
GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl-3.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/opensaml/main/cryptacular-1.2.0.redhat-1.jar
MD5: 9f18f2d65ebc64a4a191277719bf47bc
SHA1: b29fa8322a8d850f77fbe01e4b85a1e4b6fae305
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.cryptacular:cryptacular:1.2.0.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: opensaml-core-3.1.1.redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/opensaml/main/opensaml-core-3.1.1.redhat-1.jar
MD5: cabb7ad4ba5db22adc8dded93fe8dda2
SHA1: a9f3c5389b98c4d4451b8979b3624a72c79c10c7
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.opensaml:opensaml-core:3.1.1.redhat-1   Confidence:High
  • cpe: cpe:/a:shibboleth:opensaml:3.1.1   Confidence:Low   

jboss-eap-7.1.0.zip: java-support-7.1.1.redhat-2.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/opensaml/main/java-support-7.1.1.redhat-2.jar
MD5: a490511db09c70a64b1f997afdf1752f
SHA1: c076e58a793b4acae22b597e92d970a1b06e0bc8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: net.shibboleth.utilities:java-support:7.1.1.redhat-2   Confidence:High
  • cpe: cpe:/a:util-linux_project:util-linux:7.1.1   Confidence:Low   
  • cpe: cpe:/a:linux:util-linux:7.1.1   Confidence:Low   

CVE-2015-5224  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks.

Vulnerable Software & Versions:

CVE-2016-5011  

Severity: Medium
CVSS Score: 4.7 (AV:L/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: picketbox-commons-1.0.0.final-redhat-5.jar

Description: Common classes for security projects

License:

lgpl: http://repository.jboss.com/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/picketbox/main/picketbox-commons-1.0.0.final-redhat-5.jar
MD5: 7c404f1668d3769a627d770c59d27330
SHA1: daad8922b824f368ebfa511ba183833fa7e0494d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.picketbox:picketbox-commons:1.0.0.final-redhat-5   Confidence:High

jboss-eap-7.1.0.zip: picketbox-infinispan-5.0.2.Final-redhat-1.jar

Description: PicketBox Infinispan adds cluster and cache capabilities to PicketBox.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/picketbox/main/picketbox-infinispan-5.0.2.Final-redhat-1.jar
MD5: 7f0253f923c9e4a868f9a2f278c1f708
SHA1: 9ad47e42d9668ad7253e2857b2741b17d1dabb39
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.picketbox:picketbox-infinispan:5.0.2.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:infinispan:infinispan:5.0.2   Confidence:Low   

CVE-2017-15089  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: picketbox-5.0.2.Final-redhat-1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/picketbox/main/picketbox-5.0.2.Final-redhat-1.jar
MD5: f3cd0bbcde63873f96d1f2f6ab7d3af9
SHA1: 7707e00a7a3202d2a6bd6767e0e858cae9ae8973
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: azure-storage-5.0.0.redhat-1.jar

Description: SDK for Microsoft Azure Storage Clients

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/microsoft/azure/storage/main/azure-storage-5.0.0.redhat-1.jar
MD5: 128a4bf2a3bd6eb8bcd548d9f3d8f5b9
SHA1: 78a548611994320c1c4f7c79d7b63ba253c9208e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.microsoft.azure:azure-storage:5.0.0.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: classmate-1.3.3.redhat-1.jar

Description: Library for introspecting types with full generic information including resolving of field and method types.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/fasterxml/classmate/main/classmate-1.3.3.redhat-1.jar
MD5: de952f661a9f0c55cbd68907062169eb
SHA1: df4033ece7cd764b0f5db7e9955e9814add7c9df
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.fasterxml:classmate:1.3.3.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jackson-databind-2.8.9.redhat-1.jar

Description: General data-binding functionality for Jackson: works on core streaming API

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/fasterxml/jackson/core/jackson-databind/main/jackson-databind-2.8.9.redhat-1.jar
MD5: 0c3074146cae46f2b7f842de95eb2f93
SHA1: a5857554066f953e2cb5739af36fef318a6318f3
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:fasterxml:jackson:2.8.9   Confidence:Low   
  • maven: com.fasterxml.jackson.core:jackson-databind:2.8.9.redhat-1   Confidence:High
  • cpe: cpe:/a:fasterxml:jackson-databind:2.8.9   Confidence:Highest   

CVE-2017-15095  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.

Vulnerable Software & Versions: (show all)

CVE-2017-17485  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

Vulnerable Software & Versions: (show all)

CVE-2018-5968  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-184 Incomplete Blacklist

FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.

Vulnerable Software & Versions: (show all)

CVE-2018-7489  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-184 Incomplete Blacklist

FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: jackson-core-2.8.9.redhat-1.jar

Description: Core Jackson abstractions, basic JSON streaming API implementation

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/fasterxml/jackson/core/jackson-core/main/jackson-core-2.8.9.redhat-1.jar
MD5: 0ec84671a601e6302811ec8f8dcbc7db
SHA1: 05ea5d90507508965d631bcbca5951d8c5887dc5
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.fasterxml.jackson.core:jackson-core:2.8.9.redhat-1   Confidence:High
  • cpe: cpe:/a:fasterxml:jackson:2.8.9   Confidence:Low   

jboss-eap-7.1.0.zip: guava-20.0.0.redhat-1.jar

Description: Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more. Guava has only one code dependency - javax.annotation, per the JSR-305 spec.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/google/guava/main/guava-20.0.0.redhat-1.jar
MD5: c5361aa4af26d3ef77a528680aae9f01
SHA1: a3b4b527b0d425c9803de423d0b210bec6fad6bc
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.google.guava:guava:20.0.0.redhat-1   Confidence:High
  • cpe: cpe:/a:google:guava:20.0   Confidence:Highest   

CVE-2018-10237  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: jsf-impl-2.2.13.SP4-redhat-1.jar

Description: JSF (JSR 314) Reference Implementation

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/jsf-impl/main/jsf-impl-2.2.13.SP4-redhat-1.jar
MD5: 2eaad7c561e492c71f76bb5da3ab2a68
SHA1: 0381673f53fbeca37e715a1d54ed4f7d035e1472
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.sun.faces:jsf-impl:2.2.13.SP4-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: xsom-20140925.0.0.redhat-1.jar

Description: XML Schema Object Model (XSOM) is a Java library that allows applications to easily parse XML Schema documents and inspect information in them. It is expected to be useful for applications that need to take XML Schema as an input.

