Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: google group | github issues

Project: eXo PLF:: Platform Public Distributions

org.exoplatform.platform.distributions:plf-public-distributions:5.2.x-SNAPSHOT

Scan Information (show all):

Display: Showing Vulnerable Dependencies (click to show all)

Dependency CPE Coordinates Highest Severity CVE Count CPE Confidence Evidence Count
tomcat-juli-8.5.35.jar cpe:/a:apache_software_foundation:tomcat:8.5.35 org.apache.tomcat:tomcat-juli:8.5.35    0 Low 21
tomcat-api-8.5.35.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-api:8.5.35  High 3 Low 21
tomcat-jni-8.5.35.jar cpe:/a:apache:tomcat_native:8.5.35
cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-jni:8.5.35  High 3 Low 21
tomcat-coyote-8.5.35.jar cpe:/a:apache:coyote_http_connector:8.5.35
cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache:tomcat_connectors:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-coyote:8.5.35  High 3 Low 21
mime-util-2.1.3.jar eu.medsea.mimeutil:mime-util:2.1.3    0 30
jakarta-regexp-1.4.jar jakarta-regexp:jakarta-regexp:1.4    0 14
xpp3-1.1.6.jar org.ogce:xpp3:1.1.6    0 24
jcl-over-slf4j-1.7.7.jar org.slf4j:jcl-over-slf4j:1.7.7    0 31
slf4j-api-1.7.7.jar org.slf4j:slf4j-api:1.7.7    0 31
exo.kernel.commons-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.commons:5.2.x-SNAPSHOT   0 24
commons-beanutils-1.8.3.jar cpe:/a:apache:commons_beanutils:1.8.3 commons-beanutils:commons-beanutils:1.8.3  High 1 Low 34
common-common-2.2.2.Final.jar org.gatein.common:common-common:2.2.2.Final    0 31
wci-wci-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.wci:wci-wci:5.2.x-SNAPSHOT   0 29
jibx-run-1.2.6.jar org.jibx:jibx-run:1.2.6    0 29
javax.inject-1.jar javax.inject:javax.inject:1    0 20
jsr250-api-1.0.jar javax.annotation:jsr250-api:1.0    0 20
cdi-api-1.0-SP4.jar javax.enterprise:cdi-api:1.0-SP4    0 31
exo.kernel.container-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.container:5.2.x-SNAPSHOT   0 24
wci-tomcat8-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.wci:wci-tomcat8:5.2.x-SNAPSHOT   0 27
calendar-webapp-5.2.x-SNAPSHOT.war org.exoplatform.calendar:calendar-webapp:5.2.x-SNAPSHOT   0 28
commons-lang-2.6.jar commons-lang:commons-lang:2.6    0 34
jcr-1.0.1.jar cpe:/a:content_project:content:1.0.1 javax.jcr:jcr:1.0.1 Medium 1 Low 25
mail-1.4.7.jar cpe:/a:sun:javamail:1.4.7 javax.mail:mail:1.4.7    0 Low 41
portlet-api-2.0.jar javax.portlet:portlet-api:2.0    0 22
commons-chain-1.2.jar commons-chain:commons-chain:1.2    0 34
commons-httpclient-3.1.jar cpe:/a:apache:httpclient:3.1
cpe:/a:apache:commons-httpclient:3.1
commons-httpclient:commons-httpclient:3.1    0 Low 24
ical4j-1.0-beta5.jar ical4j:ical4j:1.0-beta5   0 21
jackrabbit-webdav-1.6.5.jar cpe:/a:apache:jackrabbit:1.6.5 org.apache.jackrabbit:jackrabbit-webdav:1.6.5  Medium 1 Low 26
commons-digester-2.1.jar commons-digester:commons-digester:2.1    0 34
exo.kernel.component.command-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.component.command:5.2.x-SNAPSHOT   0 22
c3p0-0.9.1.1.jar c3p0:c3p0:0.9.1.1    0 23
quartz-2.2.2.jar org.quartz-scheduler:quartz:2.2.2    0 43
calendar-service-5.2.x-SNAPSHOT.jar org.exoplatform.calendar:calendar-service:5.2.x-SNAPSHOT   0 28
jackson-core-2.4.2.jar cpe:/a:fasterxml:jackson:2.4.2 com.fasterxml.jackson.core:jackson-core:2.4.2    0 Low 37
jackson-annotations-2.4.0.jar cpe:/a:fasterxml:jackson:2.4.0 com.fasterxml.jackson.core:jackson-annotations:2.4.0    0 Low 37
stax2-api-3.1.4.jar org.codehaus.woodstox:stax2-api:3.1.4    0 29
jackson-dataformat-xml-2.4.2.jar cpe:/a:fasterxml:jackson-databind:2.4.2
cpe:/a:fasterxml:jackson:2.4.2
com.fasterxml.jackson.dataformat:jackson-dataformat-xml:2.4.2  High 13 Highest 37
swagger-annotations-1.5.0.jar io.swagger:swagger-annotations:1.5.0    0 24
swagger-models-1.5.0.jar io.swagger:swagger-models:1.5.0    0 24
swagger-core-1.5.0.jar io.swagger:swagger-core:1.5.0    0 17
annotations-2.0.1.jar com.google.code.findbugs:annotations:2.0.1    0 23
reflections-0.9.9.jar org.reflections:reflections:0.9.9    0 19
swagger-jaxrs-1.5.0.jar io.swagger:swagger-jaxrs:1.5.0    0 17
calendar-webservice-5.2.x-SNAPSHOT.jar org.exoplatform.calendar:calendar-webservice:5.2.x-SNAPSHOT   0 28
exo.ws.commons-5.2.x-SNAPSHOT.jar cpe:/a:ws_project:ws:5.2 org.exoplatform.ws:exo.ws.commons:5.2.x-SNAPSHOT   0 Low 22
bayeux-api-3.0.8.jar org.cometd.java:bayeux-api:3.0.8    0 29
cometd-java-common-3.0.8.jar org.cometd.java:cometd-java-common:3.0.8    0 29
cometd-java-websocket-javax-server-3.0.8.jar org.cometd.java:cometd-java-websocket-javax-server:3.0.8    0 29
cometd-java-websocket-common-server-3.0.8.jar org.cometd.java:cometd-java-websocket-common-server:3.0.8    0 29
cometd-java-annotations-3.0.8.jar org.cometd.java:cometd-java-annotations:3.0.8    0 29
jetty-io-9.2.14.v20151106.jar org.eclipse.jetty:jetty-io:9.2.14.v20151106    0 35
cometd-java-client-3.0.8.jar org.cometd.java:cometd-java-client:3.0.8    0 29
cometd-java-websocket-common-client-3.0.8.jar org.cometd.java:cometd-java-websocket-common-client:3.0.8    0 29
cometd-java-websocket-javax-client-3.0.8.jar org.cometd.java:cometd-java-websocket-javax-client:3.0.8    0 29
cometd-java-oort-3.0.8.jar org.cometd.java:cometd-java-oort:3.0.8    0 29
jetty-jmx-9.2.14.v20151106.jar cpe:/a:jetty:jetty:9.2.14.v20151106
cpe:/a:eclipse:jetty:9.2.14.v20151106
org.eclipse.jetty:jetty-jmx:9.2.14.v20151106  High 4 Low 37
cometd-java-server-3.0.8.jar org.cometd.java:cometd-java-server:3.0.8    0 29
commons-comet-service-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-comet-service:5.2.x-SNAPSHOT   0 26
commons-webui-ext-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-webui-ext:5.2.x-SNAPSHOT   0 26
chromattic.core-1.3.0.jar org.chromattic:chromattic.core:1.3.0    0 23
aspectjrt-1.8.8.jar org.aspectj:aspectjrt:1.8.8    0 21
owasp-java-html-sanitizer-20160413.1.jar cpe:/a:owasp-java-html-sanitizer_project:owasp-java-html-sanitizer:20160413.1 com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer:20160413.1    0 Low 21
jrcs.diff-0.4.2.jar org.jvnet.hudson:org.suigeneris.jrcs.diff:0.4.2    0 17
ecs-1.4.2.jar ecs:ecs:1.4.2    0 14
liquibase-core-3.4.2.jar org.liquibase:liquibase-core:3.4.2    0 19
dom4j-1.6.1.jar cpe:/a:dom4j_project:dom4j:1.6.1 dom4j:dom4j:1.6.1  Medium 1 Highest 31
javassist-3.20.0-GA.jar org.javassist:javassist:3.20.0-GA    0 27
hibernate-jpa-2.0-api-1.0.1.Final.jar org.hibernate.javax.persistence:hibernate-jpa-2.0-api:1.0.1.Final    0 26
hibernate-entitymanager-4.2.21.Final.jar org.hibernate:hibernate-entitymanager:4.2.21.Final    0 32
commons-component-common-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-component-common:5.2.x-SNAPSHOT   0 26
antlr-2.7.7.jar antlr:antlr:2.7.7    0 18
hibernate-core-4.2.21.Final.jar org.hibernate:hibernate-core:4.2.21.Final    0 32
exo.core.component.organization.api-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.organization.api:5.2.x-SNAPSHOT   0 22
exo.core.component.security.core-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.security.core:5.2.x-SNAPSHOT   0 24
lucene-core-3.6.2.jar org.apache.lucene:lucene-core:3.6.2    0 26
lucene-analyzers-3.6.2.jar org.apache.lucene:lucene-analyzers:3.6.2    0 26
lucene-spellchecker-3.6.2.jar org.apache.lucene:lucene-spellchecker:3.6.2    0 26
jta-1.1.jar javax.transaction:transaction-api:1.1    0 22
concurrent-1.3.4.jar concurrent:concurrent:1.3.4    0 23
commons-collections-3.2.2.jar cpe:/a:apache:commons_collections:3.2.2 commons-collections:commons-collections:3.2.2    0 Low 40
jgroups-3.6.13.Final.jar org.jgroups:jgroups:3.6.13.Final    0 32
jbossjta-4.16.6.Final.jar org.jboss.jbossts:jbossjta:4.16.6.Final    0 22
ws-commons-util-1.0.1.jar cpe:/a:ws_project:ws:1.0.1 ws-commons-util:ws-commons-util:1.0.1  Medium 1 Low 30
jboss-common-core-2.2.22.GA.jar org.jboss:jboss-common-core:2.2.22.GA    0 30
stringtemplate-3.2.1.jar org.antlr:stringtemplate:3.2.1    0 23
antlr-runtime-3.5.jar org.antlr:antlr-runtime:3.5    0 26
exo.kernel.component.ext.cache.impl.infinispan.v8-5.2.x-SNAPSHOT.jar cpe:/a:infinispan:infinispan:5.2.0 org.exoplatform.kernel:exo.kernel.component.ext.cache.impl.infinispan.v8:5.2.x-SNAPSHOT Medium 3 Highest 24
jboss-marshalling-osgi-2.0.0.Beta3.jar org.jboss.marshalling:jboss-marshalling-osgi:2.0.0.Beta3    0 29
infinispan-core-8.2.6.Final.jar cpe:/a:infinispan:infinispan:8.2.6 org.infinispan:infinispan-core:8.2.6.Final  Medium 3 Highest 35
exo.jcr.component.core-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.component.core:5.2.x-SNAPSHOT   0 24
commons-dbcp-1.4.jar commons-dbcp:commons-dbcp:1.4    0 34
commons-pool-1.6.jar commons-pool:commons-pool:1.6    0 36
exo.kernel.component.common-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.component.common:5.2.x-SNAPSHOT   0 24
exo.portal.webui.core-5.2.x-SNAPSHOT.jar cpe:/a:in-portal:in-portal:5.2.0 org.exoplatform.gatein.portal:exo.portal.webui.core:5.2.x-SNAPSHOT Medium 1 Highest 29
icu4j-56.1.jar cpe:/a:icu-project:international_components_for_unicode:56.1::~~~c%2fc%2b%2b~~ com.ibm.icu:icu4j:56.1  High 8 Highest 33
common-logging-2.2.2.Final.jar org.gatein.common:common-logging:2.2.2.Final    0 31
social-component-core-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-core:5.2.x-SNAPSHOT   0 28
social-component-common-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-common:5.2.x-SNAPSHOT   0 28
staxnav.core-0.9.8.jar org.staxnav:staxnav.core:0.9.8    0 19
commons-lang3-3.3.2.jar org.apache.commons:commons-lang3:3.3.2    0 37
pc-federation-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.pc:pc-federation:5.2.x-SNAPSHOT   0 29
pc-bridge-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.pc:pc-bridge:5.2.x-SNAPSHOT   0 29
picketlink-idm-core-1.4.6.Final.jar cpe:/a:picketlink:picketlink:1.4.6 org.picketlink.idm:picketlink-idm-core:1.4.6.Final  Medium 3 Low 37
mop-api-1.3.2.Final.jar org.gatein.mop:mop-api:1.3.2.Final   0 30
mop-spi-1.3.2.Final.jar org.gatein.mop:mop-spi:1.3.2.Final   0 30
mop-core-1.3.2.Final.jar org.gatein.mop:mop-core:1.3.2.Final   0 30
gatein-management-spi-2.1.0.Final.jar org.gatein.management:gatein-management-spi:2.1.0.Final   0 28
args4j-2.0.16.jar args4j:args4j:2.0.16    0 20
closure-compiler-v20131014.jar cpe:/a:google:gmail:- com.google.javascript:closure-compiler:v20131014  Medium 1 Low 28
filters-2.0.235.jar cpe:/a:image_processing_software:image_processing_software:2.0.235 com.jhlabs:filters:2.0.235  Low 1 Low 22
simplecaptcha-1.1.1.Final-gatein-4.jar org.gatein.captcha:simplecaptcha:1.1.1.Final-gatein-4   0 27
gatein-api-1.0.1.Final.jar org.gatein.api:gatein-api:1.0.1.Final    0 29
rome-1.0.jar rome:rome:1.0    0 32
calendar-common-5.2.x-SNAPSHOT.jar org.exoplatform.calendar:calendar-common:5.2.x-SNAPSHOT   0 26
commons-comet-webapp-5.2.x-SNAPSHOT.war org.exoplatform.commons:commons-comet-webapp:5.2.x-SNAPSHOT   0 26
commons-extension-webapp-5.2.x-SNAPSHOT.war org.exoplatform.commons:commons-extension-webapp:5.2.x-SNAPSHOT   0 26
jtidy-r938.jar cpe:/a:html-tidy:tidy:- net.sf.jtidy:jtidy:r938    0 Low 25
exo.core.component.xml-processing-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.xml-processing:5.2.x-SNAPSHOT   0 24
exo.jcr.component.ext-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.component.ext:5.2.x-SNAPSHOT   0 22
ecms-apps-portlet-administration-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-apps-portlet-administration:5.2.x-SNAPSHOT   0 28
ecms-core-webui-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-webui:5.2.x-SNAPSHOT   0 28
ecms-apps-portlet-presentation-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-apps-portlet-presentation:5.2.x-SNAPSHOT   0 26
exo.jcr.component.webdav-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.component.webdav:5.2.x-SNAPSHOT   0 22
ecms-core-publication-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-publication:5.2.x-SNAPSHOT   0 28
ecms-core-search-5.2.x-SNAPSHOT.jar cpe:/a:pro_search:pro_search:5.2 org.exoplatform.ecms:ecms-core-search:5.2.x-SNAPSHOT   0 Low 24
itunes-com-podcast-0.2.jar cpe:/a:apple:itunes:0.2 com.totsp.feedpod:itunes-com-podcast:0.2  High 519 Low 29
jurt-3.2.1.jar cpe:/a:openoffice:openoffice.org:3.2.1
cpe:/a:openoffice:openoffice:3.2.1
org.openoffice:jurt:3.2.1  High 8 Highest 18
juh-3.2.1.jar cpe:/a:openoffice:openoffice.org:3.2.1
cpe:/a:openoffice:openoffice:3.2.1
org.openoffice:juh:3.2.1  High 8 Highest 20
ridl-3.2.1.jar cpe:/a:openoffice:openoffice.org:3.2.1
cpe:/a:openoffice:openoffice:3.2.1
org.openoffice:ridl:3.2.1  High 8 Highest 18
unoil-3.2.1.jar cpe:/a:openoffice:openoffice.org:3.2.1
cpe:/a:openoffice:openoffice:3.2.1
org.openoffice:unoil:3.2.1  High 8 Highest 18
jodconverter-core-3.0-eXo03.jar org.artofsolving.jodconverter:jodconverter-core:3.0-eXo03   0 21
groovy-all-2.4.12.jar cpe:/a:apache:groovy:2.4.12 org.codehaus.groovy:groovy-all:2.4.12    0 Low 36
jai-core-1.1.3.jar javax.media:jai-core:1.1.3   0 21
jai-codec-1.1.3.jar com.sun.media:jai-codec:1.1.3   0 22
icepdf-core-5.1.1.jar org.icepdf.os:icepdf-core:5.1.1   0 17
imgscalr-lib-4.2.jar org.imgscalr:imgscalr-lib:4.2    0 23
jdom-1.1.3.jar org.jdom:jdom:1.1.3    0 44
ecms-core-services-5.2.x-SNAPSHOT.jar cpe:/a:no-cms_project:no-cms:5.2.20190113 org.exoplatform.ecms:ecms-core-services:5.2.x-SNAPSHOT   0 Low 28
ecms-core-webui-presentation-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-webui-presentation:5.2.x-SNAPSHOT   0 26
ecms-ext-authoring-services-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-ext-authoring-services:5.2.x-SNAPSHOT   0 26
json-20070829.jar org.json:json:20070829    0 23
ecms-apps-portlet-seo-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-apps-portlet-seo:5.2.x-SNAPSHOT   0 24
ecms-apps-resources-wcm-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-apps-resources-wcm:5.2.x-SNAPSHOT   0 26
ecms-core-webapp-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-core-webapp:5.2.x-SNAPSHOT   0 28
commons-component-upgrade-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-component-upgrade:5.2.x-SNAPSHOT   0 26
json-simple-1.1.1.jar com.googlecode.json-simple:json-simple:1.1.1    0 23
commons-io-2.4.jar commons-io:commons-io:2.4    0 36
ecms-core-connector-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-connector:5.2.x-SNAPSHOT   0 28
ecms-core-webui-explorer-5.2.x-SNAPSHOT.jar cpe:/a:content_project:content:5.2.20190113 org.exoplatform.ecms:ecms-core-webui-explorer:5.2.x-SNAPSHOT   0 Low 28
exo.kernel.component.cache-5.2.x-SNAPSHOT.jar org.exoplatform.kernel:exo.kernel.component.cache:5.2.x-SNAPSHOT   0 22
ecms-ext-authoring-apps-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-ext-authoring-apps:5.2.x-SNAPSHOT   0 26
ecms-core-webui-fcc-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-webui-fcc:5.2.x-SNAPSHOT   0 28
ecms-packaging-wcm-webapp-5.2.x-SNAPSHOT.war org.exoplatform.ecms:ecms-packaging-wcm-webapp:5.2.x-SNAPSHOT   0 28
exo-jcr-services-5.2.x-SNAPSHOT.jar org.exoplatform:exo-jcr-services:5.2.x-SNAPSHOT   0 24
fontbox-1.8.14.jar cpe:/a:apache:pdfbox:1.8.14 org.apache.pdfbox:fontbox:1.8.14  Medium 1 Highest 37
jempbox-1.8.14.jar cpe:/a:apache:pdfbox:1.8.14 org.apache.pdfbox:jempbox:1.8.14  Medium 1 Highest 35
pdfbox-1.8.14.jar cpe:/a:apache:pdfbox:1.8.14 org.apache.pdfbox:pdfbox:1.8.14  Medium 1 Highest 35
htmllexer-2.1.jar org.htmlparser:htmllexer:2.1    0 23
htmlparser-2.1.jar org.htmlparser:htmlparser:2.1    0 23
poi-3.13.jar cpe:/a:apache:poi:3.13 org.apache.poi:poi:3.13  High 2 Highest 28
tika-core-1.5.jar cpe:/a:apache:tika:1.5 org.apache.tika:tika-core:1.5  High 8 Highest 33
vorbis-java-core-0.1-tests.jar org.gagravarr:vorbis-java-core:0.1    0 23
vorbis-java-tika-0.1.jar cpe:/a:apache:tika:0.1 org.gagravarr:vorbis-java-tika:0.1  High 6 Highest 23
netcdf-4.2-min.jar edu.ucar:netcdf:4.2-min    0 21
apache-mime4j-core-0.7.2.jar cpe:/a:apache:james:0.7.2 org.apache.james:apache-mime4j-core:0.7.2    0 Low 33
xz-1.2.jar cpe:/a:tukaani:xz:1.2 org.tukaani:xz:1.2  Medium 1 Low 27
commons-compress-1.5.jar cpe:/a:apache:commons-compress:1.5 org.apache.commons:commons-compress:1.5    0 Low 39
tagsoup-1.2.1.jar org.ccil.cowan.tagsoup:tagsoup:1.2.1    0 18
asm-debug-all-4.1.jar org.ow2.asm:asm-debug-all:4.1    0 28
isoparser-1.0-RC-1.jar cpe:/a:boxes_project:boxes:7.x-1.0 com.googlecode.mp4parser:isoparser:1.0-RC-1  Low 1 Highest 24
xmpcore-5.1.2.jar com.adobe.xmp:xmpcore:5.1.2    0 30
metadata-extractor-2.6.2.jar com.drewnoakes:metadata-extractor:2.6.2    0 21
vorbis-java-core-0.1.jar org.gagravarr:vorbis-java-core:0.1    0 21
juniversalchardet-1.0.3.jar org.zenframework.z8.dependencies.commons:juniversalchardet-1.0.3:2.0    0 27
jhighlight-1.0.jar com.uwyn:jhighlight:1.0    0 25
xmlbeans-2.6.0.jar org.apache.xmlbeans:xmlbeans:2.6.0    0 24
exo.core.component.document-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.document:5.2.x-SNAPSHOT   0 24
ecms-core-publication-plugins-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-publication-plugins:5.2.x-SNAPSHOT   0 28
ecms-core-viewer-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-viewer:5.2.x-SNAPSHOT   0 28
ecms-core-webui-administration-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-core-webui-administration:5.2.x-SNAPSHOT   0 28
ecms-ext-authoring-webui-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-ext-authoring-webui:5.2.x-SNAPSHOT   0 26
ecms-ext-webui-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-ext-webui:5.2.x-SNAPSHOT   0 28
ecms-upgrade-plugins-5.2.x-SNAPSHOT.jar org.exoplatform.ecms:ecms-upgrade-plugins:5.2.x-SNAPSHOT   0 26
forum-forum-webapp-5.2.x-SNAPSHOT.war org.exoplatform.forum:forum-forum-webapp:5.2.x-SNAPSHOT   0 24
commons-webui-component-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-webui-component:5.2.x-SNAPSHOT   0 26
forum-application-common-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-application-common:5.2.x-SNAPSHOT   0 26
htmlcleaner-2.7.jar cpe:/a:htmlcleaner_project:htmlcleaner:2.7 net.sourceforge.htmlcleaner:htmlcleaner:2.7    0 Low 20
stax-utils-20070216.jar net.java.dev.stax-utils:stax-utils:20070216    0 20
xwiki-commons-xml-5.4.7.jar cpe:/a:xwiki:xwiki:5.4.7 org.xwiki.commons:xwiki-commons-xml:5.4.7 Low 1 Low 26
wiki-renderer-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-renderer:5.2.x-SNAPSHOT   0 26
forum-component-bbcode-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-component-bbcode:5.2.x-SNAPSHOT   0 26
forum-component-common-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-component-common:5.2.x-SNAPSHOT   0 26
forum-component-rendering-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-component-rendering:5.2.x-SNAPSHOT   0 26
forum-forum-service-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-forum-service:5.2.x-SNAPSHOT   0 26
xpp3-1.1.4c.jar xpp3:xpp3:1.1.4c    0 26
integ-search-portlet-5.2.x-SNAPSHOT.war org.exoplatform.integration:integ-search-portlet:5.2.x-SNAPSHOT   0 24
juzu-core-1.2.x-SNAPSHOT.jar org.juzu:juzu-core:1.2.x-SNAPSHOT   0 21
rhino-1.7R3.jar org.mozilla:rhino:1.7R3    0 26
juzu-plugins-less-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-less:1.2.x-SNAPSHOT   0 24
juzu-plugins-portlet-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-portlet:1.2.x-SNAPSHOT   0 24
commons-api-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-api:5.2.x-SNAPSHOT   0 26
integ-search-service-5.2.x-SNAPSHOT.jar cpe:/a:pro_search:pro_search:5.2.20190116 org.exoplatform.integration:integ-search-service:5.2.x-SNAPSHOT   0 Low 26
exo.jcr.framework.command-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.framework.command:5.2.x-SNAPSHOT   0 24
exo.jcr.framework.web-5.2.x-SNAPSHOT.jar org.exoplatform.jcr:exo.jcr.framework.web:5.2.x-SNAPSHOT   0 22
commons-component-product-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-component-product:5.2.x-SNAPSHOT   0 28
platform-component-upgrade-plugins-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-upgrade-plugins:5.2.x-SNAPSHOT   0 26
platform-exo-gadget-pack-gadget-pack-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-exo-gadget-pack-gadget-pack:5.2.x-SNAPSHOT   0 28
exo.core.component.script.groovy-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.script.groovy:5.2.x-SNAPSHOT   0 22
platform-exo-gadget-pack-gadget-pack-services-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-exo-gadget-pack-gadget-pack-services:5.2.x-SNAPSHOT   0 26
platform-extension-portlet-branding-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-portlet-branding:5.2.x-SNAPSHOT   0 22
commons-fileupload-1.3.3.jar cpe:/a:apache:commons_fileupload:1.3.3 commons-fileupload:commons-fileupload:1.3.3    0 Low 40
commons-juzu-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-juzu:5.2.x-SNAPSHOT   0 28
juzu-plugins-upload-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-upload:1.2.x-SNAPSHOT   0 23
platform-extension-portlets-homepage-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-portlets-homepage:5.2.x-SNAPSHOT   0 23
aopalliance-1.0.jar aopalliance:aopalliance:1.0    0 20
guice-3.0.jar com.google.inject:guice:3.0    0 29
guice-multibindings-3.0.jar com.google.inject.extensions:guice-multibindings:3.0    0 29
commons-codec-1.10.jar commons-codec:commons-codec:1.10    0 38
guava-18.0.jar cpe:/a:google:guava:18.0 com.google.guava:guava:18.0  Medium 1 Highest 27
oauth-provider-20100527.jar net.oauth.core:oauth-provider:20100527    0 18
oauth-consumer-20090617.jar net.oauth.core:oauth-consumer:20090617   0 17
oauth-httpclient4-20090913.jar net.oauth.core:oauth-httpclient4:20090913   0 20
httpcore-4.3.3.jar org.apache.httpcomponents:httpcore:4.3.3    0 32
httpclient-4.3.6.jar cpe:/a:apache:httpclient:4.3.6 org.apache.httpcomponents:httpclient:4.3.6    0 Low 32
platform-extension-portlets-platformNavigation-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-portlets-platformNavigation:5.2.x-SNAPSHOT   0 26
calendar-component-create-5.2.x-SNAPSHOT.jar org.exoplatform.calendar:calendar-component-create:5.2.x-SNAPSHOT   0 26
ecms-core-webui-seo-5.2.x-SNAPSHOT.jar cpe:/a:content_project:content:5.2 org.exoplatform.ecms:ecms-core-webui-seo:5.2.x-SNAPSHOT   0 Low 26
forum-application-create-5.2.x-SNAPSHOT.jar org.exoplatform.forum:forum-application-create:5.2.x-SNAPSHOT   0 24
platform-component-common-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-common:5.2.x-SNAPSHOT   0 26
platform-component-uxpnavigation-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-uxpnavigation:5.2.x-SNAPSHOT   0 24
platform-component-webui-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-webui:5.2.x-SNAPSHOT   0 26
social-component-webui-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-webui:5.2.x-SNAPSHOT   0 28
chromattic.common-1.3.0.jar org.chromattic:chromattic.common:1.3.0    0 25
chromattic.metamodel-1.3.0.jar org.chromattic:chromattic.metamodel:1.3.0    0 23
jboss-logging-annotations-1.2.0.Beta1.jar org.jboss.logging:jboss-logging-annotations:1.2.0.Beta1    0 30
hibernate-commons-annotations-4.0.5.Final.jar org.hibernate.common:hibernate-commons-annotations:4.0.5.Final    0 30
jackson-databind-2.3.1.jar cpe:/a:fasterxml:jackson:2.3.1
cpe:/a:fasterxml:jackson-databind:2.3.1
com.fasterxml.jackson.core:jackson-databind:2.3.1  High 13 Highest 37
social-component-service-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-service:5.2.x-SNAPSHOT   0 28
itext-2.1.7.jar com.lowagie:itext:2.1.7    0 23
validation-api-1.1.0.Final.jar javax.validation:validation-api:1.1.0.Final    0 22
sac-1.3.jar org.w3c.css:sac:1.3    0 27
cssparser-0.9.18.jar net.sourceforge.cssparser:cssparser:0.9.18    0 27
bcmail-jdk15-1.45.jar cpe:/a:no-cms_project:no-cms:1.45 org.bouncycastle:bcmail-jdk15:1.45    0 Low 24
bcprov-jdk15-1.45.jar cpe:/a:bouncycastle:bouncy-castle-crypto-package:1.45
cpe:/a:bouncycastle:bouncy_castle_crypto_package:1.45
org.bouncycastle:bcprov-jdk15:1.45  Medium 1 Low 24
bctsp-jdk15-1.45.jar org.bouncycastle:bctsp-jdk15:1.45    0 24
mchange-commons-java-0.2.3.4.jar com.mchange:mchange-commons-java:0.2.3.4    0 19
c3p0-0.9.2.1.jar com.mchange:c3p0:0.9.2.1    0 24
hibernate-c3p0-4.2.21.Final.jar org.hibernate:hibernate-c3p0:4.2.21.Final    0 32
exo.core.component.organization.jdbc-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.organization.jdbc:5.2.x-SNAPSHOT   0 22
jrcs.rcs-0.4.2.jar org.jvnet.hudson:org.suigeneris.jrcs.rcs:0.4.2    0 17
flying-saucer-core-9.0.8.jar org.xhtmlrenderer:flying-saucer-core:9.0.8    0 21
flying-saucer-pdf-9.0.8.jar org.xhtmlrenderer:flying-saucer-pdf:9.0.8    0 23
wiki-service-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-service:5.2.x-SNAPSHOT   0 26
wiki-macros-iframe-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-macros-iframe:5.2.x-SNAPSHOT   0 26
jython-standalone-2.5.4-rc1.jar cpe:/a:jython_project:jython:2.5.4.rc1 org.python:jython-standalone:2.5.4-rc1    0 Low 10
pygments-1.6.jar cpe:/a:pygments:pygments:1.6 org.pygments:pygments:1.6  High 1 Highest 18
jdom2-2.0.5.jar org.jdom:jdom2:2.0.5    0 43
wiki-webui-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-webui:5.2.x-SNAPSHOT   0 26
platform-extension-portlets-notification-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-portlets-notification:5.2.x-SNAPSHOT   0 22
platform-extension-resources-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-resources:5.2.x-SNAPSHOT   0 26
platform-extension-webapp-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-extension-webapp:5.2.x-SNAPSHOT   0 26
juzu-plugins-validation-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-validation:1.2.x-SNAPSHOT   0 24
protobuf-java-2.5.0.jar cpe:/a:google:protobuf:2.5.0 com.google.protobuf:protobuf-java:2.5.0  Medium 1 Highest 29
less4j-1.4.0.jar com.github.sommeri:less4j:1.4.0    0 24
juzu-plugins-less4j-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-less4j:1.2.x-SNAPSHOT   0 25
webjars-locator-0.4.jar org.webjars:webjars-locator:0.4    0 19
juzu-plugins-webjars-1.2.x-SNAPSHOT.jar org.juzu:juzu-plugins-webjars:1.2.x-SNAPSHOT   0 24
jsr311-api-1.1.1.jar javax.ws.rs:jsr311-api:1.1.1    0 28
chromattic.api-1.3.0.jar org.chromattic:chromattic.api:1.3.0    0 23
reflext.api-1.1.0.jar org.reflext:reflext.api:1.1.0    0 23
reflext.core-1.1.0.jar org.reflext:reflext.core:1.1.0    0 23
reflext.spi-1.1.0.jar org.reflext:reflext.spi:1.1.0    0 25
reflext.apt-1.1.0.jar org.reflext:reflext.apt:1.1.0    0 23
chromattic.apt-1.3.0.jar org.chromattic:chromattic.apt:1.3.0    0 23
chromattic.ext-1.3.0.jar org.chromattic:chromattic.ext:1.3.0    0 25
chromattic.spi-1.3.0.jar org.chromattic:chromattic.spi:1.3.0    0 25
pc-api-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.pc:pc-api:5.2.x-SNAPSHOT   0 27
picocontainer-1.1.jar picocontainer:picocontainer:1.1    0 28
sso-integration-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.sso:sso-integration:5.2.x-SNAPSHOT   0 31
sso-agent-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.sso:sso-agent:5.2.x-SNAPSHOT   0 29
xmlpull-1.1.3.1.jar xmlpull:xmlpull:1.1.3.1    0 18
xstream-1.4.10.jar cpe:/a:xstream_project:xstream:1.4.10 com.thoughtworks.xstream:xstream:1.4.10    0 Low 53
ccpp-1.0.jar javax.ccpp:ccpp:1.0    0 20
portals-bridges-common-1.0.4.jar org.apache.portals.bridges:portals-bridges-common:1.0.4    0 25
asm-3.1.jar asm:asm:3.1    0 18
cglib-2.2.jar cglib:cglib:2.2    0 20
chromattic.cglib-1.3.0.jar org.chromattic:chromattic.cglib:1.3.0    0 23
javaparser-1.0.8.jar com.google.code.javaparser:javaparser:1.0.8   0 20
chromattic.groovy-1.3.0.jar org.chromattic:chromattic.groovy:1.3.0    0 23
reflext.jlr-1.1.0.jar org.reflext:reflext.jlr:1.1.0    0 23
chromattic.dataobject-1.3.0.jar org.chromattic:chromattic.dataobject:1.3.0    0 23
commons-search-5.2.x-SNAPSHOT.jar cpe:/a:pro_search:pro_search:5.2.20190113 org.exoplatform.commons:commons-search:5.2.x-SNAPSHOT   0 Low 26
commons-file-storage-5.2.x-SNAPSHOT.jar org.exoplatform.commons:commons-file-storage:5.2.x-SNAPSHOT   0 26
jboss-logging-3.3.0.Final.jar org.jboss.logging:jboss-logging:3.3.0.Final    0 44
exo.core.component.database-5.2.x-SNAPSHOT.jar org.exoplatform.core:exo.core.component.database:5.2.x-SNAPSHOT   0 24
integ-calendar-social-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-calendar-social:5.2.x-SNAPSHOT   0 28
integ-ecms-social-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-ecms-social:5.2.x-SNAPSHOT   0 28
integ-forum-social-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-forum-social:5.2.x-SNAPSHOT   0 26
integ-social-ecms-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-social-ecms:5.2.x-SNAPSHOT   0 26
integ-wiki-social-5.2.x-SNAPSHOT.jar org.exoplatform.integration:integ-wiki-social:5.2.x-SNAPSHOT   0 26
platform-component-gadgets-5.2.x-SNAPSHOT.jar cpe:/a:user_dashboard_project:user_dashboard:5.2 org.exoplatform.platform:platform-component-gadgets:5.2.x-SNAPSHOT   0 Low 26
platform-component-organization-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-organization:5.2.x-SNAPSHOT   0 26
platform-extension-config-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-extension-config:5.2.x-SNAPSHOT   0 24
exo.ws.rest.core-5.2.x-SNAPSHOT.jar cpe:/a:ws_project:ws:5.2.20190113 org.exoplatform.ws:exo.ws.rest.core:5.2.x-SNAPSHOT   0 Low 24
redirect-5.2.x-SNAPSHOT.jar cpe:/a:in-portal:in-portal:5.2.0 org.gatein.web:redirect:5.2.x-SNAPSHOT Medium 1 Highest 29
hibernate-validator-4.2.0.Final.jar cpe:/a:hibernate:hibernate_validator:4.2.0 org.hibernate:hibernate-validator:4.2.0.Final  Medium 1 Highest 27
platform-sample-acme-intranet-portlet-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-sample-acme-intranet-portlet:5.2.x-SNAPSHOT   0 26
platform-sample-acme-intranet-webapp-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-sample-acme-intranet-webapp:5.2.x-SNAPSHOT   0 26
platform-sample-gadgets-sample-exo-gadget-resources-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-sample-gadgets-sample-exo-gadget-resources:5.2.x-SNAPSHOT   0 28
platform-sample-gadgets-sample-gadgets-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-sample-gadgets-sample-gadgets:5.2.x-SNAPSHOT   0 26
platform-sample-gadgets-sample-service-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-sample-gadgets-sample-service:5.2.x-SNAPSHOT   0 26
platform-registration-5.2.x-SNAPSHOT.war org.exoplatform.platform:platform-registration:5.2.x-SNAPSHOT   0 24
platform-ui-skin-5.2.x-SNAPSHOT.war org.exoplatform.platform-ui:platform-ui-skin:5.2.x-SNAPSHOT   0 26
plf-root-webapp-5.2.x-SNAPSHOT.war org.exoplatform.platform.distributions:plf-root-webapp:5.2.x-SNAPSHOT   0 26
social-extension-war-5.2.x-SNAPSHOT.war org.exoplatform.social:social-extension-war:5.2.x-SNAPSHOT   0 28
social-notification-extension-5.2.x-SNAPSHOT.war org.exoplatform.social:social-notification-extension:5.2.x-SNAPSHOT   0 28
social-component-notification-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-notification:5.2.x-SNAPSHOT   0 28
social-component-core-jpa-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-core-jpa:5.2.x-SNAPSHOT   0 26
social-extras-feedmash-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-extras-feedmash:5.2.x-SNAPSHOT   0 28
oauth-20100527.jar net.oauth.core:oauth:20100527    0 18
social-component-opensocial-5.2.x-SNAPSHOT.jar org.exoplatform.social:social-component-opensocial:5.2.x-SNAPSHOT   0 28
joda-time-2.4.jar joda-time:joda-time:2.4    0 34
ehcache-core-2.6.9.jar net.sf.ehcache:ehcache-core:2.6.9    0 19
juel-impl-2.2.7.jar de.odysseus.juel:juel-impl:2.2.7    0 26
shindig-common-2.5.2.jar cpe:/a:apache:shindig:2.5.2 org.apache.shindig:shindig-common:2.5.2    0 Low 26
caja-r5054.jar com.google.caja:caja:r5054   0 23
htmlparser-r4209.jar caja:htmlparser:r4209   0 24
nekohtml-1.9.22.jar net.sourceforge.nekohtml:nekohtml:1.9.22    0 20
xercesImpl-2.9.1.jar cpe:/a:apache:xerces2_java:2.9.1 xerces:xercesImpl:2.9.1  High 1 Low 50
sanselan-0.97-incubator.jar org.apache.sanselan:sanselan:0.97-incubator    0 35
social-webapp-portlet-5.2.x-SNAPSHOT.war cpe:/a:app_project:app:5.2 org.exoplatform.social:social-webapp-portlet:5.2.x-SNAPSHOT Medium 1 Low 26
social-webapp-juzu-portlet-5.2.x-SNAPSHOT.war org.exoplatform.social:social-webapp-juzu-portlet:5.2.x-SNAPSHOT   0 23
wiki-upgrade-plugins-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-upgrade-plugins:5.2.x-SNAPSHOT   0 28
wiki-webapp-5.2.x-SNAPSHOT.war org.exoplatform.wiki:wiki-webapp:5.2.x-SNAPSHOT   0 26
gwt-servlet-2.6.1.jar cpe:/a:google:protobuf:2.5.0
cpe:/a:google:protobuf:2.6.1
com.google.gwt:gwt-servlet:2.6.1  Medium 1 Highest 29
smartgwt-lgpl-6.0-p20170514.jar cpe:/a:widgets_project:widgets:6.0.p20170514 com.isomorphic.smartgwt.lgpl:smartgwt-lgpl:6.0-p20170514 Medium 1 Low 14
jcommon-1.0.17.jar org.jfree:jcommon:1.0.17    0 23
jfreechart-1.0.14.jar org.jfree:jfreechart:1.0.14    0 25
velocity-1.7.jar org.apache.velocity:velocity:1.7    0 33
velocity-tools-1.4.jar cpe:/a:apache:struts:1.4 velocity-tools:velocity-tools:1.4    0 Low 19
ezmorph-1.0.6.jar net.sf.ezmorph:ezmorph:1.0.6    0 22
json-lib-2.4-jdk15.jar com.hynnet:json-lib:2.4    0 15
commons-configuration-1.10.jar commons-configuration:commons-configuration:1.10    0 36
snuggletex-core-1.1.0.jar uk.ac.ed.ph.snuggletex:snuggletex-core:1.1.0   0 18
batik-css-1.7.jar cpe:/a:apache:batik:1.7 org.apache.xmlgraphics:batik-css:1.7  High 3 Highest 22
xmlgraphics-commons-1.3.1.jar org.apache.xmlgraphics:xmlgraphics-commons:1.3.1    0 25
jeuclid-core-3.1.5.jar net.sourceforge.jeuclid:jeuclid-core:3.1.5    0 22
snuggletex-jeuclid-1.1.0.jar uk.ac.ed.ph.snuggletex:snuggletex-jeuclid:1.1.0   0 18
serializer-2.7.1.jar cpe:/a:apache:xalan-java:2.7.1 xalan:serializer:2.7.1  High 1 Highest 26
xalan-2.7.1.jar cpe:/a:apache:xalan-java:2.7.1 xalan:xalan:2.7.1  High 1 Highest 40
wiki-jpa-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-jpa:5.2.x-SNAPSHOT   0 24
wiki-jpa-migration-5.2.x-SNAPSHOT.jar org.exoplatform.wiki:wiki-jpa-migration:5.2.x-SNAPSHOT   0 26
gatein-management-api-2.1.0.Final.jar org.gatein.management:gatein-management-api:2.1.0.Final   0 28
jboss-dmr-1.1.1.Final.jar org.jboss:jboss-dmr:1.1.1.Final    0 26
gatein-management-core-2.1.0.Final.jar org.gatein.management:gatein-management-core:2.1.0.Final   0 28
gatein-management-rest-2.1.0.Final.jar org.gatein.management:gatein-management-rest:2.1.0.Final   0 28
twitter4j-core-3.0.5.jar cpe:/a:twitter_project:twitter:3.0.5
cpe:/a:twitter:twitter:3.0.5
org.twitter4j:twitter4j-core:3.0.5    0 Low 22
scribe-1.3.5.jar cpe:/a:scribe:scribe:1.3.5 org.scribe:scribe:1.3.5    0 Low 23
google-http-client-1.14.1-beta.jar com.google.http-client:google-http-client:1.14.1-beta    0 24
jsr305-1.3.9.jar com.google.code.findbugs:jsr305:1.3.9    0 21
google-oauth-client-1.14.1-beta.jar com.google.oauth-client:google-oauth-client:1.14.1-beta    0 24
google-api-client-1.14.1-beta.jar com.google.api-client:google-api-client:1.14.1-beta    0 22
jackson-core-asl-1.9.11.jar cpe:/a:fasterxml:jackson:1.9.11 org.codehaus.jackson:jackson-core-asl:1.9.11    0 Low 32
google-http-client-jackson-1.14.1-beta.jar com.google.http-client:google-http-client-jackson:1.14.1-beta    0 22
google-api-services-plus-v1-rev69-1.14.2-beta.jar com.google.apis:google-api-services-plus:v1-rev69-1.14.2-beta    0 26
google-api-services-oauth2-v2-rev36-1.14.2-beta.jar com.google.apis:google-api-services-oauth2:v2-rev36-1.14.2-beta    0 26
platform-component-oauth-auth-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-oauth-auth:5.2.x-SNAPSHOT   0 26
pc-portlet-5.2.x-SNAPSHOT.jar org.exoplatform.gatein.pc:pc-portlet:5.2.x-SNAPSHOT   0 29
gatein-cdi-injection-5.2.x-SNAPSHOT.jar org.gatein.cdi:gatein-cdi-injection:5.2.x-SNAPSHOT   0 29
gatein-cdi-contexts-5.2.x-SNAPSHOT.jar org.gatein.cdi:gatein-cdi-contexts:5.2.x-SNAPSHOT   0 27
platform-component-edition-community-5.2.x-SNAPSHOT.jar org.exoplatform.platform:platform-component-edition-community:5.2.x-SNAPSHOT   0 24
logback-core-1.1.2.jar cpe:/a:logback:logback:1.1.2 ch.qos.logback:logback-core:1.1.2  High 1 Low 30
commons-compiler-2.6.1.jar org.codehaus.janino:commons-compiler:2.6.1    0 18
janino-2.6.1.jar org.codehaus.janino:janino:2.6.1    0 21
plf-tomcat-integration-webapp-5.2.x-SNAPSHOT.war org.exoplatform.platform.distributions:plf-tomcat-integration-webapp:5.2.x-SNAPSHOT   0 26
plf-tomcat-pc-creator-listener-5.2.x-SNAPSHOT.jar org.exoplatform.platform.distributions:plf-tomcat-pc-creator-listener:5.2.x-SNAPSHOT   0 28
jansi-1.11.jar org.fusesource.jansi:jansi:1.11    0 24
hsqldb-2.4.0.jar org.hsqldb:hsqldb:2.4.0    0 35
jul-to-slf4j-1.7.7.jar org.slf4j:jul-to-slf4j:1.7.7    0 30
log4j-over-slf4j-1.7.7.jar org.slf4j:log4j-over-slf4j:1.7.7    0 29
liquibase-slf4j-2.0.0.jar cpe:/a:slf4j:slf4j-ext:2.0.0 com.mattbertolini:liquibase-slf4j:2.0.0    0 Low 24
snakeyaml-1.13.jar org.yaml:snakeyaml:1.13    0 25
plf-exo-tools-5.2.x-SNAPSHOT.jar cpe:/a:form_tools:form_tools:5.2 org.exoplatform.platform.distributions:plf-exo-tools:5.2.x-SNAPSHOT   0 Low 26
exo-lgpl-license-resource-bundle-2.jar org.exoplatform.resources:exo-lgpl-license-resource-bundle:2   0 27
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar cpe:/a:form_manager_project:form_manager:1.4   0 Low 15
jcr-parent-5.2.x-SNAPSHOT-source-release.zip: standard.jar cpe:/a:apache:standard_taglibs:1.1.2 taglibs:standard:1.1.2  High 1 Low 23
jcr-parent-5.2.x-SNAPSHOT-source-release.zip: jstl.jar jstl:jstl:1.1.2    0 24
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar: jansi.dll   0 2
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar: jansi.dll   0 2
jython-standalone-2.5.4-rc1.jar: wininst-7.1.exe   0 4
jython-standalone-2.5.4-rc1.jar: wininst-6.exe   0 4
jython-standalone-2.5.4-rc1.jar: jffi-1.0.dll   0 4
jython-standalone-2.5.4-rc1.jar: jffi-1.0.dll   0 4
jython-standalone-2.5.4-rc1.jar: jline32.dll   0 4
jython-standalone-2.5.4-rc1.jar: jline64.dll   0 4
ehcache-core-2.6.9.jar: sizeof-agent.jar net.sf.ehcache:sizeof-agent:1.0.1   0 26
smartgwt-lgpl-6.0-p20170514.jar: isomorphic_applets.jar   0 9
exo.portal.gadgets-server-5.2.x-SNAPSHOT.war: jcr-1.0.jar cpe:/a:content_project:content:1.0 javax.jcr:jcr:1.0  Medium 1 Low 31
exo.portal.gadgets-server-5.2.x-SNAPSHOT.war: slf4j-api-1.7.5.jar org.slf4j:slf4j-api:1.7.5    0 30
tomcat-8.5.35.zip: taglibs-standard-impl-1.2.5.jar cpe:/a:apache:standard_taglibs:1.2.5 org.apache.taglibs:taglibs-standard-impl:1.2.5    0 Low 28
tomcat-8.5.35.zip: sample.war   0 8
tomcat-8.5.35.zip: bootstrap.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
High 3 Low 12
tomcat-8.5.35.zip: commons-daemon.jar cpe:/a:apache:apache_commons_daemon:1.1.0 commons-daemon:commons-daemon:1.1.0    0 Low 39
tomcat-8.5.35.zip: websocket-api.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-websocket-api:8.5.35  High 3 Low 21
tomcat-8.5.35.zip: jasper.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-jasper:8.5.35  High 3 Low 24
tomcat-8.5.35.zip: catalina-ha.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-catalina-ha:8.5.35  High 3 Low 24
tomcat-8.5.35.zip: tomcat-i18n-fr.jar cpe:/a:apache_software_foundation:tomcat:8.5.35
cpe:/a:apache:tomcat:8.5.35
cpe:/a:apache_tomcat:apache_tomcat:8.5.35
org.apache.tomcat:tomcat-i18n-fr:8.5.35  High 3 Low 19
tomcat-8.5.35.zip: ecj-4.6.3.jar org.eclipse.jdt:ecj:3.12.3    0 32
jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/com.fasterxml.jackson.dataformat/jackson-dataformat-yaml/pom.xml cpe:/a:fasterxml:jackson:2.4.2 com.fasterxml.jackson.dataformat:jackson-dataformat-yaml:2.4.2   0 Low 16
jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/org.yaml/snakeyaml/pom.xml org.yaml:snakeyaml:1.12   0 11
jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling/pom.xml org.jboss.marshalling:jboss-marshalling:2.0.0.Beta3   0 13
jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-river/pom.xml org.jboss.marshalling:jboss-marshalling-river:2.0.0.Beta3   0 13
jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-serial/pom.xml org.jboss.marshalling:jboss-marshalling-serial:2.0.0.Beta3   0 13
jython-standalone-2.5.4-rc1.jar/META-INF/maven/jline/jline/pom.xml jline:jline:0.9.95-SNAPSHOT   0 11
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.antlr/antlr-runtime/pom.xml org.antlr:antlr-runtime:3.1.3   0 15
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.ext.posix/jnr-posix/pom.xml cpe:/a:jruby:jruby:1.1.4 org.jruby.ext.posix:jnr-posix:1.1.4 High 3 Highest 9
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/constantine/pom.xml cpe:/a:values_project:values:0.7 org.jruby.extras:constantine:0.7   0 Low 11
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jaffl/pom.xml org.jruby.extras:jaffl:0.5.1   0 11
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jffi/pom.xml cpe:/a:jruby:jruby:1.0.1 org.jruby.extras:jffi:1.0.1 High 3 Highest 11
jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jnr-netdb/pom.xml org.jruby.extras:jnr-netdb:0.4   0 11
hibernate-validator-4.2.0.Final.jar/META-INF/maven/com.googlecode.jtype/jtype/pom.xml com.googlecode.jtype:jtype:0.1.1   0 12
jansi-1.11.jar/META-INF/maven/org.fusesource.hawtjni/hawtjni-runtime/pom.xml org.fusesource.hawtjni:hawtjni-runtime:1.8   0 13
jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi-native/pom.xml cpe:/a:id:id-software:1.5 org.fusesource.jansi:jansi-native:1.5   0 Low 16
jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi/pom.xml cpe:/a:id:id-software:1.11 org.fusesource.jansi:jansi:1.11   0 Low 13
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/com.beust/jcommander/pom.xml com.beust:jcommander:1.35   0 11
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/jline/jline/pom.xml jline:jline:2.12   0 7
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-api/pom.xml org.eclipse.aether:aether-api:1.1.0   0 13
addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-util/pom.xml org.eclipse.aether:aether-util:1.1.0   0 13