License:

CDDL v1.1 / GPL v2 dual license: http://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xsom/main/xsom-20140925.0.0.redhat-1.jar
MD5: 30757016aa01a5f8fe96c52e53c4c38d
SHA1: 90d364af82884a09825ff50dd458a284d29e9f59
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.sun.xsom:xsom:20140925.0.0.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: istack-commons-tools-2.21.0.redhat-1.jar

Description: istack common utility code

License:

https://glassfish.java.net/public/CDDL+GPL_1_1.html, https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/istack/main/istack-commons-tools-2.21.0.redhat-1.jar
MD5: 768c5618cd0e980f47d4f692cf48d1b1
SHA1: 1426e1ad4451fda915381fc4a765221c9b655d67
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.sun.istack:istack-commons-tools:2.21.0.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: istack-commons-runtime-2.21.0.redhat-1.jar

Description: istack common utility code

License:

https://glassfish.java.net/public/CDDL+GPL_1_1.html, https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/istack/main/istack-commons-runtime-2.21.0.redhat-1.jar
MD5: 8e73738ed66326e017b1ab7ee4696f08
SHA1: 6785ebca1cdc4079eafc4865831c9b7019e70ea9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.sun.istack:istack-commons-runtime:2.21.0.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: txw2-2.2.11.redhat-4.jar

Description: TXW is a library that allows you to write XML documents.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xml/txw2/main/txw2-2.2.11.redhat-4.jar
MD5: cf205ee932eb7b8757aadba19075c409
SHA1: 86ace95f28e716e2686828e21122bd432283fd73
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.glassfish.jaxb:txw2:2.2.11.redhat-4   Confidence:High

jboss-eap-7.1.0.zip: FastInfoset-1.2.13.redhat-1.jar

Description: Open Source implementation of the Fast Infoset Standard for Binary XML (http://www.itu.int/ITU-T/asn1/).

License:

http://www.opensource.org/licenses/apache2.0.php
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xml/fastinfoset/main/FastInfoset-1.2.13.redhat-1.jar
MD5: 5f70d75c1b29181ea692cb3423f17b79
SHA1: e1baac52c9dc1a96416479c8b1fee3f476a172a7
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.sun.xml.fastinfoset:FastInfoset:1.2.13.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: codemodel-2.2.11.redhat-4.jar

Description: The core functionality of the CodeModel java source code generation library

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xml/bind/main/codemodel-2.2.11.redhat-4.jar
MD5: 02585df0091e3adc16af86b571012fe4
SHA1: 29894bfffdb216a58560016f73065ac26c266bca
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.glassfish.jaxb:codemodel:2.2.11.redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jaxb-xjc-2.2.11.redhat-4.jar

Description: JAXB Binding Compiler. Contains source code needed for binding customization files into java sources. In other words: the *tool* to generate java classes for the given xml representation.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xml/bind/main/jaxb-xjc-2.2.11.redhat-4.jar
MD5: e99c76ae749f05960490f6c571c6438f
SHA1: a1fabbfc3e614c69ca68afdc8c9bac20672bcfdb
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.glassfish.jaxb:jaxb-xjc:2.2.11.redhat-4   Confidence:High

jboss-eap-7.1.0.zip: rngom-2.2.11.redhat-4.jar

Description: RNGOM is a RelaxNG Object model library (XSOM for RelaxNG). Sources from http://rngom.java.net, version 20050510.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xml/bind/main/rngom-2.2.11.redhat-4.jar
MD5: f15dce9a69d012babbf507dbafe7806e
SHA1: 068cc50588a4795a95f918428f1ff1dbb39b30a1
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.sun.xml.bind.external:rngom:2.2.11.redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jaxb-jxc-2.2.11.redhat-4.jar

Description: JAXB schema generator.The *tool* to generate XML schema based on java classes.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xml/bind/main/jaxb-jxc-2.2.11.redhat-4.jar
MD5: e410f4f328362bc1a405461991c80dca
SHA1: 5f94097c09a89d6e3583d3f7bfec2defbce0c25b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.glassfish.jaxb:jaxb-jxc:2.2.11.redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jaxb-runtime-2.2.11.redhat-4.jar

Description: JAXB (JSR 222) Reference Implementation

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xml/bind/main/jaxb-runtime-2.2.11.redhat-4.jar
MD5: 0c93e651afeb362303f8cae2ad39b569
SHA1: cb80fd997ba7794fd9fa63e1f8def52384a52c33
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.glassfish.jaxb:jaxb-runtime:2.2.11.redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jaxb-core-2.2.11.redhat-4.jar

Description: JAXB Core module. Contains sources required by XJC, JXC and Runtime modules.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xml/bind/main/jaxb-core-2.2.11.redhat-4.jar
MD5: ebc2a0d27de82992e7870db9079762a3
SHA1: 00d385ccbb6ea1de51e35b2574e93f1aad0be5e2
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.glassfish.jaxb:jaxb-core:2.2.11.redhat-4   Confidence:High

jboss-eap-7.1.0.zip: saaj-impl-1.3.16.SP1-redhat-6.jar

Description: Open source Reference Implementation of JSR-67: SOAP with Attachments API for Java (SAAJ MR :1.3)

License:

Dual license consisting of the CDDL v1.1 and GPL v2: http://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/sun/xml/messaging/saaj/main/saaj-impl-1.3.16.SP1-redhat-6.jar
MD5: 74c3d70af3a5b261d9d8ff85607844d7
SHA1: 132ed63cad1ebbc0a93c1c4ef07370f24327c7d9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.sun.xml.messaging.saaj:saaj-impl:1.3.16.SP1-redhat-6   Confidence:High

jboss-eap-7.1.0.zip: compiler-0.9.4.redhat-1.jar

Description: Implementation of mustache.js for Java

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/github/spullara/mustache/main/compiler-0.9.4.redhat-1.jar
MD5: 21a74ef392ecad91ff97fea04d81f0b9
SHA1: cedf274aa5a4ab9419eb3e229fddc5846832d13f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:mustache.js_project:mustache.js:0.9.4   Confidence:Low   
  • maven: com.github.spullara.mustache.java:compiler:0.9.4.redhat-1   Confidence:High

CVE-2015-8862  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

mustache package before 2.2.1 for Node.js allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging a template with an attribute that is not quoted.

Vulnerable Software & Versions:

jboss-eap-7.1.0.zip: relaxngDatatype-2011.1.0.redhat-10.jar

License:

BSD: 
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/github/relaxng/main/relaxngDatatype-2011.1.0.redhat-10.jar
MD5: 7c832783f85737dc240907466bf5f4e5
SHA1: 5b64f97744182fbdc94b45c842620c498cbd29c4
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.github.relaxng:relaxngDatatype:2011.1.0.redhat-10   Confidence:High

jboss-eap-7.1.0.zip: h2-1.4.193.redhat-2.jar

Description: H2 Database Engine

License:

MPL 2.0 or EPL 1.0: http://h2database.com/html/license.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/com/h2database/h2/main/h2-1.4.193.redhat-2.jar
MD5: b472b5b71f30c544799d6aaaa1716244
SHA1: 1a1589ad8c2e18b5b0e53d12896ca4f5054e5ac0
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:h2database:h2:1.4.193   Confidence:Low   
  • maven: com.h2database:h2:1.4.193.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: asm-3.3.1.redhat-13.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/asm/asm/main/asm-3.3.1.redhat-13.jar
MD5: bffdc612ff263302627bc5d13185d0ac
SHA1: f4094ae88387e956f329d7677bac059cc0aadd2d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jboss-websocket-api_1.1_spec-1.1.1.Final-redhat-1.jar

Description: JSR-356: Java(TM) API for WebSocket 1.1 classes

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/websocket/api/main/jboss-websocket-api_1.1_spec-1.1.1.Final-redhat-1.jar
MD5: e3e3ba02e1b04dcf5c01c8d4afea6ec3
SHA1: a889003099c64c0e9d4d3009eb682efb04977f1e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.websocket:jboss-websocket-api_1.1_spec:1.1.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-jms-api_2.0_spec-1.0.1.Final-redhat-1.jar