Dependencies

tomcat-juli-8.5.35.jar

Description: Tomcat Core Logging Package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat-juli/8.5.35/tomcat-juli-8.5.35.jar
MD5: c3b6b2bc241e6572ada480e972702800
SHA1: 69d0606072b31b57ba706d1ffc102064ad8f694b
Referenced In Project/Scope: eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:provided

Identifiers

tomcat-api-8.5.35.jar

Description: Definition of interfaces shared by Catalina and Jasper

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat-api/8.5.35/tomcat-api-8.5.35.jar
MD5: 589ecb726f3bc8232d6618e97740dc40
SHA1: cdfda95188ce0322becbef1da00f2ec24c73a44b
Referenced In Project/Scope: eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-jni-8.5.35.jar

Description: Interface code to the native connector

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat-jni/8.5.35/tomcat-jni-8.5.35.jar
MD5: 8fb29c42b9ff472d8fc78d9f3c320215
SHA1: 23dfd85acc1bccf73a0b1e7822fd1b898c4719a6
Referenced In Project/Scope: eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:provided

Identifiers

  • maven: org.apache.tomcat:tomcat-jni:8.5.35    Confidence:Highest
  • cpe: cpe:/a:apache:tomcat_native:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache_software_foundation:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache_tomcat:apache_tomcat:8.5.35   Confidence:Low   

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-coyote-8.5.35.jar

Description: Tomcat Connectors and HTTP parser

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat-coyote/8.5.35/tomcat-coyote-8.5.35.jar
MD5: 53791305852201a76cb079c2f49918f5
SHA1: da94c8aa9c321d79372657103693da3c1729dbee
Referenced In Project/Scope: eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:provided

Identifiers

  • maven: org.apache.tomcat:tomcat-coyote:8.5.35    Confidence:Highest
  • cpe: cpe:/a:apache:coyote_http_connector:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache_software_foundation:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache:tomcat_connectors:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache_tomcat:apache_tomcat:8.5.35   Confidence:Low   

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

mime-util-2.1.3.jar

Description: mime-util is a simple to use, small, light weight and fast open source java utility library that can detect MIME types from files, input streams, URL's and byte arrays. Due to the use of regular expressions and the java.nio packages it requires at least Java 1.4.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/eu/medsea/mimeutil/mime-util/2.1.3/mime-util-2.1.3.jar
MD5: 3d4f3e1a96eb79683197f1c8b182f4a6
SHA1: 0c9cfae15c74f62491d4f28def0dff1dabe52a47
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jakarta-regexp-1.4.jar

File Path: /home/ciagent/.m2/repository/jakarta-regexp/jakarta-regexp/1.4/jakarta-regexp-1.4.jar
MD5: 5d8b8c601c21b37aa6142d38f45c0297
SHA1: 0ea514a179ac1dd7e81c7e6594468b9b9910d298
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

xpp3-1.1.6.jar

Description: XML Pull parser library developed by Extreme Computing Lab, Indiana University

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/ogce/xpp3/1.1.6/xpp3-1.1.6.jar
MD5: 626a429318310e92e3466151e050bdc5
SHA1: dc87e00ddb69341b46a3eb1c331c6fcebf6c8546
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jcl-over-slf4j-1.7.7.jar

Description: JCL 1.1.1 implemented over SLF4J

File Path: /home/ciagent/.m2/repository/org/slf4j/jcl-over-slf4j/1.7.7/jcl-over-slf4j-1.7.7.jar
MD5: 32ad130f946ef0460af416397b7fc7b7
SHA1: 56003dcd0a31deea6391b9e2ef2f2dc90b205a92
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

slf4j-api-1.7.7.jar

Description: The slf4j API

File Path: /home/ciagent/.m2/repository/org/slf4j/slf4j-api/1.7.7/slf4j-api-1.7.7.jar
MD5: ca4280bf93d64367723ae5c8d42dd0b9
SHA1: 2b8019b6249bb05d81d3a3094e468753e2b21311
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

exo.kernel.commons-5.2.x-SNAPSHOT.jar

Description: Implementation of Commons Utils of Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.commons/5.2.x-SNAPSHOT/exo.kernel.commons-5.2.x-SNAPSHOT.jar
MD5: 32f3e3030115ff5f49339f43cbf27eae
SHA1: c0ea42d7a974d853aaf2ed2124e90c84431dc2ae
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.commons:5.2.x-SNAPSHOT   Confidence:High

commons-beanutils-1.8.3.jar

Description: BeanUtils provides an easy-to-use but flexible wrapper around reflection and introspection.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-beanutils/commons-beanutils/1.8.3/commons-beanutils-1.8.3.jar
MD5: b45be74134796c89db7126083129532f
SHA1: 686ef3410bcf4ab8ce7fd0b899e832aaba5facf7
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2014-0114  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Vulnerable Software & Versions: (show all)

common-common-2.2.2.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/common/common-common/2.2.2.Final/common-common-2.2.2.Final.jar
MD5: 8ce16b5e3991285cd27e553740d09d1f
SHA1: 44522d899e31a5a10dbd70f7b0ca2fe5a614f740
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided
  • eXo PLF:: Platform Public Distributions - Tomcat Integration WebApp:compile

Identifiers

wci-wci-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/wci/wci-wci/5.2.x-SNAPSHOT/wci-wci-5.2.x-SNAPSHOT.jar
MD5: 9be7f8aea19a80a647423fa43a36c72b
SHA1: 7c6923487afec73cb54ed4e7cca915b5f8cba968
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided
  • eXo PLF:: Platform Public Distributions - Tomcat Integration WebApp:compile

Identifiers

  • maven: org.exoplatform.gatein.wci:wci-wci:5.2.x-SNAPSHOT   Confidence:High

jibx-run-1.2.6.jar

Description: JiBX runtime code

License:

http://jibx.sourceforge.net/jibx-license.html
File Path: /home/ciagent/.m2/repository/org/jibx/jibx-run/1.2.6/jibx-run-1.2.6.jar
MD5: 4ef53e4279c8440aff2d16c0af024231
SHA1: 544f3ac7887d7eed20ca0420ee1963df6c7ecebb
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

javax.inject-1.jar

Description: The javax.inject API

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/javax/inject/javax.inject/1/javax.inject-1.jar
MD5: 289075e48b909e9e74e6c915b3631d2e
SHA1: 6975da39a7040257bd51d21a231b76c915872d38
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jsr250-api-1.0.jar

Description: JSR-250 Reference Implementation by Glassfish

License:

COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.0: https://glassfish.dev.java.net/public/CDDLv1.0.html
File Path: /home/ciagent/.m2/repository/javax/annotation/jsr250-api/1.0/jsr250-api-1.0.jar
MD5: 4cd56b2e4977e541186de69f5126b4a6
SHA1: 5025422767732a1ab45d93abfea846513d742dcf
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cdi-api-1.0-SP4.jar

Description: APIs for JSR-299: Contexts and Dependency Injection for Java EE

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/javax/enterprise/cdi-api/1.0-SP4/cdi-api-1.0-SP4.jar
MD5: 6c1e2b4036d64b6ba1a1136a00c7cdaa
SHA1: 6e38490033eb8b36c4cf1f7605163424a574dcf0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

exo.kernel.container-5.2.x-SNAPSHOT.jar

Description: Implementation of Container for Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.container/5.2.x-SNAPSHOT/exo.kernel.container-5.2.x-SNAPSHOT.jar
MD5: 08b5875655d3b9b61dea9bf5723988a9
SHA1: a1de9405ed33efea83d23e1c3119997978803814
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.container:5.2.x-SNAPSHOT   Confidence:High

wci-tomcat8-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/wci/wci-tomcat8/5.2.x-SNAPSHOT/wci-tomcat8-5.2.x-SNAPSHOT.jar
MD5: 1d5e66f4b045720af801a1bddc8176fe
SHA1: ae213f27b1197c2d70d4f7f90de71c126418d4a1
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Portal Containers Creator:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided
  • eXo PLF:: Platform Public Distributions - Tomcat Integration WebApp:compile

Identifiers

  • maven: org.exoplatform.gatein.wci:wci-tomcat8:5.2.x-SNAPSHOT   Confidence:High

calendar-webapp-5.2.x-SNAPSHOT.war

Description: eXo Calendar Application

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-webapp/5.2.x-SNAPSHOT/calendar-webapp-5.2.x-SNAPSHOT.war
MD5: 2d969b6da0d2fe73438ef3f2656f9f8b
SHA1: 6eed2fbd7b7d301a24da47e1c4cf2340847af45e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-webapp:5.2.x-SNAPSHOT   Confidence:High

commons-lang-2.6.jar

Description:  Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-lang/commons-lang/2.6/commons-lang-2.6.jar
MD5: 4d5c1693079575b362edf41500630bbd
SHA1: 0ce1edb914c94ebc388f086c6827e8bdeec71ac2
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jcr-1.0.1.jar

Description: Content Repository for Java technology API. Specifies a standard API to access content repositories in JavaTM 2 independently of implementation.

License:

Day License: http://www.day.com/maven/jsr170/licenses/day-spec-license.htm
File Path: /home/ciagent/.m2/repository/javax/jcr/jcr/1.0.1/jcr-1.0.1.jar
MD5: 4639c7b994528948dab1a4feb1f68d6f
SHA1: 567ee103cf7592e3cf036e1bf4e2e06b9f08e1a1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:content_project:content:1.0.1   Confidence:Low   
  • maven: javax.jcr:jcr:1.0.1   Confidence:High

CVE-2017-16111  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

The content module is a module to parse HTTP Content-* headers. It is used by the hapijs framework to provide this functionality. The module is vulnerable to regular expression denial of service when passed a specifically crafted Content-Type or Content-Disposition header.

Vulnerable Software & Versions:

mail-1.4.7.jar

Description: JavaMail API (compat)

License:

http://www.sun.com/cddl, https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: /home/ciagent/.m2/repository/javax/mail/mail/1.4.7/mail-1.4.7.jar
MD5: 77f53ff0c78ba43c4812ecc9f53e20f8
SHA1: 9add058589d5d85adeb625859bf2c5eeaaedf12d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

portlet-api-2.0.jar

Description: The Java Portlet API version 2.0 developed by the Java Community Process JSR-286 Expert Group.

File Path: /home/ciagent/.m2/repository/javax/portlet/portlet-api/2.0/portlet-api-2.0.jar
MD5: 0ec08593cda1df33985391919996c740
SHA1: 1cd72f2a37fcf8ab9893a9468d7ba71c85fe2653
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-chain-1.2.jar

Description:  An implementation of the GoF Chain of Responsibility pattern

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-chain/commons-chain/1.2/commons-chain-1.2.jar
MD5: e18e2c87826644e4c8c08635572c154f
SHA1: 744a13e8766e338bd347b6fbc28c6db12979d0c6
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-httpclient-3.1.jar

Description: The HttpClient component supports the client-side of RFC 1945 (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework by which new request types (methods) or HTTP extensions can be created easily.

License:

Apache License: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar
MD5: 8ad8c9229ef2d59ab9f59f7050e846a5
SHA1: 964cd74171f427720480efdec40a7c7f6e58426a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:apache:httpclient:3.1   Confidence:Low   
  • cpe: cpe:/a:apache:commons-httpclient:3.1   Confidence:Low   
  • maven: commons-httpclient:commons-httpclient:3.1    Confidence:Highest

ical4j-1.0-beta5.jar

Description:  A Java library for reading and writing iCalendar (*.ics) files

License:

iCal4j - License: LICENSE
File Path: /home/ciagent/.m2/repository/ical4j/ical4j/1.0-beta5/ical4j-1.0-beta5.jar
MD5: 6da73e184e456aebd7bd81923c8cccce
SHA1: 6c19c4eec102ae28871c8765fc8d60dc60df93ec
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: ical4j:ical4j:1.0-beta5   Confidence:High

jackrabbit-webdav-1.6.5.jar

Description: WebDAV library used by the Jackrabbit WebDAV support

File Path: /home/ciagent/.m2/repository/org/apache/jackrabbit/jackrabbit-webdav/1.6.5/jackrabbit-webdav-1.6.5.jar
MD5: 1d573cf67bcff173d91dd1d194334b66
SHA1: 5afbee7ce7bcf1c47d7e54e24afcd533cb6776ae
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2015-1833  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary files and send requests to intranet servers via a crafted WebDAV request.

Vulnerable Software & Versions: (show all)

commons-digester-2.1.jar

Description:  The Digester package lets you configure an XML to Java object mapping module which triggers certain actions called rules whenever a particular pattern of nested XML elements is recognized.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-digester/commons-digester/2.1/commons-digester-2.1.jar
MD5: 528445033f22da28f5047b6abcd1c7c9
SHA1: 73a8001e7a54a255eef0f03521ec1805dc738ca0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

exo.kernel.component.command-5.2.x-SNAPSHOT.jar

Description: Implementation of Command Service of Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.component.command/5.2.x-SNAPSHOT/exo.kernel.component.command-5.2.x-SNAPSHOT.jar
MD5: 679d570afd4a961d065f0dc8414da51c
SHA1: 6fe89cf56ffc0662c4accbfc60f54346621b5744
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.component.command:5.2.x-SNAPSHOT   Confidence:High

c3p0-0.9.1.1.jar

Description:  c3p0 is an easy-to-use library for augmenting traditional (DriverManager-based) JDBC drivers with JNDI-bindable DataSources, including DataSources that implement Connection and Statement Pooling, as described by the jdbc3 spec and jdbc2 std extension.

License:

GNU LESSER GENERAL PUBLIC LICENSE: http://www.gnu.org/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/c3p0/c3p0/0.9.1.1/c3p0-0.9.1.1.jar
MD5: 640c58226e7bb6beacc8ac3f6bb533d1
SHA1: 302704f30c6e7abb7a0457f7771739e03c973e80
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

quartz-2.2.2.jar

Description: Enterprise Job Scheduler

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
Apache Software License, Version 2.0
File Path: /home/ciagent/.m2/repository/org/quartz-scheduler/quartz/2.2.2/quartz-2.2.2.jar
MD5: 6acfd6ada2f4ad0abf4de916654dcaea
SHA1: 6fd24da6803ab7c3a08bc519a62219a9bebeb0df
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

calendar-service-5.2.x-SNAPSHOT.jar

Description: eXo Calendar Service

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-service/5.2.x-SNAPSHOT/calendar-service-5.2.x-SNAPSHOT.jar
MD5: 3fcf9fef83d1686bce1ebdffc073e476
SHA1: a56a2e0bf70ad9e0428cd9ac85527765a1a37c77
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-service:5.2.x-SNAPSHOT   Confidence:High

jackson-core-2.4.2.jar

Description: Core Jackson abstractions, basic JSON streaming API implementation

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.4.2/jackson-core-2.4.2.jar
MD5: 1800d8b5c3324eaa7cff549bad28a98b
SHA1: ceb72830d95c512b4b300a38f29febc85bdf6e4b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jackson-annotations-2.4.0.jar

Description: Core annotations used for value types, used by Jackson data binding package.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/core/jackson-annotations/2.4.0/jackson-annotations-2.4.0.jar
MD5: 6df1b79ec2e57d62106eb47129e4f7a3
SHA1: d6a66c7a5f01cf500377bd669507a08cfeba882a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

stax2-api-3.1.4.jar

Description: tax2 API is an extension to basic Stax 1.0 API that adds significant new functionality, such as full-featured bi-direction validation interface and high-performance Typed Access API.

License:

The BSD License: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar
MD5: c08e89de601b0a78f941b2c29db565c3
SHA1: ac19014b1e6a7c08aad07fe114af792676b685b7
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jackson-dataformat-xml-2.4.2.jar

Description: Data format extension for Jackson (http://jackson.codehaus.org) to offer alternative support for serializing POJOs as XML and deserializing XML as pojos. Support implemented on top of Stax API (javax.xml.stream), by implementing core Jackson Streaming API types like JsonGenerator, JsonParser and JsonFactory. Some data-binding types overridden as well (ObjectMapper sub-classed as XmlMapper).

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/dataformat/jackson-dataformat-xml/2.4.2/jackson-dataformat-xml-2.4.2.jar
MD5: 1fa55358af6a1364e72e24d9ca4d58e7
SHA1: 02f2d96f68b2d3475452d95dde7a3fbee225f6ae
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-3720  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

XML external entity (XXE) vulnerability in XmlMapper in the Data format extension for Jackson (aka jackson-dataformat-xml) allows attackers to have unspecified impact via unknown vectors.

Vulnerable Software & Versions:

CVE-2016-7051  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-918 Server-Side Request Forgery (SSRF)

XmlMapper in the Jackson XML dataformat component (aka jackson-dataformat-xml) before 2.7.8 and 2.8.x before 2.8.4 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD.

Vulnerable Software & Versions: (show all)

CVE-2017-15095  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.

Vulnerable Software & Versions: (show all)

CVE-2017-17485  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

Vulnerable Software & Versions: (show all)

CVE-2017-7525  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.

Vulnerable Software & Versions: (show all)

CVE-2018-1000873  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Databind that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.

Vulnerable Software & Versions: (show all)

CVE-2018-14718  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-14719  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-14720  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-14721  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-918 Server-Side Request Forgery (SSRF)

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-19360  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-19361  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-19362  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

swagger-annotations-1.5.0.jar

Description: Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/

License:

http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/io/swagger/swagger-annotations/1.5.0/swagger-annotations-1.5.0.jar
MD5: c16eb2bdd9f90e97849950178c4c543d
SHA1: f7497f7887e65277c0dab1da1148cf211083f3d4
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

swagger-models-1.5.0.jar

Description: Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/

License:

http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/io/swagger/swagger-models/1.5.0/swagger-models-1.5.0.jar
MD5: 5c3d553535fddea14a4e7e87c5fc59fa
SHA1: d2566bfc270073a559b342089f54086ee64ca5b1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

swagger-core-1.5.0.jar

File Path: /home/ciagent/.m2/repository/io/swagger/swagger-core/1.5.0/swagger-core-1.5.0.jar
MD5: abc2015d9e823cb96abfa7e2937b43fb
SHA1: 09d5cfb8188ac316bad3a7b38c46bac0568c60e4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

annotations-2.0.1.jar

Description: Annotation supports the FindBugs tool

License:

GNU Lesser Public License: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/com/google/code/findbugs/annotations/2.0.1/annotations-2.0.1.jar
MD5: 35ef911c85603829ded63f211feb2d68
SHA1: 9ef6656259841cebfb9fb0697bb122ada4485498
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

reflections-0.9.9.jar

Description: Reflections - a Java runtime metadata analysis

License:

WTFPL: http://www.wtfpl.net/
The New BSD License: http://www.opensource.org/licenses/bsd-license.html
File Path: /home/ciagent/.m2/repository/org/reflections/reflections/0.9.9/reflections-0.9.9.jar
MD5: 5f13944b355f927f956b6298136ad959
SHA1: 0296d8adb2f22a38025f44b45cac89835ff0bbaf
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

swagger-jaxrs-1.5.0.jar

File Path: /home/ciagent/.m2/repository/io/swagger/swagger-jaxrs/1.5.0/swagger-jaxrs-1.5.0.jar
MD5: a09d96c899411ac57a479c6635829600
SHA1: 04a77f3f95bfec3073d9d20660c16f54886dfc9f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

calendar-webservice-5.2.x-SNAPSHOT.jar

Description: eXo Calendar Webservice

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-webservice/5.2.x-SNAPSHOT/calendar-webservice-5.2.x-SNAPSHOT.jar
MD5: 2079bbe034171b2a54f0f7af96125b09
SHA1: 06f3c5bd67fe6ba13389f221c0e9275399b24f53
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-webservice:5.2.x-SNAPSHOT   Confidence:High

exo.ws.commons-5.2.x-SNAPSHOT.jar

Description: Implementation of Commons Utils for Exoplatform SAS 'Web Services' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/ws/exo.ws.commons/5.2.x-SNAPSHOT/exo.ws.commons-5.2.x-SNAPSHOT.jar
MD5: befd1603c9c8c9945d5e2c42ff65a54e
SHA1: e73c108c3ef3a8f7fbe8dbe74adc4e0c25cf0258
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ws:exo.ws.commons:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:ws_project:ws:5.2   Confidence:Low   

bayeux-api-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/bayeux-api/3.0.8/bayeux-api-3.0.8.jar
MD5: a09842b7f274cefffa408299b5fc8dd0
SHA1: d5aceb0e7fef4a140f7e95be48338b97723d3163
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cometd-java-common-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-common/3.0.8/cometd-java-common-3.0.8.jar
MD5: 70c7cc13ecc20634a6b357e33134d551
SHA1: 5e2134a1b3bc6e03b7e1666a74e9993d0bb52a7d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cometd-java-websocket-javax-server-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-websocket-javax-server/3.0.8/cometd-java-websocket-javax-server-3.0.8.jar
MD5: afa5e80138d48292a6f93b708257d2fc
SHA1: 353860f809886a58c181dd9e273ee7b79e133277
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cometd-java-websocket-common-server-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-websocket-common-server/3.0.8/cometd-java-websocket-common-server-3.0.8.jar
MD5: 5772b2360cec4ff610e62151fb4deb62
SHA1: 61538a1231b700bf045fa197514f63509960985e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cometd-java-annotations-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-annotations/3.0.8/cometd-java-annotations-3.0.8.jar
MD5: 98b60697675562cf957655c3239a1ad3
SHA1: 5b56875b2ac024b5666633596abb90702ec35e81
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jetty-io-9.2.14.v20151106.jar

Description: Administrative parent pom for Jetty modules

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.php
File Path: /home/ciagent/.m2/repository/org/eclipse/jetty/jetty-io/9.2.14.v20151106/jetty-io-9.2.14.v20151106.jar
MD5: 94d0e857144c7615b6fd65019cd32b59
SHA1: dfa4137371a3f08769820138ca1a2184dacda267
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cometd-java-client-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-client/3.0.8/cometd-java-client-3.0.8.jar
MD5: 24f1367fb4d96fe70a3f07a1f48e447e
SHA1: 826d4ae9402e7c48cc98fe287389788134e4986f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cometd-java-websocket-common-client-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-websocket-common-client/3.0.8/cometd-java-websocket-common-client-3.0.8.jar
MD5: c17616c290c54ffc4a70dda2b901919a
SHA1: 8b75f11de5bba306d0bcb20a6c1bed89675579cd
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cometd-java-websocket-javax-client-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-websocket-javax-client/3.0.8/cometd-java-websocket-javax-client-3.0.8.jar
MD5: 433dd449f689697bbe1a75b0ed2788f8
SHA1: b44bcf098667f0112301d75f73adb5ba3295699d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cometd-java-oort-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-oort/3.0.8/cometd-java-oort-3.0.8.jar
MD5: 62dbbecedab27927495fc9c9e0b70505
SHA1: a72695546e010c250ba65519fc91867b208fc8f9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jetty-jmx-9.2.14.v20151106.jar

Description: JMX management artifact for jetty.