Description: JSR-000343: Java(TM) Message Service (JMS) 2.0 API

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/jms/api/main/jboss-jms-api_2.0_spec-1.0.1.Final-redhat-1.jar
MD5: 2c8673c68037bc253ec45c0844e29088
SHA1: 26a3793795cb0e93db30da3df468c148a5d077d8
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.jms:jboss-jms-api_2.0_spec:1.0.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-jsf-api_2.2_spec-2.2.13.redhat-1.jar

Description: JSR-000344: JavaServer(TM) Faces 2.2 API

License:

CDDL or GPLv2 with exceptions: https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/faces/api/main/jboss-jsf-api_2.2_spec-2.2.13.redhat-1.jar
MD5: 5537c34f66ca30b911ce99302308d41e
SHA1: 65c00b938591997683bf3d5531e6632116295850
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.faces:jboss-jsf-api_2.2_spec:2.2.13.redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-ejb-api_3.2_spec-1.0.0.Final-redhat-1.jar

Description: JSR 345: Enterprise JavaBeans(TM) 3.2 API

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/ejb/api/main/jboss-ejb-api_3.2_spec-1.0.0.Final-redhat-1.jar
MD5: 30efeb8ff5b6a3c4fd3fc43e5c1ce59f
SHA1: 3b68f6f5d40ee3d75288b23fe7c4a80419a2a308
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.ejb:jboss-ejb-api_3.2_spec:1.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jsr181-api-1.0.0.MR1-redhat-8.jar

Description: Web Services Metadata for Java

License:

CDDL+GPLv2: https://glassfish.dev.java.net/public/CDDL+GPL.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/jws/api/main/jsr181-api-1.0.0.MR1-redhat-8.jar
MD5: 58a1eb61f67602966de71d3eba135545
SHA1: 84998f7d8faa440c0d4742467d33bc5e2ddaf224
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: javax.jws:jsr181-api:1.0.0.MR1-redhat-8   Confidence:High

jboss-eap-7.1.0.zip: jboss-connector-api_1.7_spec-1.0.0.Final-redhat-1.jar

Description: JSR 322: Java(TM) EE Connector Architecture 1.7 API

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/resource/api/main/jboss-connector-api_1.7_spec-1.0.0.Final-redhat-1.jar
MD5: 3c1778aa66b08d9780e89dabe0ff356d
SHA1: 35276ed2aee5031fefd9766d61afe2414febc387
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.resource:jboss-connector-api_1.7_spec:1.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-j2eemgmt-api_1.1_spec-1.0.1.Final-redhat-4.jar

Description: JSR-77: Java (TM) EE Management 1.1 API

License:

lgpl: http://repository.jboss.org/licenses/lgpl-2.1.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/management/j2ee/api/main/jboss-j2eemgmt-api_1.1_spec-1.0.1.Final-redhat-4.jar
MD5: 2baa265f7d910ef0901584a7cd203bae
SHA1: 908be5f06461f7bd54382eaffe3a2c4824fb819d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.management.j2ee:jboss-j2eemgmt-api_1.1_spec:1.0.1.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-transaction-api_1.2_spec-1.0.1.Final-redhat-1.jar

Description: The Java Transaction 1.2 API classes

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/transaction/api/main/jboss-transaction-api_1.2_spec-1.0.1.Final-redhat-1.jar
MD5: 42fb539192152666c277f87f95c4f7ee
SHA1: 4676542b0688df01522164a484ac64ae57ae7976
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.transaction:jboss-transaction-api_1.2_spec:1.0.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-jaspi-api_1.1_spec-1.0.0.Final-redhat-1.jar

Description: JSR-196: Java Authentication SPI for Containers 1.1 API

License:

lgpl: http://repository.jboss.org/licenses/lgpl-2.1.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/security/auth/message/api/main/jboss-jaspi-api_1.1_spec-1.0.0.Final-redhat-1.jar
MD5: fbfa2cf68f07419598b72e6f553b0e81
SHA1: 11c4fc5ffae7a24a5092e1f177521918cce61cae
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.security.auth.message:jboss-jaspi-api_1.1_spec:1.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-jacc-api_1.5_spec-1.0.1.Final-redhat-1.jar

Description: JSR-000115 Java(TM) Authorization Contract for Containers API

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/security/jacc/api/main/jboss-jacc-api_1.5_spec-1.0.1.Final-redhat-1.jar
MD5: 0a77d7b97973d2414ee9dee07d90555f
SHA1: feac380490fda6001d5ef57e63518fe2495ebb42
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.security.jacc:jboss-jacc-api_1.5_spec:1.0.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: validation-api-1.1.0.Final-redhat-1.jar

Description: Bean Validation API

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/validation/api/main/validation-api-1.1.0.Final-redhat-1.jar
MD5: 660f5aaf83a0ae66907afebddfece476
SHA1: dfa1e5e93e4da6c8eca49b0974378f0b3ce742a7
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: javax.validation:validation-api:1.1.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-annotations-api_1.2_spec-1.0.0.Final-redhat-1.jar

Description: JSR 250: Common Annotations for the Java(TM) Platform

License:

CDDL or GPLv2 with exceptions: https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/annotation/api/main/jboss-annotations-api_1.2_spec-1.0.0.Final-redhat-1.jar
MD5: ce38356d9446018b9dd3bdf9816a15cc
SHA1: df75a695bed1f6a18596493a6643ce8c259ac781
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.annotation:jboss-annotations-api_1.2_spec:1.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-interceptors-api_1.2_spec-1.0.0.Final-redhat-1.jar

Description: The Java(TM) EE Interceptors 1.2 API classes from JSR 318.

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/interceptor/api/main/jboss-interceptors-api_1.2_spec-1.0.0.Final-redhat-1.jar
MD5: 9357720625fb94e49244a34015a4a9cc
SHA1: 54ce3de589d39e8ae5dc45aa138fe358f9416647
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.interceptor:jboss-interceptors-api_1.2_spec:1.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-el-api_3.0_spec-1.0.9.Final-redhat-1.jar

Description: JSR-341 Expression Language 3.0 API

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/el/api/main/jboss-el-api_3.0_spec-1.0.9.Final-redhat-1.jar
MD5: d505c660ff739d92f289614e860cea83
SHA1: c476198ebe4de3edd48ddc1648364992694cc7b6
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.el:jboss-el-api_3.0_spec:1.0.9.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-saaj-api_1.3_spec-1.0.4.Final-redhat-1.jar

Description: The SOAP with Attachments API for Java Version 1.3 classes

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/xml/soap/api/main/jboss-saaj-api_1.3_spec-1.0.4.Final-redhat-1.jar
MD5: 4e86fe376859f2e109e21e3c8b39746a
SHA1: 30564aec185fb6f856d5ebb2bac39f6bad28bada
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.xml.soap:jboss-saaj-api_1.3_spec:1.0.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-jaxrpc-api_1.1_spec-1.0.1.Final-redhat-5.jar