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.php
File Path: /home/ciagent/.m2/repository/org/eclipse/jetty/jetty-jmx/9.2.14.v20151106/jetty-jmx-9.2.14.v20151106.jar
MD5: 5eccc25d22921cb4787812d0687a2978
SHA1: 617edc5e966b4149737811ef8b289cd94b831bab
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:jetty:jetty:9.2.14.v20151106   Confidence:Low   
  • maven: org.eclipse.jetty:jetty-jmx:9.2.14.v20151106    Confidence:Highest
  • cpe: cpe:/a:eclipse:jetty:9.2.14.v20151106   Confidence:Low   

CVE-2017-7656  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-284 Improper Access Control

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.

Vulnerable Software & Versions: (show all)

CVE-2017-7657  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.

Vulnerable Software & Versions: (show all)

CVE-2017-7658  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-19 Data Handling

In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.

Vulnerable Software & Versions: (show all)

CVE-2017-9735  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

Vulnerable Software & Versions:

cometd-java-server-3.0.8.jar

Description: The CometD project is a scalable web messaging bus that uses WebSocketand HTTP AJAX push technology patterns known as "Comet" techniques

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.opensource.org/licenses/bsd-license.html, http://opensource-definition.org/licenses/afl-2.1.html
File Path: /home/ciagent/.m2/repository/org/cometd/java/cometd-java-server/3.0.8/cometd-java-server-3.0.8.jar
MD5: c55eb617762fad72683da9de856e008c
SHA1: 11d535c657bdb491abc2ccd820118f9d6a8f44e0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-comet-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-comet-service/5.2.x-SNAPSHOT/commons-comet-service-5.2.x-SNAPSHOT.jar
MD5: d0b2c2bf5bbcfe3001f96d1834e99e99
SHA1: cb4507f7fa99e6b3f2ff4f7406afce9dac0b8e71
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-comet-service:5.2.x-SNAPSHOT   Confidence:High

commons-webui-ext-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-webui-ext/5.2.x-SNAPSHOT/commons-webui-ext-5.2.x-SNAPSHOT.jar
MD5: d97cd2e8e149cd517143dba5644b75f6
SHA1: 66c1047859bd8c28e5fca6b04fbbc65949e833fa
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-webui-ext:5.2.x-SNAPSHOT   Confidence:High

chromattic.core-1.3.0.jar

Description: Chromattic Framework Core

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.core/1.3.0/chromattic.core-1.3.0.jar
MD5: 9ece56be0e1e1b3289bbe177e8e1b4ab
SHA1: 1bc4ebc89d7b47af394b920f44a0b51409343034
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

aspectjrt-1.8.8.jar

Description: The runtime needed to execute a program using AspectJ

License:

Eclipse Public License - v 1.0: http://www.eclipse.org/legal/epl-v10.html
File Path: /home/ciagent/.m2/repository/org/aspectj/aspectjrt/1.8.8/aspectjrt-1.8.8.jar
MD5: 2e448cd7ae0bdc357cb2b6e892ba9c9d
SHA1: 7c5b26f24375685e34a50c2d765ebc40a96a5280
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

owasp-java-html-sanitizer-20160413.1.jar

File Path: /home/ciagent/.m2/repository/com/googlecode/owasp-java-html-sanitizer/owasp-java-html-sanitizer/20160413.1/owasp-java-html-sanitizer-20160413.1.jar
MD5: f2dbfedbd7bea844cedc1fc1e95fca80
SHA1: 61780b5d65c39013d733b70b2d2968f72f83aa0a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jrcs.diff-0.4.2.jar

File Path: /home/ciagent/.m2/repository/org/suigeneris/jrcs.diff/0.4.2/jrcs.diff-0.4.2.jar
MD5: a05e71b59b7099da7844fd3b5f38e299
SHA1: 6e8eea2281426cd791a64b348c0932c88b966f39
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

ecs-1.4.2.jar

File Path: /home/ciagent/.m2/repository/ecs/ecs/1.4.2/ecs-1.4.2.jar
MD5: 62d53be190ca9cbfe01bec9fc3396934
SHA1: f9bc5fdde56d60876c1785087ce2a301b4e4a676
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

liquibase-core-3.4.2.jar

File Path: /home/ciagent/.m2/repository/org/liquibase/liquibase-core/3.4.2/liquibase-core-3.4.2.jar
MD5: d4ad6d5f7958b69b8fbd01a5564ae45b
SHA1: c91ccf342466857251cf6795b0cecc42509206f2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

dom4j-1.6.1.jar

Description: dom4j: the flexible XML framework for Java

File Path: /home/ciagent/.m2/repository/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar
MD5: 4d8f51d3fe3900efc6e395be48030d6d
SHA1: 5d3ccc056b6f056dbf0dddfdf43894b9065a8f94
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2018-1000632  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CWE: CWE-91 XML Injection (aka Blind XPath Injection)

dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.

Vulnerable Software & Versions: (show all)

javassist-3.20.0-GA.jar

Description:  Javassist (JAVA programming ASSISTant) makes Java bytecode manipulation simple. It is a class library for editing bytecodes in Java.

License:

MPL 1.1: http://www.mozilla.org/MPL/MPL-1.1.html
LGPL 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
Apache License 2.0: http://www.apache.org/licenses/
File Path: /home/ciagent/.m2/repository/org/javassist/javassist/3.20.0-GA/javassist-3.20.0-GA.jar
MD5: a89dd7907d76e061ec2c07e762a74256
SHA1: a9cbcdfb7e9f86fbc74d3afae65f2248bfbf82a0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

hibernate-jpa-2.0-api-1.0.1.Final.jar

Description:  Hibernate definition of the Java Persistence 2.0 (JSR 317) API.

License:

license.txt
File Path: /home/ciagent/.m2/repository/org/hibernate/javax/persistence/hibernate-jpa-2.0-api/1.0.1.Final/hibernate-jpa-2.0-api-1.0.1.Final.jar
MD5: d7e7d8f60fc44a127ba702d43e71abec
SHA1: 3306a165afa81938fc3d8a0948e891de9f6b192b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

hibernate-entitymanager-4.2.21.Final.jar

Description: A module of the Hibernate O/RM project

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-entitymanager/4.2.21.Final/hibernate-entitymanager-4.2.21.Final.jar
MD5: 2c1a3f1c7bb83b730ab3db1fe588904e
SHA1: a6675070b4c7bb843d74d6ab3bc9440fd315dbb3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-component-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-component-common/5.2.x-SNAPSHOT/commons-component-common-5.2.x-SNAPSHOT.jar
MD5: 061045f18116fe5b9bbec6173042bfee
SHA1: 9b9c6b1b8f2eb5752ea4740e6ce558b0fc3686fc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-component-common:5.2.x-SNAPSHOT   Confidence:High

antlr-2.7.7.jar

Description:  A framework for constructing recognizers, compilers, and translators from grammatical descriptions containing Java, C#, C++, or Python actions.

License:

BSD License: http://www.antlr.org/license.html
File Path: /home/ciagent/.m2/repository/antlr/antlr/2.7.7/antlr-2.7.7.jar
MD5: f8f1352c52a4c6a500b597596501fc64
SHA1: 83cd2cd674a217ade95a4bb83a8a14f351f48bd0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

hibernate-core-4.2.21.Final.jar

Description: A module of the Hibernate O/RM project

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-core/4.2.21.Final/hibernate-core-4.2.21.Final.jar
MD5: 492567c1f36fb3a5968ca2d3c452edaf
SHA1: bb587d00287c13d9e4324bc76c13abbd493efa81
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

exo.core.component.organization.api-5.2.x-SNAPSHOT.jar

Description: API of Organization Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.organization.api/5.2.x-SNAPSHOT/exo.core.component.organization.api-5.2.x-SNAPSHOT.jar
MD5: 13f1d72dcd506f059195c04882e17ea0
SHA1: 2d6cb689b999ada402123f4c06ee6c621799f1d0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.organization.api:5.2.x-SNAPSHOT   Confidence:High

exo.core.component.security.core-5.2.x-SNAPSHOT.jar

Description: Implementation of 'eXo Security' component of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.security.core/5.2.x-SNAPSHOT/exo.core.component.security.core-5.2.x-SNAPSHOT.jar
MD5: af1ee2d7cc48d42a0d6f61127b6208d3
SHA1: 7bbe8037e634a5fd08b18ea4485e4b601f3db628
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.security.core:5.2.x-SNAPSHOT   Confidence:High

lucene-core-3.6.2.jar

Description: Apache Lucene Java Core

File Path: /home/ciagent/.m2/repository/org/apache/lucene/lucene-core/3.6.2/lucene-core-3.6.2.jar
MD5: ee396d04f5a35557b424025f5382c815
SHA1: 9ec77e2507f9cc01756964c71d91efd8154a8c47
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

lucene-analyzers-3.6.2.jar

Description: Additional Analyzers

File Path: /home/ciagent/.m2/repository/org/apache/lucene/lucene-analyzers/3.6.2/lucene-analyzers-3.6.2.jar
MD5: 13f8241b6991bd1349c05369a7c0f002
SHA1: 3a083510dcb0d0fc67f8456cdac6f48aa0da2993
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

lucene-spellchecker-3.6.2.jar

Description: Spell Checker

File Path: /home/ciagent/.m2/repository/org/apache/lucene/lucene-spellchecker/3.6.2/lucene-spellchecker-3.6.2.jar
MD5: a4b684913f93aea76f5dbd7e479f19c5
SHA1: 15db0c0cfee44e275f15ad046e46b9a05910ad24
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jta-1.1.jar

Description:  The javax.transaction package. It is appropriate for inclusion in a classpath, and may be added to a Java 2 installation.

File Path: /home/ciagent/.m2/repository/javax/transaction/jta/1.1/jta-1.1.jar
MD5: 82a10ce714f411b28f13850059de09ee
SHA1: 2ca09f0b36ca7d71b762e14ea2ff09d5eac57558
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

concurrent-1.3.4.jar

License:

Public domain, Sun Microsoystems: >http://gee.cs.oswego.edu/dl/classes/EDU/oswego/cs/dl/util/concurrent/intro.html
File Path: /home/ciagent/.m2/repository/concurrent/concurrent/1.3.4/concurrent-1.3.4.jar
MD5: f29b9d930d3426ebc56919eba10fbd4d
SHA1: 1cf394c2a388199db550cda311174a4c6a7d117c
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-collections-3.2.2.jar

Description: Types that extend and augment the Java Collections Framework.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-collections/commons-collections/3.2.2/commons-collections-3.2.2.jar
MD5: f54a8510f834a1a57166970bfc982e94
SHA1: 8ad72fe39fa8c91eaaf12aadb21e0c3661fe26d5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jgroups-3.6.13.Final.jar

Description:  Reliable cluster communication toolkit

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/org/jgroups/jgroups/3.6.13.Final/jgroups-3.6.13.Final.jar
MD5: d7a4d1065e9b09e3f48bfa88ab368a0c
SHA1: 1315a8a1aed98dcafc11a850957ced42dc26bf18
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jbossjta-4.16.6.Final.jar

Description: JBossTS - JBoss Transaction Service. JTA, JTS and XTS (WS-AT, WS-BA)

License:

LGPL 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/jboss/jbossts/jbossjta/4.16.6.Final/jbossjta-4.16.6.Final.jar
MD5: 9e3c8d7d93b92ab97489aeb5816370c8
SHA1: 99e79e03ced180bea4e3307511d350eb2b88c91c
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

ws-commons-util-1.0.1.jar

Description: This is a small collection of utility classes, that allow high performance XML processing based on SAX. Basically, it is assumed, that you are using an JAXP 1.1 compliant XML parser and nothing else. In particular, no dependency on the javax.xml.transform package is introduced.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/ws/commons/ws-commons-util/1.0.1/ws-commons-util-1.0.1.jar
MD5: 66919d22287ddab742a135da764c2cd6
SHA1: 126e80ff798fece634bc94e61f8be8a8da00be60
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-10542  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.

Vulnerable Software & Versions:

jboss-common-core-2.2.22.GA.jar

Description: JBoss Common Core Utility classes

File Path: /home/ciagent/.m2/repository/org/jboss/jboss-common-core/2.2.22.GA/jboss-common-core-2.2.22.GA.jar
MD5: 8c415e1467075a90045a7b0fd19886a3
SHA1: ae1a22412d879c4ac48e35cf00f438bb263d41c3
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

stringtemplate-3.2.1.jar

Description: StringTemplate is a java template engine for generating source code, web pages, emails, or any other formatted text output. StringTemplate is particularly good at multi-targeted code generators, multiple site skins, and internationalization/localization. It evolved over years of effort developing jGuru.com. StringTemplate also generates the stringtemplate website: http://www.stringtemplate.org and powers the ANTLR v3 code generator. Its distinguishing characteristic is that unlike other engines, it strictly enforces model-view separation. Strict separation makes websites and code generators more flexible and maintainable; it also provides an excellent defense against malicious template authors. There are currently about 600 StringTemplate source downloads a month.

License:

BSD licence: http://antlr.org/license.html
File Path: /home/ciagent/.m2/repository/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar
MD5: b58ca53e518a92a1991eb63b61917582
SHA1: 59ec8083721eae215c6f3caee944c410d2be34de
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

antlr-runtime-3.5.jar

Description: A framework for constructing recognizers, compilers, and translators from grammatical descriptions containing Java, C#, C++, or Python actions.

File Path: /home/ciagent/.m2/repository/org/antlr/antlr-runtime/3.5/antlr-runtime-3.5.jar
MD5: aa6d7c8b425df59f5f5bc98c58cfd9fc
SHA1: 0baa82bff19059401e90e1b90020beb9c96305d7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

exo.kernel.component.ext.cache.impl.infinispan.v8-5.2.x-SNAPSHOT.jar

Description: Infinispan Implementation of Cache Service for Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.component.ext.cache.impl.infinispan.v8/5.2.x-SNAPSHOT/exo.kernel.component.ext.cache.impl.infinispan.v8-5.2.x-SNAPSHOT.jar
MD5: 592574c93cc71eee7dd32d53f21f47bd
SHA1: a1c34ba81626e776f35d1b62d780fe951041fe0d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.component.ext.cache.impl.infinispan.v8:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:infinispan:infinispan:5.2.0   Confidence:Highest   

CVE-2016-0750  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-15089  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-2638  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CWE: CWE-287 Improper Authentication

It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.

Vulnerable Software & Versions: (show all)

jboss-marshalling-osgi-2.0.0.Beta3.jar

Description: JBoss Marshalling OSGi Bundle with API and implementations

License:

http://repository.jboss.org/licenses/cc0-1.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/marshalling/jboss-marshalling-osgi/2.0.0.Beta3/jboss-marshalling-osgi-2.0.0.Beta3.jar
MD5: 7652392087f6e70312cf0309ab563a4f
SHA1: a55fe6527a2d50dc48ad3f8b9093bd0cb01302b0
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

infinispan-core-8.2.6.Final.jar

Description: Infinispan core module

License:

http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/infinispan/infinispan-core/8.2.6.Final/infinispan-core-8.2.6.Final.jar
MD5: 06371c22b39aef4faf1da8d21b2102cb
SHA1: 84937a866a56760b9c50bfbca10442fa14be6375
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-0750  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-15089  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.

Vulnerable Software & Versions: (show all)

CVE-2017-2638  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CWE: CWE-287 Improper Authentication

It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.

Vulnerable Software & Versions: (show all)

exo.jcr.component.core-5.2.x-SNAPSHOT.jar

Description: Implementation of Core Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.component.core/5.2.x-SNAPSHOT/exo.jcr.component.core-5.2.x-SNAPSHOT.jar
MD5: a1ea82b332ca9d14e2107b1319cb02ad
SHA1: c553be8be54a1cf3241640a831e5fd8a40f447af
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.component.core:5.2.x-SNAPSHOT   Confidence:High

commons-dbcp-1.4.jar

Description: Commons Database Connection Pooling

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-dbcp/commons-dbcp/1.4/commons-dbcp-1.4.jar
MD5: b004158fab904f37f5831860898b3cd9
SHA1: 30be73c965cc990b153a100aaaaafcf239f82d39
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-pool-1.6.jar

Description: Commons Object Pooling Library

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-pool/commons-pool/1.6/commons-pool-1.6.jar
MD5: 5ca02245c829422176d23fa530e919cc
SHA1: 4572d589699f09d866a226a14b7f4323c6d8f040
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

exo.kernel.component.common-5.2.x-SNAPSHOT.jar

Description: Implementation of Common Service of Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.component.common/5.2.x-SNAPSHOT/exo.kernel.component.common-5.2.x-SNAPSHOT.jar
MD5: 374e56484bca46022c99f4bcf6b0eda9
SHA1: 1936e7088adc64a444f987a3954362c46fb8fcfc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.component.common:5.2.x-SNAPSHOT   Confidence:High

exo.portal.webui.core-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/portal/exo.portal.webui.core/5.2.x-SNAPSHOT/exo.portal.webui.core-5.2.x-SNAPSHOT.jar
MD5: 1c0497ce1fd439e375fda7f1ed9899d5
SHA1: 6a496fc2801cb84f38d2793500a214ad741ea2d7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.portal:exo.portal.webui.core:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:in-portal:in-portal:5.2.0   Confidence:Highest   

CVE-2014-8304  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in In-Portal CMS 5.2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the next_template parameter to admin/index.php.

Vulnerable Software & Versions:

icu4j-56.1.jar

Description:  International Component for Unicode for Java (ICU4J) is a mature, widely used Java library providing Unicode and Globalization support

License:

ICU License: http://source.icu-project.org/repos/icu/icu/trunk/license.html
File Path: /home/ciagent/.m2/repository/com/ibm/icu/icu4j/56.1/icu4j-56.1.jar
MD5: 7bd1a7a1295868726f991c7593dce442
SHA1: 8dd6671f52165a0419e6de5e1016400875a90fa9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-6293  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument.

Vulnerable Software & Versions:

CVE-2016-7415  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in the Locale class in common/locid.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long locale string.

Vulnerable Software & Versions:

CVE-2017-14952  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-415 Double Free

Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a "redundant UVector entry clean up function call" issue.

Vulnerable Software & Versions:

CVE-2017-15396  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ before 60.2, as used in V8 in Google Chrome prior to 62.0.3202.75 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Vulnerable Software & Versions: (show all)

CVE-2017-15422  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.

Vulnerable Software & Versions: (show all)

CVE-2017-17484  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC.

Vulnerable Software & Versions:

CVE-2017-7867  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-787 Out-of-bounds Write

International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function.

Vulnerable Software & Versions:

CVE-2017-7868  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-787 Out-of-bounds Write

International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function.

Vulnerable Software & Versions:

common-logging-2.2.2.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/common/common-logging/2.2.2.Final/common-logging-2.2.2.Final.jar
MD5: 28b7108ee63899bca08636d360e7df11
SHA1: aee18008518671fb10982c0fe5f7383e98f71c47
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided
  • eXo PLF:: Platform Public Distributions - Tomcat Integration WebApp:compile

Identifiers

social-component-core-5.2.x-SNAPSHOT.jar

Description: eXo Social Core Component: People and Space

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-core/5.2.x-SNAPSHOT/social-component-core-5.2.x-SNAPSHOT.jar
MD5: 74e5b1963353f51745de0a271f806bcc
SHA1: 9518c78207fbe306eb629a72bdb491c3c74adea5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-core:5.2.x-SNAPSHOT   Confidence:High

social-component-common-5.2.x-SNAPSHOT.jar

Description: eXo Social Common Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-common/5.2.x-SNAPSHOT/social-component-common-5.2.x-SNAPSHOT.jar
MD5: 465cc9a18bd46e27cf48939b94204e32
SHA1: 60946ca8c8c2a249e9f7406d716bf0a9e8483e33
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-common:5.2.x-SNAPSHOT   Confidence:High

staxnav.core-0.9.8.jar

File Path: /home/ciagent/.m2/repository/org/staxnav/staxnav.core/0.9.8/staxnav.core-0.9.8.jar
MD5: 0f786e5be21df9fbe8753175564564c7
SHA1: 27bd12d4d74b0851e38de79f8299462d93ba3d7f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-lang3-3.3.2.jar

Description:  Apache Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/commons/commons-lang3/3.3.2/commons-lang3-3.3.2.jar
MD5: 3128bf75a2549ebe38663401191bacab
SHA1: 90a3822c38ec8c996e84c16a3477ef632cbc87a3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

pc-federation-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/pc/pc-federation/5.2.x-SNAPSHOT/pc-federation-5.2.x-SNAPSHOT.jar
MD5: 6c6a1e7d40c69b6b7d5c82224490974a
SHA1: 6117d36bae8919beeb35bcfefe453312aa6084bd
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.pc:pc-federation:5.2.x-SNAPSHOT   Confidence:High

pc-bridge-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/pc/pc-bridge/5.2.x-SNAPSHOT/pc-bridge-5.2.x-SNAPSHOT.jar
MD5: c107045882dc1240aff267b19812216e
SHA1: 9dafa214f5fa281c6b3053afb27fe0eb9c90f018
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.pc:pc-bridge:5.2.x-SNAPSHOT   Confidence:High

picketlink-idm-core-1.4.6.Final.jar

Description: PicketLink IDM IMPL contains the implementation of the API and the Identity Model.

License:

lgpl: http://repository.jboss.com/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/org/picketlink/idm/picketlink-idm-core/1.4.6.Final/picketlink-idm-core-1.4.6.Final.jar
MD5: a5c21c2186c186bc296d9909bcb11616
SHA1: 30d4385012393e4c50a82f8b84153eb6ee301a7d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2015-0277  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.

Vulnerable Software & Versions:

CVE-2015-3158  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The invokeNextValve function in identity/federation/bindings/tomcat/idp/AbstractIDPValve.java in PicketLink before 2.8.0.Beta1 does not properly check role based authorization, which allows remote authenticated users to gain access to restricted application resources via a (1) direct request or (2) request through an SP initiated flow.

Vulnerable Software & Versions:

CVE-2015-6254  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)
CWE: CWE-17 Code

The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.

Vulnerable Software & Versions:

mop-api-1.3.2.Final.jar

Description: API of the Object Model for Portal

File Path: /home/ciagent/.m2/repository/org/gatein/mop/mop-api/1.3.2.Final/mop-api-1.3.2.Final.jar
MD5: 4f2c10678f3c5850bb85c25514469e2e
SHA1: 78f9c03a23ec1c3564e827d3927ce53eca6d919d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.mop:mop-api:1.3.2.Final   Confidence:High

mop-spi-1.3.2.Final.jar

Description: SPI of the Object Model for Portal

File Path: /home/ciagent/.m2/repository/org/gatein/mop/mop-spi/1.3.2.Final/mop-spi-1.3.2.Final.jar
MD5: 6ef18d761e625d923ec01c6e5283026e
SHA1: 4fe3a673d58c85d2f6c9ad4446b90229f46c8987
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.mop:mop-spi:1.3.2.Final   Confidence:High

mop-core-1.3.2.Final.jar

Description: Model Object for Portal Core

File Path: /home/ciagent/.m2/repository/org/gatein/mop/mop-core/1.3.2.Final/mop-core-1.3.2.Final.jar
MD5: 7d5eb7a5c2ed2d88362f9d8a9413a475
SHA1: d27e4c960aefd919f7c25049b72a9bc225cd6548
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.mop:mop-core:1.3.2.Final   Confidence:High

gatein-management-spi-2.1.0.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/management/gatein-management-spi/2.1.0.Final/gatein-management-spi-2.1.0.Final.jar
MD5: 4e10565858662ec9eea75cfbd3544ba1
SHA1: 79670b2dd849b49e145b7122cbff4ef83116157f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.management:gatein-management-spi:2.1.0.Final   Confidence:High

args4j-2.0.16.jar

File Path: /home/ciagent/.m2/repository/args4j/args4j/2.0.16/args4j-2.0.16.jar
MD5: 6571d69d142dd2a003c4ffae6138f0ee
SHA1: 9f00fb12820743b9e05c686eba543d64dd43f2b1
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

closure-compiler-v20131014.jar

Description:  Closure Compiler is a JavaScript optimizing compiler. It parses your JavaScript, analyzes it, removes dead code and rewrites and minimizes what's left. It also checks syntax, variable references, and types, and warns about common JavaScript pitfalls. It is used in many of Google's JavaScript apps, including Gmail, Google Web Search, Google Maps, and Google Docs.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/com/google/javascript/closure-compiler/v20131014/closure-compiler-v20131014.jar
MD5: e9b4b20ef9ff13c13fb159a9efff33ea
SHA1: 5be964798a558aa8f7ddff395d5a9e030b49fae2
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

filters-2.0.235.jar

Description: A collection of image processing filters.

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/com/jhlabs/filters/2.0.235/filters-2.0.235.jar
MD5: d91073d6b28e2505e96620709626495f
SHA1: af6a2dfefef70f1ab2d7a8d1f8173f67e276b3f4
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2005-0406  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)

A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.

Vulnerable Software & Versions:

simplecaptcha-1.1.1.Final-gatein-4.jar

File Path: /home/ciagent/.m2/repository/org/gatein/captcha/simplecaptcha/1.1.1.Final-gatein-4/simplecaptcha-1.1.1.Final-gatein-4.jar
MD5: a8b83c67e6fd04cd02d8ebcfd47348c1
SHA1: 964c53fedc87745494c5f8f2cd62b2548dbdeff5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.captcha:simplecaptcha:1.1.1.Final-gatein-4   Confidence:High

gatein-api-1.0.1.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/api/gatein-api/1.0.1.Final/gatein-api-1.0.1.Final.jar
MD5: 04d51eb4e2734df16f83e514b7110000
SHA1: b67727b03994e6081e2e411804c25bd5d0d919a6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

rome-1.0.jar

Description: All Roads Lead to ROME. ROME is a set of Atom/RSS Java utilities that make it easy to work in Java with most syndication formats. Today it accepts all flavors of RSS (0.90, 0.91, 0.92, 0.93, 0.94, 1.0 and 2.0), Atom 0.3 and Atom 1.0 feeds. Rome includes a set of parsers and generators for the various flavors of feeds, as well as converters to convert from one format to another. The parsers can give you back Java objects that are either specific for the format you want to work with, or a generic normalized SyndFeed object that lets you work on with the data without bothering about the underlying format.

File Path: /home/ciagent/.m2/repository/rome/rome/1.0/rome-1.0.jar
MD5: 53d38c030287b939f4e6d745ba1269a7
SHA1: 022b33347f315833e9348cec2751af1a5d5656e4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

calendar-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-common/5.2.x-SNAPSHOT/calendar-common-5.2.x-SNAPSHOT.jar
MD5: 58a7e1a371d866d8b5fbac48640a07c0
SHA1: f17c967760c96b115aee5d6a9aa0d3ab9a63a645
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-common:5.2.x-SNAPSHOT   Confidence:High

commons-comet-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-comet-webapp/5.2.x-SNAPSHOT/commons-comet-webapp-5.2.x-SNAPSHOT.war
MD5: 95509e1805c8474f1978e8d851238679
SHA1: 8efd5d27f55a0defd097f542c5e3d0a89c357c2c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-comet-webapp:5.2.x-SNAPSHOT   Confidence:High

commons-extension-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-extension-webapp/5.2.x-SNAPSHOT/commons-extension-webapp-5.2.x-SNAPSHOT.war
MD5: ee1f4d75c09905de29051956abfc9416
SHA1: d85ffc1306867c4cc75309444a3e16373971dc90
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-extension-webapp:5.2.x-SNAPSHOT   Confidence:High

jtidy-r938.jar

Description:  JTidy is a Java port of HTML Tidy, a HTML syntax checker and pretty printer. Like its non-Java cousin, JTidy can be used as a tool for cleaning up malformed and faulty HTML. In addition, JTidy provides a DOM interface to the document that is being processed, which effectively makes you able to use JTidy as a DOM parser for real-world HTML.

License:

Java HTML Tidy License: http://jtidy.svn.sourceforge.net/viewvc/jtidy/trunk/jtidy/LICENSE.txt?revision=95
File Path: /home/ciagent/.m2/repository/net/sf/jtidy/jtidy/r938/jtidy-r938.jar
MD5: 6a9121561b8f98c0a8fb9b6e57f50e6b
SHA1: ab08d87a225a715a69107732b67f21e1da930349
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: net.sf.jtidy:jtidy:r938    Confidence:Highest
  • cpe: cpe:/a:html-tidy:tidy:-   Confidence:Low   

exo.core.component.xml-processing-5.2.x-SNAPSHOT.jar

Description: Implementation of XML Processing Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.xml-processing/5.2.x-SNAPSHOT/exo.core.component.xml-processing-5.2.x-SNAPSHOT.jar
MD5: 930cf862726c279a9d9c7e13812216a6
SHA1: c33b24f9224ec3f9cd45c3061a1c1afb05045573
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.xml-processing:5.2.x-SNAPSHOT   Confidence:High

exo.jcr.component.ext-5.2.x-SNAPSHOT.jar

Description: Implementation of Extension Service of Exoplatform SAS 'eXo JCR' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.component.ext/5.2.x-SNAPSHOT/exo.jcr.component.ext-5.2.x-SNAPSHOT.jar
MD5: a9a13263e325022c9fd3637e4448f100
SHA1: de0c8d7c3d4e309d3ce165cbbfd80ded695139e7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.component.ext:5.2.x-SNAPSHOT   Confidence:High

ecms-apps-portlet-administration-5.2.x-SNAPSHOT.war

Description: eXo DMS Portlet Java Content: ECM Admin

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-apps-portlet-administration/5.2.x-SNAPSHOT/ecms-apps-portlet-administration-5.2.x-SNAPSHOT.war
MD5: 1b707c8b24669f445fd35e582a563259
SHA1: e15d6b3ca6afb9baff549439289149cab548d18d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-apps-portlet-administration:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-5.2.x-SNAPSHOT.jar

Description: eXo DMS webui extension

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui/5.2.x-SNAPSHOT/ecms-core-webui-5.2.x-SNAPSHOT.jar
MD5: 2d60893a3b79aa52c829e1474c61257f
SHA1: 704ce4eabc09f10597e212cf7578c29acae04a89
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui:5.2.x-SNAPSHOT   Confidence:High

ecms-apps-portlet-presentation-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-apps-portlet-presentation/5.2.x-SNAPSHOT/ecms-apps-portlet-presentation-5.2.x-SNAPSHOT.war
MD5: 793d8c94eaa2a65b5ef5141e4b419195
SHA1: e1ab20e04ab7773d9af02328bacacb6e0fae37ec
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-apps-portlet-presentation:5.2.x-SNAPSHOT   Confidence:High

exo.jcr.component.webdav-5.2.x-SNAPSHOT.jar

Description: Implementation of Webdav Service of Exoplatform SAS 'eXo JCR' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.component.webdav/5.2.x-SNAPSHOT/exo.jcr.component.webdav-5.2.x-SNAPSHOT.jar
MD5: f4617b449d918c3845d2e891aaf6840b
SHA1: bdf4f1bf7c3f0ee98f0a6601544469316f24e06a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.component.webdav:5.2.x-SNAPSHOT   Confidence:High

ecms-core-publication-5.2.x-SNAPSHOT.jar

Description: eXo Publication Service

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-publication/5.2.x-SNAPSHOT/ecms-core-publication-5.2.x-SNAPSHOT.jar
MD5: 1489b9fd861af46c1ba6ade758aa58ae
SHA1: c4708f7e3ca5e061bf3c119d69052a09a7e0e8f2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-publication:5.2.x-SNAPSHOT   Confidence:High

ecms-core-search-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-search/5.2.x-SNAPSHOT/ecms-core-search-5.2.x-SNAPSHOT.jar
MD5: 638e64e9bd38bd859deeb165ff37bca6
SHA1: a5cd29bb5c0e65c348591b4eaefb8dd7d674c0a2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:pro_search:pro_search:5.2   Confidence:Low   
  • maven: org.exoplatform.ecms:ecms-core-search:5.2.x-SNAPSHOT   Confidence:High

itunes-com-podcast-0.2.jar

Description: A ROME Plug In that supports the Apple iTunes extensions to RSS 2.0 for podcasting

File Path: /home/ciagent/.m2/repository/com/totsp/feedpod/itunes-com-podcast/0.2/itunes-com-podcast-0.2.jar
MD5: 1a9da03053fb0e8d05b6268300f41fea
SHA1: cd1afe7a55b92769f6b1594540230c1b591fe480
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2006-1467  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the AAC file parsing code in Apple iTunes before 6.0.5 on Mac OS X 10.2.8 or later, and Windows XP and 2000, allows remote user-assisted attackers to execute arbitrary code via an AAC (M4P, M4A, or M4B) file with a sample table size (STSZ) atom with a "malformed" sample_size_table value.

Vulnerable Software & Versions:

CVE-2007-3752  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in Apple iTunes before 7.4 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted album cover art in the covr atom of an MP4/AAC file.

Vulnerable Software & Versions:

CVE-2008-3434  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')

Apple iTunes before 10.5.1 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.

Vulnerable Software & Versions: (show all)

CVE-2008-3634  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apple iTunes before 8.0 on Mac OS X 10.4.11, when iTunes Music Sharing is enabled but blocked by the host-based firewall, presents misleading information about firewall security, which might allow remote attackers to leverage an exposure that would be absent if the administrator were given better information.

Vulnerable Software & Versions: (show all)

CVE-2008-3636  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in the IopfCompleteRequest API in the kernel in Microsoft Windows 2000, XP, Server 2003, and Vista allows context-dependent attackers to gain privileges. NOTE: this issue was originally reported for GEARAspiWDM.sys 2.0.7.5 in Gear Software CD DVD Filter driver before 4.001.7, as used in other products including Apple iTunes and multiple Symantec and Norton products, which allows local users to gain privileges via repeated IoAttachDevice IOCTL calls to \\.\GEARAspiWDMDevice in this GEARAspiWDM.sys. However, the root cause is the integer overflow in the API call itself.