Description: JSR-101: Java(TM) API for XML-based RPC (JAX-RPC) 1.1

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/xml/rpc/api/main/jboss-jaxrpc-api_1.1_spec-1.0.1.Final-redhat-5.jar
MD5: 12850cdbc402a6d5ae6e4f2682f0fe04
SHA1: 2e8e125263280e7da06e690cd1ae3ddf67a6339d
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.xml.rpc:jboss-jaxrpc-api_1.1_spec:1.0.1.Final-redhat-5   Confidence:High

jboss-eap-7.1.0.zip: jboss-jaxws-api_2.2_spec-2.0.4.Final-redhat-1.jar

Description: JSR-000224: Java(TM) API for XML-Based Web Services 2.2

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/xml/ws/api/main/jboss-jaxws-api_2.2_spec-2.0.4.Final-redhat-1.jar
MD5: 1c8ca55219efb9bfa7866a6dfd87363f
SHA1: 83b2e2792e30331cdc3254dc7049c7575e4a5562
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.xml.ws:jboss-jaxws-api_2.2_spec:2.0.4.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-jaxb-api_2.2_spec-1.0.4.Final-redhat-4.jar

Description: JSR-000222: Java(TM) Architecture for XML Binding (JAXB) 2.2

License:

CDDL or GPLv2 with exceptions: https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/xml/bind/api/main/jboss-jaxb-api_2.2_spec-1.0.4.Final-redhat-4.jar
MD5: f92956be4d6c95f9935863cb25f40dcc
SHA1: 8ba37e240b6b34e064bffcaf0fbf902e22e318d0
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.xml.bind:jboss-jaxb-api_2.2_spec:1.0.4.Final-redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-jaxrs-api_2.0_spec-1.0.0.Final-redhat-1.jar

Description: JSR 339: JAX-RS 2.0: The Java(TM) API for RESTful Web Services

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/ws/rs/api/main/jboss-jaxrs-api_2.0_spec-1.0.0.Final-redhat-1.jar
MD5: 4a8d44c94c9380d4fd8d2121af07475e
SHA1: d00248f904ffed3caae5d76ab493490a629a4b0a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.ws.rs:jboss-jaxrs-api_2.0_spec:1.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-concurrency-api_1.0_spec-1.0.0.Final-redhat-1.jar

Description: JSR-000236 Concurrency Utilities API Classes

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/enterprise/concurrent/api/main/jboss-concurrency-api_1.0_spec-1.0.0.Final-redhat-1.jar
MD5: f48d33cc8ecbdc94def7235f367b4e98
SHA1: ec349b14292da5e054b917bd9726d7973b992fc0
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.enterprise.concurrent:jboss-concurrency-api_1.0_spec:1.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: cdi-api-1.2.0.redhat-2.jar

Description: APIs for CDI (Contexts and Dependency Injection for Java EE)

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/enterprise/api/main/cdi-api-1.2.0.redhat-2.jar
MD5: 44e46653871190eb3d2eba0882aeae56
SHA1: 080b0e00aad03ae32e4c5fc16d13d2ee0953f265
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: javax.enterprise:cdi-api:1.2.0.redhat-2   Confidence:High
  • cpe: cpe:/a:red_hat:enterprise_linux:1.2.0   Confidence:Low   

jboss-eap-7.1.0.zip: activation-1.1.1.redhat-5.jar

Description: JavaBeans(TM) Activation Framework v.${spec.version} Specification

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/activation/api/main/activation-1.1.1.redhat-5.jar
MD5: daf3e63e3ca7196299c2b273ab0a8627
SHA1: 92fcfde4353970f8ae2be0c03b8e91bb76a0764b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: javax.activation:activation:1.1.1.redhat-5   Confidence:High

jboss-eap-7.1.0.zip: wsdl4j-1.6.3.redhat-2.jar

Description: Java stub generator for WSDL

License:

CPL: http://www.opensource.org/licenses/cpl1.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/wsdl4j/api/main/wsdl4j-1.6.3.redhat-2.jar
MD5: 3e7f194d603ffbdb219c89d06f017f88
SHA1: f6000c70d950d20ad3ac6694edf76e1662bffbe5
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: wsdl4j:wsdl4j:1.6.3.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: openjdk-orb-8.0.8.Final-redhat-1.jar

Description: JBoss repackaging of the OpenJDK ORB

License:

gpl: http://openjdk.java.net/legal/gplv2+ce.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/orb/api/main/openjdk-orb-8.0.8.Final-redhat-1.jar
MD5: 99b53aa9bc702ebc4f2e8b42cbc6302c
SHA1: a9c27c37bb13ea935ea898a5d21eef0ebe6ebdff
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.openjdk-orb:openjdk-orb:8.0.8.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:oracle:openjdk:8.0.8   Confidence:Low   

CVE-2013-0169  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)
CWE: CWE-310 Cryptographic Issues

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

Vulnerable Software & Versions: (show all)

jboss-eap-7.1.0.zip: javax.mail-1.5.6.redhat-1.jar

Description: JavaMail API

License:

https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/mail/api/main/javax.mail-1.5.6.redhat-1.jar
MD5: db130fd11073e1e5d4cb2a7f196c83e3
SHA1: fb10d35e2bd7e211b5e46aee08dead2973f7b3c6
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: com.sun.mail:javax.mail:1.5.6.redhat-1   Confidence:High
  • cpe: cpe:/a:sun:javamail:1.5.6   Confidence:Low   

jboss-eap-7.1.0.zip: taglibs-standard-impl-1.2.6.RC1-redhat-1.jar

Description: An implementation of the JSP Standard Tag Library (JSTL).

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/servlet/jstl/api/main/taglibs-standard-impl-1.2.6.RC1-redhat-1.jar
MD5: 29628832624775fac9dc9c21cf9cc764
SHA1: 9307df699b280f3479566a7753ddb16dee633058
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:apache:standard_taglibs:1.2.6.rc1   Confidence:Low   
  • maven: org.apache.taglibs:taglibs-standard-impl:1.2.6.RC1-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-jsp-api_2.3_spec-1.0.1.Final-redhat-1.jar

Description: JSR-000245: JavaServer(TM) Pages 2.3

License:

Apache License: http://repository.jboss.org/licenses/apache-2.0.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/servlet/jsp/api/main/jboss-jsp-api_2.3_spec-1.0.1.Final-redhat-1.jar
MD5: 3ff34d7d46e752e0a2b74a998e6013a8
SHA1: e03372d9f886da42c645e2776b70d7874c18844f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.servlet.jsp:jboss-jsp-api_2.3_spec:1.0.1.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-servlet-api_3.1_spec-1.0.0.Final-redhat-1.jar

Description: The Java Servlet 3.1 API classes

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/servlet/api/main/jboss-servlet-api_3.1_spec-1.0.0.Final-redhat-1.jar
MD5: 39ff6ada5b70a873995c52957cba26cf
SHA1: 07ca1dc2a327891cda02511e453667cff83b590e
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.servlet:jboss-servlet-api_3.1_spec:1.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-batch-api_1.0_spec-1.0.0.Final-redhat-1.jar

Description: JSR 352: Batch Applications for the Java Platform API classes

License:

Apache License: http://repository.jboss.org/licenses/apache-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/batch/api/main/jboss-batch-api_1.0_spec-1.0.0.Final-redhat-1.jar
MD5: 9f78c6d6f76d4cdbdff16c52c97e350d
SHA1: 7d42c4461892f010a5bccae94a4037df97844da9
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.spec.javax.batch:jboss-batch-api_1.0_spec:1.0.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: javax.inject-1.0.0.redhat-6.jar

Description: The javax.inject API

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/inject/api/main/javax.inject-1.0.0.redhat-6.jar
MD5: c026241c8d32447e8f0600d4981cd4ca
SHA1: caa45d7e2dae216aa4e06a0a05162acddb298851
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: javax.inject:javax.inject:1.0.0.redhat-6   Confidence:High

jboss-eap-7.1.0.zip: hibernate-jpa-2.1-api-1.0.0.Final-redhat-2.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/javax/persistence/api/main/hibernate-jpa-2.1-api-1.0.0.Final-redhat-2.jar
MD5: 94dbc14abb8e8f0ede020b50bb2d14ba
SHA1: fab560cb1fad51b5b8a68e9de914fa3b11bdf62c
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jcip-annotations-1.0.0.redhat-8.jar

License:

Creative Commons Attribution license 2.5: http://creativecommons.org/licenses/by/2.5/
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/net/jcip/main/jcip-annotations-1.0.0.redhat-8.jar
MD5: f6aa14d94d9b71ee56736e43660fe015
SHA1: da50a725d2aa6526220cac5c6efaaa61acec866a
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: net.jcip:jcip-annotations:1.0.0.redhat-8   Confidence:High

jboss-eap-7.1.0.zip: jboss-modules.jar

License:

Apache License 2.0: http://repository.jboss.org/licenses/apache-2.0.txt
Indiana University Extreme! Lab Software License 1.1.1: http://www.bearcave.com/software/java/xml/xmlpull_license.html
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/jboss-modules.jar
MD5: e9cb9405d48f5f7235ffc8adc7321fdd
SHA1: 2df779510edb9b95f0839a8e4adb9ba40e2a9574
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.jboss.modules:jboss-modules:1.6.0.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: launcher.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/launcher.jar
MD5: 19e379e4b4ab30013805fd5f866c2112
SHA1: f5b8ac3b97d83592181bddc7bc3c1fcc48a58dbd
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:3.0.10   Confidence:Low   
  • maven: org.wildfly.core:wildfly-launcher:3.0.10.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: wildfly-elytron-tool.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/wildfly-elytron-tool.jar
MD5: 6590a5e97e4ecbb5f16d86ec6469a7fd
SHA1: 933632c98224b18de95d67de946e74e2db02a13f
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:1.0.5   Confidence:Low   

jboss-eap-7.1.0.zip: jboss-client.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-client.jar
MD5: 67bb827ed2ed3b989c58c86b2cbf658d
SHA1: 0bab1644c5c9ce9ed07de14b011b31307f67f7cf
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jboss-cli-client.jar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-cli-client.jar
MD5: f7f87980b69dde4dd68f6fb36bee5eb2
SHA1: e7611585745c4ba314e07c694a57e58f9943d493
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jansi-1.16.0.redhat-4.jar: jansi.dll

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/fusesource/jansi/main/jansi-1.16.0.redhat-4.jar/META-INF/native/windows64/jansi.dll
MD5: c47390e7ef54b774b4098d3f7377a5ee
SHA1: b9557085ca1f5007e105f8ac8457abf76389734b
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

jboss-eap-7.1.0.zip: jansi-1.16.0.redhat-4.jar: jansi.dll

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/fusesource/jansi/main/jansi-1.16.0.redhat-4.jar/META-INF/native/windows32/jansi.dll
MD5: 7b8d870c7f6cd435e79777b0a3d497b3
SHA1: c9e7cfab235f26545be178232c640b06b1b1d659
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • None

plf-enterprise-jbosseap-package-5.2.x-SNAPSHOT.zip: exo-push-notifications.war

File Path: /home/ciagent/.m2/repository/com/exoplatform/platform/distributions/plf-enterprise-jbosseap-package/5.2.x-SNAPSHOT/plf-enterprise-jbosseap-package-5.2.x-SNAPSHOT.zip/platform-5.2.x-SNAPSHOT-jboss/standalone/deployments/platform.ear/exo-push-notifications.war
MD5: e97352bc2df92c88ffb14fb53773be3c
SHA1: c11e8157dc3ba025597bcec0f1f5d62fa952ad27
Referenced In Project/Scope: eXo PLF:: Platform Private Distributions - Enterprise JBossEAP Standalone (Internal use only):provided

Identifiers

  • maven: org.exoplatform.addons.push-notifications:exo-push-notifications-webapp:1.1.x-SNAPSHOT   Confidence:High

jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/com.fasterxml.jackson.dataformat/jackson-dataformat-yaml/pom.xml

Description: Support for reading and writing YAML-encoded data via Jackson abstractions.

File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/dataformat/jackson-dataformat-yaml/2.4.2/jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/com.fasterxml.jackson.dataformat/jackson-dataformat-yaml/pom.xml
MD5: 287aac9a700de46369cc0e327e3577bc
SHA1: da124b77ecdec56e2af7ef65828ec493590ab214

Identifiers

  • maven: com.fasterxml.jackson.dataformat:jackson-dataformat-yaml:2.4.2   Confidence:High
  • cpe: cpe:/a:fasterxml:jackson:2.4.2   Confidence:Low   

jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/org.yaml/snakeyaml/pom.xml

Description: YAML 1.1 parser and emitter for Java

License:

Apache License Version 2.0: LICENSE.txt
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/dataformat/jackson-dataformat-yaml/2.4.2/jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/org.yaml/snakeyaml/pom.xml
MD5: d103ace8c756cc13661469b53cff1794
SHA1: c9dbe57a55450ef61cdb139c01a8edea9206949d

Identifiers

  • maven: org.yaml:snakeyaml:1.12   Confidence:High

jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling/pom.xml

Description: JBoss Marshalling API

File Path: /home/ciagent/.m2/repository/org/jboss/marshalling/jboss-marshalling-osgi/2.0.0.Beta3/jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling/pom.xml
MD5: 2b0e9541ec4a0f19e378eaabc5e85ea0
SHA1: da91abf3554dceed9454faa89acafc48c0649df5

Identifiers

  • maven: org.jboss.marshalling:jboss-marshalling:2.0.0.Beta3   Confidence:High

jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-river/pom.xml

Description: JBoss Marshalling River Implementation

File Path: /home/ciagent/.m2/repository/org/jboss/marshalling/jboss-marshalling-osgi/2.0.0.Beta3/jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-river/pom.xml
MD5: 1dda062cdd15bd160a4ee6cf1be9f93d
SHA1: 366411529f00ec1eb4451b9b45012bfc09bde34b

Identifiers

  • maven: org.jboss.marshalling:jboss-marshalling-river:2.0.0.Beta3   Confidence:High

jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-serial/pom.xml

Description: JBoss Marshalling Serial Implementation

File Path: /home/ciagent/.m2/repository/org/jboss/marshalling/jboss-marshalling-osgi/2.0.0.Beta3/jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-serial/pom.xml
MD5: 16b74097e7ec70db37b74205776ad0a7
SHA1: cf519c8805a14e6ce20933b7a89bfe0d5a7dbf0f

Identifiers

  • maven: org.jboss.marshalling:jboss-marshalling-serial:2.0.0.Beta3   Confidence:High

jython-standalone-2.5.4-rc1.jar/META-INF/maven/jline/jline/pom.xml

Description: JLine is a java library for reading and editing user input in console applications. It features tab-completion, command history, password masking, customizable keybindings, and pass-through handlers to use to chain to other console applications.