Vulnerable Software & Versions: (show all)

CVE-2009-0016  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Apple iTunes before 8.1 on Windows allows remote attackers to cause a denial of service (infinite loop) via a Digital Audio Access Protocol (DAAP) message with a crafted Content-Length header.

Vulnerable Software & Versions: (show all)

CVE-2009-0143  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apple iTunes before 8.1 does not properly inform the user about the origin of an authentication request, which makes it easier for remote podcast servers to trick a user into providing a username and password when subscribing to a crafted podcast.

Vulnerable Software & Versions: (show all)

CVE-2009-0950  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in Apple iTunes before 8.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an itms: URL with a long URL component after a colon.

Vulnerable Software & Versions: (show all)

CVE-2009-2817  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in Apple iTunes before 9.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted .pls file.

Vulnerable Software & Versions: (show all)

CVE-2010-0531  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

Apple iTunes before 9.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted MP4 podcast file.

Vulnerable Software & Versions: (show all)

CVE-2010-0532  

Severity: Medium
CVSS Score: 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Race condition in the installation package in Apple iTunes before 9.1 on Windows allows local users to gain privileges by replacing an unspecified file with a Trojan horse.

Vulnerable Software & Versions: (show all)

CVE-2010-1387  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

Use-after-free vulnerability in JavaScriptCore in WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page transitions, a different vulnerability than CVE-2010-1763 and CVE-2010-1769.

Vulnerable Software & Versions: (show all)

CVE-2010-1763  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in WebKit in Apple iTunes before 9.2 on Windows has unknown impact and attack vectors, a different vulnerability than CVE-2010-1387 and CVE-2010-1769.

Vulnerable Software & Versions: (show all)

CVE-2010-1768  

Severity: Medium
CVSS Score: 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in Apple iTunes before 9.1 allows local users to gain console privileges via vectors related to log files, "insecure file operation," and syncing an iPhone, iPad, or iPod touch.

Vulnerable Software & Versions: (show all)

CVE-2010-1769  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, accesses out-of-bounds memory during the handling of tables, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, a different vulnerability than CVE-2010-1387 and CVE-2010-1763.

Vulnerable Software & Versions: (show all)

CVE-2010-1777  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in Apple iTunes before 9.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted itpc: URL.

Vulnerable Software & Versions: (show all)

CVE-2011-0111  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0112  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0113  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0114  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0115  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The DOM level 2 implementation in WebKit, as used in Apple iTunes before 10.2 on Windows and Apple Safari, does not properly handle DOM manipulations associated with event listeners during processing of range objects, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0116  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

Use-after-free vulnerability in the setOuterText method in the htmlelement library in WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to DOM manipulations during iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0117  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0118  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0119  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0120  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0121  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0122  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0123  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0124  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0125  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0126  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0127  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0128  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0129  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0130  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0131  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0132  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

Use-after-free vulnerability in the Runin box functionality in the Cascading Style Sheets (CSS) 2.1 Visual Formatting Model implementation in WebKit, as used in Apple iTunes before 10.2 on Windows and Apple Safari, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0133  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, does not properly access glyph data during layout actions for floating blocks associated with pseudo-elements, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0134  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0135  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0136  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0137  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0138  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0139  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0140  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0141  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0142  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0143  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0144  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0145  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0146  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0147  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0148  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0149  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, does not properly parse HTML elements associated with document namespaces, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to a "dangling pointer" and iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0150  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0151  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0152  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0153  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0154  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows and Apple iOS, does not properly implement the .sort function for JavaScript arrays, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0155  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0156  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0164  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0165  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0168  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Vulnerable Software & Versions: (show all)

CVE-2011-0170  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image.

Vulnerable Software & Versions: (show all)

CVE-2011-0191  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with JPEG encoding.

Vulnerable Software & Versions: (show all)

CVE-2011-0192  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h. NOTE: some of these details are obtained from third party information.

Vulnerable Software & Versions: (show all)

CVE-2011-0259  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreFoundation, as used in Apple iTunes before 10.5, does not properly perform string tokenization, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.

Vulnerable Software & Versions: (show all)

CVE-2011-2338  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2339  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2341  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2352  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2354  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2356  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2391  

Severity: Medium
CVSS Score: 6.1 (AV:A/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

The IPv6 implementation in the kernel in Apple iOS before 7 allows remote attackers to cause a denial of service (CPU consumption) via crafted ICMPv6 packets.

Vulnerable Software & Versions: (show all)

CVE-2011-2809  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2811  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2813  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2814  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2815  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2816  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2817  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2820  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2831  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2833  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2866  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2011-2867  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2868  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2869  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2870  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2871  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2872  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-2873  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2011-3219  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in CoreMedia, as used in Apple iTunes before 10.5, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.264 encoding.

Vulnerable Software & Versions: (show all)

CVE-2011-3233  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3235  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3236  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3237  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3238  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3239  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3241  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3244  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.

Vulnerable Software & Versions: (show all)

CVE-2011-3252  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in CoreAudio, as used in Apple iTunes before 10.5, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Advanced Audio Coding (AAC) stream.

Vulnerable Software & Versions: (show all)

CVE-2012-0591  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0592  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0593  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0594  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0595  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0596  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0597  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0598  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0599  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0600  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0601  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0602  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0603  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0604  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0605  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0606  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0607  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0608  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0609  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0610  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0611  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0612  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0613  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0614  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0615  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0616  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0617  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0618  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0619  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0620  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0621  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0622  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0623  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0624  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0625  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0626  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0627  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0628  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0629  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0630  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0631  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0632  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0633  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0634  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0635  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.

Vulnerable Software & Versions: (show all)

CVE-2012-0636  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0637  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0638  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0639  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0648  

Severity: High
CVSS Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.

Vulnerable Software & Versions: (show all)

CVE-2012-0677  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in Apple iTunes before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted .m3u playlist.

Vulnerable Software & Versions: (show all)

CVE-2012-3598  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3601  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3602  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3606  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3607  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3612  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3613  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3614  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3616  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3617  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3621  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3622  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3623  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3624  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3632  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3643  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3647  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3648  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3649  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3651  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3652  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3654  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3657  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3658  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3659  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3660  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3671  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3672  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3673  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3675  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3676  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3677  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3684  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3685  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3687  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3688  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3692  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3699  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3700  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3701  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3702  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3703  

Severity: High
CVSS Score: 8.3 (AV:N/AC:M/Au:N/C:P/I:P/A:C)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3704  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3705  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3706  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3707  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3708  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3709  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3710  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3711  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2012-3712  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0991  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0992  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0993  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0994  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0995  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0996  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0997  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0998  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-0999  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1000  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1001  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1002  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1003  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1004  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1005  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1006  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1007  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1008  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1010  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1011  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-1014  

Severity: Medium
CVSS Score: 4.3 (AV:A/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apple iTunes before 11.0.3 does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.

Vulnerable Software & Versions: (show all)

CVE-2013-1035  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The iTunes ActiveX control in Apple iTunes before 11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2013-1037  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1038  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1039  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1040  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1041  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-1047  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.

Vulnerable Software & Versions: (show all)

CVE-2013-5195  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5196  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5197  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5198  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5199  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5225  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2013-5228  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.

Vulnerable Software & Versions: (show all)

CVE-2014-1242  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)
CWE: CWE-310 Cryptographic Issues

Apple iTunes before 11.1.4 uses HTTP for the iTunes Tutorials window, which allows man-in-the-middle attackers to spoof content by gaining control over the client-server data stream.

Vulnerable Software & Versions: (show all)

CVE-2014-1301  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1.

Vulnerable Software & Versions: (show all)

CVE-2014-1347  

Severity: Medium
CVSS Score: 4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Apple iTunes before 11.2.1 on OS X sets world-writable permissions for /Users and /Users/Shared during reboots, which allows local users to modify files, and consequently obtain access to arbitrary user accounts, via standard filesystem operations.

Vulnerable Software & Versions: (show all)

CVE-2014-3192  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-416 Use After Free

Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in core/dom/ProcessingInstruction.cpp in the DOM implementation in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2014-4452  

Severity: Medium
CVSS Score: 5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4462.

Vulnerable Software & Versions: (show all)

CVE-2014-4459  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Use-after-free vulnerability in WebKit, as used in Apple OS X before 10.10.1, allows remote attackers to execute arbitrary code via crafted page objects in an HTML document.

Vulnerable Software & Versions: (show all)

CVE-2014-4466  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4468  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4469  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4470  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4471  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4472  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4473  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4474  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4475  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.

Vulnerable Software & Versions: (show all)

CVE-2014-4476  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4477 and CVE-2014-4479.

Vulnerable Software & Versions: (show all)

CVE-2014-4477  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4476 and CVE-2014-4479.

Vulnerable Software & Versions: (show all)

CVE-2014-4479  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4476 and CVE-2014-4477.

Vulnerable Software & Versions: (show all)

CVE-2014-8146  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text.

Vulnerable Software & Versions: (show all)

CVE-2015-1068  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1069  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1070  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1071  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1072  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1073  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1074  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1075  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1076  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1077  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1078  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1079  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1080  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1081  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1082  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1083  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-399 Resource Management Errors

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.

Vulnerable Software & Versions: (show all)

CVE-2015-1119  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1120  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1121  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1122  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1124  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.

Vulnerable Software & Versions: (show all)

CVE-2015-1152  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1153 and CVE-2015-1154.

Vulnerable Software & Versions: (show all)

CVE-2015-1153  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154.

Vulnerable Software & Versions: (show all)

CVE-2015-1154  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1153.

Vulnerable Software & Versions: (show all)

CVE-2015-1157  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-17 Code

CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2) a WhatsApp message.

Vulnerable Software & Versions: (show all)

CVE-2015-3686  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3687, CVE-2015-3688, and CVE-2015-3689.

Vulnerable Software & Versions: (show all)

CVE-2015-3687  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3688, and CVE-2015-3689.

Vulnerable Software & Versions: (show all)

CVE-2015-3688  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3687, and CVE-2015-3689.

Vulnerable Software & Versions: (show all)

CVE-2015-3730  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3731  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3733  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3734  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3736  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3737  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3738  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3739  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3740  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3741  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3742  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3743  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3744  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3745  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3746  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3747  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3748  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-3749  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5755  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5761.

Vulnerable Software & Versions: (show all)

CVE-2015-5761  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5755.

Vulnerable Software & Versions: (show all)

CVE-2015-5789  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5790  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5791  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5792  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5793  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5794  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5796  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5797  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5798  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 12.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5799  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5800  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5801  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5802  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5803  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5804  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5805  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5806  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5807  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5808  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 12.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5809  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5810  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5811  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5812  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5813  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5814  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5815  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iTunes before 12.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5816  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5817  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5818  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5819  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5821  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5822  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5823  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.

Vulnerable Software & Versions: (show all)

CVE-2015-5874  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 9 and iTunes before 12.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file.

Vulnerable Software & Versions: (show all)

CVE-2015-5920  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

The Software Update component in Apple iTunes before 12.3 does not properly handle redirection, which allows man-in-the-middle attackers to discover encrypted SMB credentials via unspecified vectors.

Vulnerable Software & Versions:

CVE-2015-5928  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-5929  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-5930  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-5931  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-3 and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-6975  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6992 and CVE-2015-7017.

Vulnerable Software & Versions: (show all)

CVE-2015-6992  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6975 and CVE-2015-7017.

Vulnerable Software & Versions: (show all)

CVE-2015-7002  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7011  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-3 and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7012  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7013  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-3 and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7014  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.

Vulnerable Software & Versions: (show all)

CVE-2015-7017  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6975 and CVE-2015-6992.

Vulnerable Software & Versions: (show all)

CVE-2016-1742  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Untrusted search path vulnerability in the installer in Apple iTunes before 12.4 allows local users to gain privileges via a Trojan horse DLL in the current working directory.

Vulnerable Software & Versions:

CVE-2016-4448  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2016-4613  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. Safari before 10.0.1 is affected. iCloud before 6.0.1 is affected. iTunes before 12.5.2 is affected. tvOS before 10.0.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4692  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4728  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 mishandles error prototypes, which allows remote attackers to execute arbitrary code via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4743  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4758  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 does not properly restrict access to the location variable, which allows remote attackers to obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4759  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4765, CVE-2016-4766, CVE-2016-4767, and CVE-2016-4768.

Vulnerable Software & Versions: (show all)

CVE-2016-4760  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-284 Improper Access Control

WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to conduct DNS rebinding attacks against non-HTTP Safari sessions by leveraging HTTP/0.9 support.

Vulnerable Software & Versions: (show all)

CVE-2016-4763  

Severity: Medium
CVSS Score: 4.9 (AV:N/AC:M/Au:S/C:P/I:P/A:N)
CWE: CWE-310 Cryptographic Issues

WKWebView in WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 does not properly verify X.509 certificates from HTTPS servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Vulnerable Software & Versions: (show all)

CVE-2016-4764  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10 is affected. Safari before 10 is affected. iTunes before 12.5.1 is affected. tvOS before 10 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-4765  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4766, CVE-2016-4767, and CVE-2016-4768.

Vulnerable Software & Versions: (show all)

CVE-2016-4766  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4767, and CVE-2016-4768.

Vulnerable Software & Versions: (show all)

CVE-2016-4767  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4766, and CVE-2016-4768.

Vulnerable Software & Versions: (show all)

CVE-2016-4768  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4766, and CVE-2016-4767.

Vulnerable Software & Versions: (show all)

CVE-2016-4769  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

WebKit in Apple iTunes before 12.5.1 on Windows and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7578  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.1 is affected. Safari before 10.0.1 is affected. iCloud before 6.0.1 is affected. iTunes before 12.5.2 is affected. tvOS before 10.0.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7586  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7589  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. watchOS before 3.1.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7592  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component, which allows remote attackers to obtain sensitive information via crafted JavaScript prompts on a web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7598  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7599  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses HTTP redirects.

Vulnerable Software & Versions: (show all)

CVE-2016-7610  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7611  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7632  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7635  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7639  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7640  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7641  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7642  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7645  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7646  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7648  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7649  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7652  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7654  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2016-7656  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13783  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13784  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13785  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13788  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13791  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13792  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13793  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13794  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13795  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13796  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13797  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13798  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13802  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13803  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13856  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13864  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. The issue involves the "APNs Server" component. It allows man-in-the-middle attackers to track users by leveraging mishandling of client certificates.

Vulnerable Software & Versions: (show all)

CVE-2017-13866  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13870  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13884  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-13885  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2354  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2355  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2356  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2366  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2383  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)

An issue was discovered in certain Apple products. iCloud before 6.2 on Windows is affected. iTunes before 12.6 on Windows is affected. The issue involves cleartext client-certificate transmission in the "APNs Server" component. It allows man-in-the-middle attackers to track users via correlation with this certificate.

Vulnerable Software & Versions: (show all)

CVE-2017-2463  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-416 Use After Free

An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. iCloud before 6.2 on Windows is affected. iTunes before 12.6 on Windows is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2479  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. iCloud before 6.2 on Windows is affected. iTunes before 12.6 on Windows is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-2480  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. iCloud before 6.2 on Windows is affected. iTunes before 12.6 on Windows is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-6984  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. iTunes before 12.6.1 on Windows is affected. tvOS before 10.2.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7010  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-125 Out-of-bounds Read

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "libxml2" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted XML file.

Vulnerable Software & Versions: (show all)

CVE-2017-7012  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the "WebKit Web Inspector" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7013  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-125 Out-of-bounds Read

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "libxml2" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted XML file.

Vulnerable Software & Versions: (show all)

CVE-2017-7018  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7019  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit Page Loading" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7020  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7022  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7023  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7024  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7025  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7030  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7034  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7037  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7039  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7040  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7041  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7042  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7043  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7046  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7048  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7049  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7052  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7053  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-284 Improper Access Control

An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the "iTunes" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.

Vulnerable Software & Versions:

CVE-2017-7055  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7056  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7061  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7064  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the "WebKit" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2017-7079  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

An issue was discovered in certain Apple products. iTunes before 12.7 is affected. The issue involves the "Data Sync" component. It allows attackers to access iOS backups (written by iTunes) via a crafted app.

Vulnerable Software & Versions:

CVE-2017-7081  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7087  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7089  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing.

Vulnerable Software & Versions: (show all)

CVE-2017-7090  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive cookie information via a custom URL scheme.

Vulnerable Software & Versions: (show all)

CVE-2017-7091  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7092  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7093  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7094  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7095  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7096  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7098  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7099  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7100  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7102  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7104  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7107  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7109  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via crafted web content that incorrectly interacts with the Application Cache policy.

Vulnerable Software & Versions: (show all)

CVE-2017-7111  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7117  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7120  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7153  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-601 URL Redirection to Untrusted Site ('Open Redirect')

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to spoof user-interface information (about whether the entire content is derived from a valid TLS session) via a crafted web site that sends a 401 Unauthorized redirect.

Vulnerable Software & Versions: (show all)

CVE-2017-7156  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7157  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7160  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7165  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2017-7172  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "CFNetwork Session" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2018-4088  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4096  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4101  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4113  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves a JavaScriptCore function in the "WebKit" component. It allows attackers to trigger an assertion failure by leveraging improper array indexing.

Vulnerable Software & Versions: (show all)

CVE-2018-4114  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4117  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4118  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4119  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4120  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4121  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4122  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4125  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4127  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4128  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4129  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4130  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4144  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Security" component. A buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app.

Vulnerable Software & Versions: (show all)

CVE-2018-4146  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows attackers to cause a denial of service (memory corruption) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4147  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

In iCloud for Windows before 7.3, Safari before 11.0.3, iTunes before 12.7.3 for Windows, and iOS before 11.2.5, multiple memory corruption issues exist and were addressed with improved memory handling.

Vulnerable Software & Versions: (show all)

CVE-2018-4161  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4162  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4163  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4165  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4188  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to spoof the address bar via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4190  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-255 Credentials Management

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch.