License:

BSD: LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/jline/jline/pom.xml
MD5: 0d6d52cb98633c1b3a711696db169d43
SHA1: 4206e42ea819ceb6d541d9d394c44e2b5344fef2

Identifiers

  • maven: jline:jline:0.9.95-SNAPSHOT   Confidence:High

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.antlr/antlr-runtime/pom.xml

Description: A framework for constructing recognizers, compilers, and translators from grammatical descriptions containing Java, C#, C++, or Python actions.

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.antlr/antlr-runtime/pom.xml
MD5: 2663ae2cc7c8739fa5b19e2224ab6e55
SHA1: d72704aaf6a6fd2cd6bc142b959f9206e8f71a90

Identifiers

  • maven: org.antlr:antlr-runtime:3.1.3   Confidence:High

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.ext.posix/jnr-posix/pom.xml

Description:  Common cross-project/cross-platform POSIX APIs

License:

Common Public License - v 1.0: http://www-128.ibm.com/developerworks/library/os-cpl.html
GNU General Public License Version 2: http://www.gnu.org/copyleft/gpl.html
GNU Lesser General Public License Version 2.1: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.ext.posix/jnr-posix/pom.xml
MD5: feaa380889a30e4e2beee4746d9b0b54
SHA1: 28d89352183ec1db9f4cb75efe98f5f0b9ae589d

Identifiers

  • cpe: cpe:/a:jruby:jruby:1.1.4   Confidence:Highest   
  • maven: org.jruby.ext.posix:jnr-posix:1.1.4   Confidence:High

CVE-2010-1330  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

Vulnerable Software & Versions: (show all)

CVE-2011-4838  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Vulnerable Software & Versions: (show all)

CVE-2012-5370  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-310 Cryptographic Issues

JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.

Vulnerable Software & Versions:

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/constantine/pom.xml

Description: A set of platform constants (e.g. errno values)

License:

The MIT License: http://www.opensource.org/licenses/mit-license.php
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/constantine/pom.xml
MD5: 970585d7cb052c21db6caa55c946e35e
SHA1: 7d6faeadd03efb438919ff833a9814728c042f0c

Identifiers

  • maven: org.jruby.extras:constantine:0.7   Confidence:High
  • cpe: cpe:/a:values_project:values:0.7   Confidence:Low   

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jaffl/pom.xml

Description: An abstracted interface to invoking native functions from java

License:

GNU Lesser General Public License Version 3: http://www.gnu.org/licenses/lgpl-3.0.txt
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jaffl/pom.xml
MD5: 486f581e2d6cee3f3c1020bd1cd856e2
SHA1: d833022c9991b70bcf6ebc9924af7da3bc79f5d1

Identifiers

  • maven: org.jruby.extras:jaffl:0.5.1   Confidence:High

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jffi/pom.xml

Description: Java wrapper around libffi

License:

GNU LGPLv3: http://www.gnu.org/licenses/lgpl-3.0.txt
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jffi/pom.xml
MD5: 39e5edd1583d710078ef1f596bb29ce7
SHA1: 5aea815e74debbfc61f10e9274a9ba27cd3e22af

Identifiers

  • maven: org.jruby.extras:jffi:1.0.1   Confidence:High
  • cpe: cpe:/a:jruby:jruby:1.0.1   Confidence:Highest   

CVE-2010-1330  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

Vulnerable Software & Versions: (show all)

CVE-2011-4838  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Vulnerable Software & Versions: (show all)

CVE-2012-5370  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-310 Cryptographic Issues

JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.

Vulnerable Software & Versions:

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jnr-netdb/pom.xml

Description: Lookup TCP and UDP services from java

License:

GNU Lesser General Public License Version 3: http://www.gnu.org/licenses/lgpl-3.0.txt
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jnr-netdb/pom.xml
MD5: 303650108f1ec73ff0561d8b3b879769
SHA1: 1cef127eec64ffe5fa5ac078e14b6fd481536436

Identifiers

  • maven: org.jruby.extras:jnr-netdb:0.4   Confidence:High

hibernate-validator-4.2.0.Final.jar/META-INF/maven/com.googlecode.jtype/jtype/pom.xml

Description: Library for working with the Java 5 type system

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-validator/4.2.0.Final/hibernate-validator-4.2.0.Final.jar/META-INF/maven/com.googlecode.jtype/jtype/pom.xml
MD5: a1dde0cb5b6ebe7e7d3540e0310042ac
SHA1: 2b51d041544482b183c1ae49eba99099d6f14998

Identifiers

  • maven: com.googlecode.jtype:jtype:0.1.1   Confidence:High

jansi-1.11.jar/META-INF/maven/org.fusesource.hawtjni/hawtjni-runtime/pom.xml

Description: The API that projects using HawtJNI should build against.

File Path: /home/ciagent/.m2/repository/org/fusesource/jansi/jansi/1.11/jansi-1.11.jar/META-INF/maven/org.fusesource.hawtjni/hawtjni-runtime/pom.xml
MD5: 9343dc158b5894310f26732ebb2b73ee
SHA1: 14df4655274e472909050661f8e9ed98a28b6721

Identifiers

  • maven: org.fusesource.hawtjni:hawtjni-runtime:1.8   Confidence:High

jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi-native/pom.xml

Description: Jansi is a java library for generating and interpreting ANSI escape sequences.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/fusesource/jansi/jansi/1.11/jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi-native/pom.xml
MD5: 1bbb551ce034727cd799619954437ab5
SHA1: 0177ae5fbf3b24c3e9adb94d98e29213259a8bc6

Identifiers

  • cpe: cpe:/a:id:id-software:1.5   Confidence:Low   
  • maven: org.fusesource.jansi:jansi-native:1.5   Confidence:High

jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi/pom.xml

Description: Jansi is a java library for generating and interpreting ANSI escape sequences.

File Path: /home/ciagent/.m2/repository/org/fusesource/jansi/jansi/1.11/jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi/pom.xml
MD5: 18c6eba91ac7aa1a27324b482dca06d5
SHA1: 3aea48c5e47064eec9903f4a14e5acee8fe345d8

Identifiers

  • maven: org.fusesource.jansi:jansi:1.11   Confidence:High
  • cpe: cpe:/a:id:id-software:1.11   Confidence:Low   

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/com.beust/jcommander/pom.xml

Description: A Java framework to parse command line options with annotations.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/maven/com.beust/jcommander/pom.xml
MD5: 476d9301d9a9ba636a79e1e127cb201d
SHA1: 643abcc29f656bfd9ff6b0c720264642bc10017f

Identifiers

  • maven: com.beust:jcommander:1.35   Confidence:High

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/jline/jline/pom.xml

License:

The BSD License: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/maven/jline/jline/pom.xml
MD5: c115487107302a4d8b15dfe918a3ee92
SHA1: c360defa993e6b59531e23966a89415c3db54848

Identifiers

  • maven: jline:jline:2.12   Confidence:High

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-api/pom.xml

Description:  The application programming interface for the repository system.

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-api/pom.xml
MD5: fc000d7bc8dbb2b892a953bc3c9ab822
SHA1: ea104d5d0d8d6e495088cc49c71ae3a5b9c04634

Identifiers

  • maven: org.eclipse.aether:aether-api:1.1.0   Confidence:High

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-util/pom.xml

Description:  A collection of utility classes to ease usage of the repository system.

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-util/pom.xml
MD5: cfb325be4744f65098b66ee34e265322
SHA1: 2648fa8032a1428718a58b53fb9badae64643dd0

Identifiers

  • maven: org.eclipse.aether:aether-util:1.1.0   Confidence:High

exo-es-embedded-war-2.2.x-SNAPSHOT.war: netty-common-4.1.13.Final.jar/META-INF/maven/org.jctools/jctools-core/pom.xml

Description: Java Concurrency Tools Core Library

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/addons/exo-es-embedded/exo-es-embedded-war/2.2.x-SNAPSHOT/exo-es-embedded-war-2.2.x-SNAPSHOT.war/WEB-INF/lib/netty-common-4.1.13.Final.jar/META-INF/maven/org.jctools/jctools-core/pom.xml
MD5: ff7b0b544295fb15c18c258e9fd33f37
SHA1: 93cf6661c66216bbcf63dffe85c510c81481c3e5

Identifiers

  • maven: org.jctools:jctools-core:2.0.1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/narayana-jts-idlj/pom.xml

Description: JTS uber jar with idlj stubs

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/narayana-jts-idlj/pom.xml
MD5: 51650afc8abeb36bdabda280d0589aa0
SHA1: ab81bdb79522baf03175a15528a0637e626a2d9b

Identifiers

  • maven: org.jboss.narayana.jts:narayana-jts-idlj:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana/common/pom.xml

Description: Narayana: common

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana/common/pom.xml
MD5: 9f877f6f9e428c76d9c3a1dc29e5c31f
SHA1: 71ff3375b9b1763f4fa14393e482a6e7acabc578

Identifiers

  • maven: org.jboss.narayana:common:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/jbossxts/pom.xml

Description: Narayana: XTS jbossxts

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/jbossxts/pom.xml
MD5: 64fbe582e724aa420d9a12f65f579093
SHA1: 12f8ccb8ce23f567ad7589db83d19bbfebccdf89

Identifiers

  • maven: org.jboss.narayana.xts:jbossxts:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/wsas/pom.xml

Description: Narayana: XTS WSAS

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/wsas/pom.xml
MD5: 1e7076dd86729aa13e1ca50a367868c7
SHA1: 18f0a805d4ce47e6f3ce498d67a43fe7b0d3025b

Identifiers

  • maven: org.jboss.narayana.xts:wsas:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/wscf11/pom.xml

Description: Narayana: XTS WSCF (wscf11)

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/wscf11/pom.xml
MD5: 6beca1d6823b67ca660c232c61f5ec3b
SHA1: 036860e0cadeb1839cf1b61604de71165221d261

Identifiers

  • maven: org.jboss.narayana.xts:wscf11:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.arjunacore/arjuna/pom.xml

Description: Narayana: ArjunaCore Arjuna

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.arjunacore/arjuna/pom.xml
MD5: 34eb82efa325de3d4558466d48e6a66b
SHA1: 70992cbdbe3bc70e71921934bc7c15a3217eb372

Identifiers

  • maven: org.jboss.narayana.arjunacore:arjuna:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/ws-c11/pom.xml

Description: Narayana: XTS WS-C (wsc11)

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/ws-c11/pom.xml
MD5: 1b0d23b04123b4ad91aa2306c471ab67
SHA1: 5cb6cfba638622947ccbef8333c8056cbc82f7a3

Identifiers

  • cpe: cpe:/a:ws_project:ws:5.5.30   Confidence:Low   
  • maven: org.jboss.narayana.xts:ws-c11:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.arjunacore/txoj/pom.xml

Description: ArjunaCore txoj module

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.arjunacore/txoj/pom.xml
MD5: 1dfba98e64ba1808f738b5f0737eeafc
SHA1: 15290142df4a5529711a5148263afff4cfb2502a

Identifiers

  • maven: org.jboss.narayana.arjunacore:txoj:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/wstx11/pom.xml

Description: Narayana: XTS WSTX (wstx11)

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/wstx11/pom.xml
MD5: a5bb249f4550d9301acf2ea33a5e9f40
SHA1: 9761dc6289ee18728b00022097847340653a69e8

Identifiers

  • maven: org.jboss.narayana.xts:wstx11:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/jta/pom.xml

Description: Narayana: ArjunaJTA jta

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/jta/pom.xml
MD5: bece51b410690dc803276081173ea07d
SHA1: 11842fa25305e55759dad6be7164c864d5097919

Identifiers

  • maven: org.jboss.narayana.jta:jta:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/recovery/pom.xml

Description: Narayana: XTS recovery

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/recovery/pom.xml
MD5: efbf0c725a0d19eea53237653973e668
SHA1: 11e52fdfadb3653df80e9ec8dee23945e96502c5

Identifiers

  • maven: org.jboss.narayana.xts:recovery:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/jdbc/pom.xml

Description: transactional driver

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/jdbc/pom.xml
MD5: ffd5ed4856bfd0df0a2c0e2025cd7bf3
SHA1: d1c002845c37bf1a4f0cc91e11e4d25b253f138a

Identifiers

  • maven: org.jboss.narayana.jta:jdbc:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/jms/pom.xml

Description: Narayana JMS integration

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/jms/pom.xml
MD5: 4a7435ecf5a48fca55a3c2e68295019e
SHA1: b17c4fc3329d4b29d5cb831076e61e189b4c634b

Identifiers

  • maven: org.jboss.narayana.jta:jms:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/service/pom.xml

Description: Narayana: XTS sar

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/service/pom.xml
MD5: bab733ca6f37840c53ef9c4584054c32
SHA1: 3d21ef6bb60d7088b0bad1c37fb2a50cbf2ee0e5

Identifiers

  • maven: org.jboss.narayana.xts:service:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/bridge/pom.xml

Description: Narayana: XTS bridge

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/xts/main/jbossxts-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.xts/bridge/pom.xml
MD5: 4927b178cc895f18a705db287a10cbf2
SHA1: 6817ec8334077dd730a875cced32a594ceaabad9

Identifiers

  • maven: org.jboss.narayana.xts:bridge:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/cdi/pom.xml

Description: Narayana: ArjunaJTA cdi

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jta/cdi/pom.xml
MD5: 0b4f7a7072d2876eaa992b49660c0cfb
SHA1: 258fa8efa7dd99dd551297fd03bdc345f17b5615

Identifiers

  • maven: org.jboss.narayana.jta:cdi:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/orbportability/pom.xml

Description: orb portability harness

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/orbportability/pom.xml
MD5: 9c0a9c48cdc4d0404a56653ff569305c
SHA1: 8f02498b40cff825d7aa139d39f789f3acbf9530

Identifiers

  • maven: org.jboss.narayana.jts:orbportability:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/jts/pom.xml

Description: Narayana: ArjunaJTS jts

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/jts/pom.xml
MD5: 7d0e0baf6548ecdb657818b667b1a758
SHA1: e304fb6cd3e588264cf264baf8e9b1443a368e40

Identifiers

  • maven: org.jboss.narayana.jts:jts:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/idlj-idl/pom.xml

Description: Narayana: ArjunaJTS idl idlj

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/idlj-idl/pom.xml
MD5: 44a804ccf27a267750e940fca20e409b
SHA1: 916bed5b54319808e835acb8afcbf5ece958b611

Identifiers

  • maven: org.jboss.narayana.jts:idlj-idl:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/jtax/pom.xml

Description: Narayana: ArjunaJTS jtax

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/modules/system/layers/base/org/jboss/jts/main/narayana-jts-idlj-5.5.30.Final-redhat-1.jar/META-INF/maven/org.jboss.narayana.jts/jtax/pom.xml
MD5: ae962d9a27b804a662622de095cd8a35
SHA1: 7dd5dbab79e9efefc8f30592fa34872d92205859

Identifiers

  • maven: org.jboss.narayana.jts:jtax:5.5.30.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.wildfly.core/wildfly-cli/pom.xml

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-cli-client.jar/META-INF/maven/org.wildfly.core/wildfly-cli/pom.xml
MD5: 35814ac5802818e4f1bfc8f5c3840edc
SHA1: a1e0563296c51c2dc57920a1ae8ea1d833646891

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:3.0.10   Confidence:Low   
  • maven: org.wildfly.core:wildfly-cli:3.0.10.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.fusesource.hawtjni/hawtjni-runtime/pom.xml

Description: The API that projects using HawtJNI should build against.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-cli-client.jar/META-INF/maven/org.fusesource.hawtjni/hawtjni-runtime/pom.xml
MD5: 9391f945f0b77a5f56b42aaebcc04099
SHA1: eea711962e909ee31ba32bc8554b2b1fe19091cc

Identifiers

  • maven: org.fusesource.hawtjni:hawtjni-runtime:1.15.0.redhat-2   Confidence:High

jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.fusesource.jansi/jansi-native/pom.xml

Description: Jansi is a java library for generating and interpreting ANSI escape sequences.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-cli-client.jar/META-INF/maven/org.fusesource.jansi/jansi-native/pom.xml
MD5: 0dd2911b0c9eda66706612cc9cc1b2e5
SHA1: 40fd9b0df167e5a959f344e6ee5a9500816d540f

Identifiers

  • cpe: cpe:/a:id:id-software:1.7.0   Confidence:Low   
  • maven: org.fusesource.jansi:jansi-native:1.7.0.redhat-3   Confidence:High

jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.fusesource.jansi/jansi/pom.xml

Description: Jansi is a java library for generating and interpreting ANSI escape sequences.

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-cli-client.jar/META-INF/maven/org.fusesource.jansi/jansi/pom.xml
MD5: a5bd25cf3741551c1f57759f0cf5492e
SHA1: d58469bb06d0c91c848dcbfed28aab81a1d2a7dc

Identifiers

  • cpe: cpe:/a:id:id-software:1.16.0   Confidence:Low   
  • maven: org.fusesource.jansi:jansi:1.16.0.redhat-4   Confidence:High

jboss-eap-7.1.0.zip: jboss-cli-client.jar/META-INF/maven/org.jboss/staxmapper/pom.xml

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-cli-client.jar/META-INF/maven/org.jboss/staxmapper/pom.xml
MD5: 8d74e128faa80add63a44f0a6b06298a
SHA1: d623889c13cf56291070a1b7ef9b6b1c1f61fe8d

Identifiers

  • maven: org.jboss:staxmapper:1.3.0.Final-redhat-1   Confidence:High
  • cpe: cpe:/a:st_project:st:1.3.0   Confidence:Low   

jboss-eap-7.1.0.zip: jboss-client.jar/META-INF/maven/org.jboss.eap/wildfly-client-all/pom.xml

Description: This artifact provides a single jar that contains all classes required to use remote EJB and JMS, including all dependencies. It is intended for use by those not using maven, maven users should just import the EJB and JMS BOM's instead (shaded JAR's cause lots of problems with maven, as it is very easy to inadvertently end up with different versions on classes on the class path).

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-client.jar/META-INF/maven/org.jboss.eap/wildfly-client-all/pom.xml
MD5: dfc37fd0198177f5cccc55131bea1f27
SHA1: 9f56935efe17aea38f18d4b858492f05eaee9b82

Identifiers

  • maven: org.jboss.eap:wildfly-client-all:7.1.0.GA-redhat-11   Confidence:High
  • cpe: cpe:/a:wildfly:wildfly:7.1.0   Confidence:Low   

jboss-eap-7.1.0.zip: jboss-client.jar/META-INF/maven/org.wildfly.wildfly-http-client/wildfly-http-client-common/pom.xml

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-client.jar/META-INF/maven/org.wildfly.wildfly-http-client/wildfly-http-client-common/pom.xml
MD5: 13d4fa0f883757a70140dfdcf42c28f8
SHA1: 6ed52c0cd797722f3e8c27a6518b37a5d56045fe

Identifiers

  • cpe: cpe:/a:wildfly:wildfly:1.0.8   Confidence:Low   
  • maven: org.wildfly.wildfly-http-client:wildfly-http-client-common:1.0.8.Final-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-client.jar/META-INF/maven/org.apache.activemq/artemis-hqclient-protocol/pom.xml

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-client.jar/META-INF/maven/org.apache.activemq/artemis-hqclient-protocol/pom.xml
MD5: f14205fd08d55fb03a21bf08019e7f4a
SHA1: 165be38984ff5b6f6bd41eb4aba049337135acdf

Identifiers

  • maven: org.apache.activemq:artemis-hqclient-protocol:1.5.5.008-redhat-1   Confidence:High

jboss-eap-7.1.0.zip: jboss-client.jar/META-INF/maven/org.slf4j/slf4j-api/pom.xml

Description: The slf4j API

File Path: /home/ciagent/.m2/repository/org/jboss/eap/jboss-eap/7.1.0/jboss-eap-7.1.0.zip/jboss-eap-7.1/bin/client/jboss-client.jar/META-INF/maven/org.slf4j/slf4j-api/pom.xml
MD5: c6d47658449a8da3a97d2a304eb71e7c
SHA1: 27b58ba141576c9f5eb21163e3f034dbdb93d274

Identifiers

  • cpe: cpe:/a:slf4j:slf4j:1.7.22   Confidence:Low   
  • maven: org.slf4j:slf4j-api:1.7.22.redhat-1   Confidence:High


This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the Node Security Platform.