Vulnerable Software & Versions: (show all)

CVE-2018-4192  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a race condition.

Vulnerable Software & Versions: (show all)

CVE-2018-4199  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4200  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-416 Use After Free

An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers a WebCore::jsElementScrollHeightGetter use-after-free.

Vulnerable Software & Versions: (show all)

CVE-2018-4201  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4204  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4210  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-129 Improper Validation of Array Index

In iOS before 11.3, Safari before 11.1, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, an array indexing issue existed in the handling of a function in javascript core. This issue was addressed with improved checks.

Vulnerable Software & Versions: (show all)

CVE-2018-4212  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.

Vulnerable Software & Versions: (show all)

CVE-2018-4213  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.

Vulnerable Software & Versions: (show all)

CVE-2018-4214  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to cause a denial of service (memory corruption and Safari crash) or possibly have unspecified other impact via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4218  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free.

Vulnerable Software & Versions: (show all)

CVE-2018-4222  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-125 Out-of-bounds Read

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation.

Vulnerable Software & Versions: (show all)

CVE-2018-4224  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on the reading of a persistent device identifier.

Vulnerable Software & Versions: (show all)

CVE-2018-4225  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-20 Improper Input Validation

An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on Keychain state modifications.

Vulnerable Software & Versions: (show all)

CVE-2018-4226  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on the reading of sensitive user information.

Vulnerable Software & Versions: (show all)

CVE-2018-4232  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-19 Data Handling

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to overwrite cookies via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4233  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Software & Versions: (show all)

CVE-2018-4246  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-704 Incorrect Type Conversion or Cast

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages type confusion.

Vulnerable Software & Versions: (show all)

CVE-2018-4262  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 11.4.1, iCloud for Windows before 7.6, multiple memory corruption issues were addressed with improved memory handling.

Vulnerable Software & Versions: (show all)

CVE-2018-4278  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-254 Security Features

In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 11.4.1, iCloud for Windows before 7.6, sound fetched through audio elements may be exfiltrated cross-origin. This issue was addressed with improved audio taint tracking.

Vulnerable Software & Versions: (show all)

jurt-3.2.1.jar

Description: The core of Java UNO.

License:

GNU Lesser General Public License, Version 3: http://www.openoffice.org/license.html
File Path: /home/ciagent/.m2/repository/org/openoffice/jurt/3.2.1/jurt-3.2.1.jar
MD5: 795ea0041d61b4e66e01d687cdf61f43
SHA1: bcc6e74d8ff0760799ae8bca67b5657091606d0e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2007-0238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.

Vulnerable Software & Versions:

CVE-2007-0239  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.

Vulnerable Software & Versions:

CVE-2008-2237  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.

Vulnerable Software & Versions: (show all)

CVE-2008-2238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.

Vulnerable Software & Versions: (show all)

CVE-2009-3570  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in OpenOffice.org (OOo) has unspecified impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9. NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2009-3571  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2010-2935  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."

Vulnerable Software & Versions:

CVE-2010-2936  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

juh-3.2.1.jar

Description: Allows the boostrapping of a ServicemManager and gives access to the native component loader.

License:

GNU Lesser General Public License, Version 3: http://www.openoffice.org/license.html
File Path: /home/ciagent/.m2/repository/org/openoffice/juh/3.2.1/juh-3.2.1.jar
MD5: 2afc96768d4efeb75136648917bdab98
SHA1: 8596138f58b984196ad4b69d03de534eda4f23af
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2007-0238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.

Vulnerable Software & Versions:

CVE-2007-0239  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.

Vulnerable Software & Versions:

CVE-2008-2237  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.

Vulnerable Software & Versions: (show all)

CVE-2008-2238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.

Vulnerable Software & Versions: (show all)

CVE-2009-3570  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in OpenOffice.org (OOo) has unspecified impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9. NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2009-3571  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2010-2935  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."

Vulnerable Software & Versions:

CVE-2010-2936  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

ridl-3.2.1.jar

Description: The type library and the precompiled Java interfaces of the UDK API.

License:

GNU Lesser General Public License, Version 3: http://www.openoffice.org/license.html
File Path: /home/ciagent/.m2/repository/org/openoffice/ridl/3.2.1/ridl-3.2.1.jar
MD5: eb77b8bbfc54ca8fa869a163acace267
SHA1: c2383e8c2ae1e91e9bf9d115585d15f6806249ea
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2007-0238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.

Vulnerable Software & Versions:

CVE-2007-0239  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.

Vulnerable Software & Versions:

CVE-2008-2237  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.

Vulnerable Software & Versions: (show all)

CVE-2008-2238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.

Vulnerable Software & Versions: (show all)

CVE-2009-3570  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in OpenOffice.org (OOo) has unspecified impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9. NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2009-3571  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2010-2935  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."

Vulnerable Software & Versions:

CVE-2010-2936  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

unoil-3.2.1.jar

Description: The precompiled Java interfaces of the OOo API.

License:

GNU Lesser General Public License, Version 3: http://www.openoffice.org/license.html
File Path: /home/ciagent/.m2/repository/org/openoffice/unoil/3.2.1/unoil-3.2.1.jar
MD5: 907a828f8182ed1b8e140167c1b4078a
SHA1: 3fe6ae6fb39d7404229bf75ae5f56bf1827fa3c9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2007-0238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.

Vulnerable Software & Versions:

CVE-2007-0239  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.

Vulnerable Software & Versions:

CVE-2008-2237  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.

Vulnerable Software & Versions: (show all)

CVE-2008-2238  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.

Vulnerable Software & Versions: (show all)

CVE-2009-3570  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Unspecified vulnerability in OpenOffice.org (OOo) has unspecified impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9. NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2009-3571  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Vulnerable Software & Versions:

CVE-2010-2935  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."

Vulnerable Software & Versions:

CVE-2010-2936  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

jodconverter-core-3.0-eXo03.jar

Description:  JODConverter converts office documents using OpenOffice.org

License:

GNU Lesser General Public License, Version 3 or later: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/org/artofsolving/jodconverter/jodconverter-core/3.0-eXo03/jodconverter-core-3.0-eXo03.jar
MD5: 2d98dedc495be2e71d41b709a5fb71f0
SHA1: bed32f1e7f039a2f637156ec99ba401f0eae0fba
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.artofsolving.jodconverter:jodconverter-core:3.0-eXo03   Confidence:High

groovy-all-2.4.12.jar

Description: Groovy: A powerful, dynamic language for the JVM

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/codehaus/groovy/groovy-all/2.4.12/groovy-all-2.4.12.jar
MD5: dddb0b3d3619875fa1c538c743ae8f99
SHA1: 760afc568cbd94c09d78f801ce51aed1326710af
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jai-core-1.1.3.jar

Description:  The Java Advanced Imaging API extends the Java 2 platform by allowing sophisticated, high-performance image processing to be incorporated into Java applets and applications. It is a set of classes providing imaging functionality beyond that of Java 2D and the Java Foundation classes, though it is designed for compatibility with those APIs. This API implements a set of core image processing capabilities including image tiling, regions of interest, deferred execution and a set of core image processing operators, including many common point, area, and frequency domain operators.

License:

 Sun Microsystems, Inc. Binary Code License Agreement : 
        http://java.sun.com/products/java-media/jai/downloads/download-1_1_2_01.html
      
File Path: /home/ciagent/.m2/repository/javax/media/jai-core/1.1.3/jai-core-1.1.3.jar
MD5: f398bc038307ee434bac1b93ba3ab02d
SHA1: b179d2efb1174658483e8b41bf4ac9d2eb5de438
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: javax.media:jai-core:1.1.3   Confidence:High

jai-codec-1.1.3.jar

Description:  Java Advanced Imaging Codecs supporting support BMP, GIF (read only), FlashPix (read only), JPEG, PNG, PNM, TIFF, and WBMP.

License:

 Sun Microsystems, Inc. Binary Code License Agreement : 
        http://java.sun.com/products/java-media/jai/downloads/download-1_1_2_01.html
      
File Path: /home/ciagent/.m2/repository/com/sun/media/jai-codec/1.1.3/jai-codec-1.1.3.jar
MD5: 1b0f328c9eda0992167ce503b0a5afcc
SHA1: 34a67ba62097778e4695c951156bf189c2c8e016
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: com.sun.media:jai-codec:1.1.3   Confidence:High

icepdf-core-5.1.1.jar

Description: ICEpdf core rendering library.

File Path: /home/ciagent/.m2/repository/org/icepdf/os/icepdf-core/5.1.1/icepdf-core-5.1.1.jar
MD5: 049fc6292cd8378b3974bff95d580b5f
SHA1: a677b063a38bfa801e7969ee0d3f2dcedb527760
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.icepdf.os:icepdf-core:5.1.1   Confidence:High

imgscalr-lib-4.2.jar

Description: imgscalr is an simple and efficient best-practices image-scaling and manipulation library implemented in pure Java.

License:

ASF 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/imgscalr/imgscalr-lib/4.2/imgscalr-lib-4.2.jar
MD5: 1c4860cbc02f8c1766396d68636ab9ab
SHA1: e2838f7119361511ef7d54fe0d502bf07f3325eb
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jdom-1.1.3.jar

Description:  A complete, Java-based solution for accessing, manipulating, and outputting XML data

License:

Similar to Apache License but with the acknowledgment clause removed: https://raw.github.com/hunterhacker/jdom/master/LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/jdom/jdom/1.1.3/jdom-1.1.3.jar
MD5: 140bfed13341fe2039eee0f26a16d705
SHA1: 8bdfeb39fa929c35f5e4f0b02d34350db39a1efc
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

ecms-core-services-5.2.x-SNAPSHOT.jar

Description: eXo CMS Service

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-services/5.2.x-SNAPSHOT/ecms-core-services-5.2.x-SNAPSHOT.jar
MD5: 192ec07ff03aced7dc6320768b0649be
SHA1: 352f42e576517a5a91a11fc3dba100181f70d4ef
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:no-cms_project:no-cms:5.2.20190113   Confidence:Low   
  • maven: org.exoplatform.ecms:ecms-core-services:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-presentation-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui-presentation/5.2.x-SNAPSHOT/ecms-core-webui-presentation-5.2.x-SNAPSHOT.jar
MD5: 899ec47f2c4d73ded574ee8434e2342a
SHA1: 65e63484ca80648cf78bf761f05d7cfa4ca70560
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui-presentation:5.2.x-SNAPSHOT   Confidence:High

ecms-ext-authoring-services-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-ext-authoring-services/5.2.x-SNAPSHOT/ecms-ext-authoring-services-5.2.x-SNAPSHOT.jar
MD5: 86dab7741878806524d957d760fb1ce4
SHA1: 1444fbf9383ae2f078ebd9b1e2c16d20f35488ce
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-ext-authoring-services:5.2.x-SNAPSHOT   Confidence:High

json-20070829.jar

Description:  JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.

File Path: /home/ciagent/.m2/repository/org/json/json/20070829/json-20070829.jar
MD5: 4a913140f9099519dfc0212fa5d9a457
SHA1: 89190ff77b57203c3417555f32226998da97ff38
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

ecms-apps-portlet-seo-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-apps-portlet-seo/5.2.x-SNAPSHOT/ecms-apps-portlet-seo-5.2.x-SNAPSHOT.war
MD5: 3037bf3ff7a3bd148d9dc6efcf920aac
SHA1: ff81a0b72f976193b54788bb1f943538dadcf20c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-apps-portlet-seo:5.2.x-SNAPSHOT   Confidence:High

ecms-apps-resources-wcm-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-apps-resources-wcm/5.2.x-SNAPSHOT/ecms-apps-resources-wcm-5.2.x-SNAPSHOT.war
MD5: ebec45cdd795f988ce230a1862f7e2fa
SHA1: 8c83a807539bf106deedba54aeb3add6038aa95c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-apps-resources-wcm:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webapp-5.2.x-SNAPSHOT.war

Description: eXo WCM Core Services Configuration WAR

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webapp/5.2.x-SNAPSHOT/ecms-core-webapp-5.2.x-SNAPSHOT.war
MD5: e073d68dff0a030dd2ab30abb03b22f2
SHA1: fd83678982d8ad61824d43ede7831135a3debb28
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webapp:5.2.x-SNAPSHOT   Confidence:High

commons-component-upgrade-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-component-upgrade/5.2.x-SNAPSHOT/commons-component-upgrade-5.2.x-SNAPSHOT.jar
MD5: 953ec1951d9e9c38944d0c9db39762f2
SHA1: f57f0ffd12acc973a7cb7a13aba3faebd4e737cd
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-component-upgrade:5.2.x-SNAPSHOT   Confidence:High

json-simple-1.1.1.jar

Description: A simple Java toolkit for JSON

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar
MD5: 5cc2c478d73e8454b4c369cee66c5bc7
SHA1: c9ad4a0850ab676c5c64461a05ca524cdfff59f1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-io-2.4.jar

Description:  The Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar
MD5: 7f97854dc04c119d461fed14f5d8bb96
SHA1: b1b6ea3b7e4aa4f492509a4952029cd8e48019ad
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

ecms-core-connector-5.2.x-SNAPSHOT.jar

Description: eXo ECMS REST Services

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-connector/5.2.x-SNAPSHOT/ecms-core-connector-5.2.x-SNAPSHOT.jar
MD5: 0d18bc26ac79b91afb6eea3e5ebd5372
SHA1: edbbb58eb447c5877ce46b51255a055947beeeca
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-connector:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-explorer-5.2.x-SNAPSHOT.jar

Description: eXo Explorer Portlet Java Content: File Explorer

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui-explorer/5.2.x-SNAPSHOT/ecms-core-webui-explorer-5.2.x-SNAPSHOT.jar
MD5: f824cbbce7724c87c689e338ebc74dbc
SHA1: 89a37ae956a6ceb2da7cef2501544901e1dde4ec
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui-explorer:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:content_project:content:5.2.20190113   Confidence:Low   

exo.kernel.component.cache-5.2.x-SNAPSHOT.jar

Description: Implementation of Cache Service of Exoplatform SAS 'eXo Kernel' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/kernel/exo.kernel.component.cache/5.2.x-SNAPSHOT/exo.kernel.component.cache-5.2.x-SNAPSHOT.jar
MD5: 3bb0ccb832ec5af6e2dd882b87395a3b
SHA1: db9bfdcf12fc9bb7edfe36f619897f2fd263dfe2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.kernel:exo.kernel.component.cache:5.2.x-SNAPSHOT   Confidence:High

ecms-ext-authoring-apps-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-ext-authoring-apps/5.2.x-SNAPSHOT/ecms-ext-authoring-apps-5.2.x-SNAPSHOT.war
MD5: fe18cbc3e96e96d1bf37cbfd45391ec3
SHA1: fe056a4cd6bbb20d84f1abc34b53ba31de4eb9d4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-ext-authoring-apps:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-fcc-5.2.x-SNAPSHOT.jar

Description: >eXo Fast Content Creator webui component

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui-fcc/5.2.x-SNAPSHOT/ecms-core-webui-fcc-5.2.x-SNAPSHOT.jar
MD5: 635bdb8111cf739b4da0baf2a885a07a
SHA1: d6160be4692218d770ed1fc0d13b984c224258d8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui-fcc:5.2.x-SNAPSHOT   Confidence:High

ecms-packaging-wcm-webapp-5.2.x-SNAPSHOT.war

Description: eXo WCM Extension WAR's configuration

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-packaging-wcm-webapp/5.2.x-SNAPSHOT/ecms-packaging-wcm-webapp-5.2.x-SNAPSHOT.war
MD5: 00d259978b7d91dca2317e1579a28d65
SHA1: a9a871cf1b652d4cb399933a8cb8a7258533a4cc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-packaging-wcm-webapp:5.2.x-SNAPSHOT   Confidence:High

exo-jcr-services-5.2.x-SNAPSHOT.jar

Description: Exoplatform SAS 'eXo JCR Ext Services' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/exo-jcr-services/5.2.x-SNAPSHOT/exo-jcr-services-5.2.x-SNAPSHOT.jar
MD5: c564aac01052150940b1ea1d64d72399
SHA1: bae5f41d49493aa00456747fcde8d21b2a3fc3c7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform:exo-jcr-services:5.2.x-SNAPSHOT   Confidence:High

fontbox-1.8.14.jar

Description:  The Apache FontBox library is an open source Java tool to obtain low level information from font files. FontBox is a subproject of Apache PDFBox.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/pdfbox/fontbox/1.8.14/fontbox-1.8.14.jar
MD5: 901640f7e2bd12508ae4a7cccba3df79
SHA1: 9c7caec614a6a132bedc83f1d6d247bb96ca0df3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jempbox-1.8.14.jar

Description:  The Apache JempBox library is an open source Java tool that implements Adobe's XMP(TM) specification. JempBox is a subproject of Apache PDFBox.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/pdfbox/jempbox/1.8.14/jempbox-1.8.14.jar
MD5: 393135759731daf4e301903b3de2fbbb
SHA1: 7f94c7cd4efc21e78729436cc4cf0c09eeea0f38
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

pdfbox-1.8.14.jar

Description:  The Apache PDFBox library is an open source Java tool for working with PDF documents.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/pdfbox/pdfbox/1.8.14/pdfbox-1.8.14.jar
MD5: c90740e185fc2f8013d1119f509ea4f3
SHA1: 7550298240c8540b721733ede6dc88fcf4fa2b0f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

htmllexer-2.1.jar

Description: HTML Lexer is the low level lexical analyzer.

File Path: /home/ciagent/.m2/repository/org/htmlparser/htmllexer/2.1/htmllexer-2.1.jar
MD5: 1cb7184766a0c52f4d98d671bb08be19
SHA1: 2ebf2c073e649b7e674cddd0558ff102a486402f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

htmlparser-2.1.jar

Description: HTML Parser is the high level syntactical analyzer.

File Path: /home/ciagent/.m2/repository/org/htmlparser/htmlparser/2.1/htmlparser-2.1.jar
MD5: aa05b921026c228f92ef8b4a13c26f8d
SHA1: c752e5984b7767533cbd3fdffa48cecb52fa226c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

poi-3.13.jar

Description: Apache POI - Java API To Access Microsoft Format Files

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/poi/poi/3.13/poi-3.13.jar
MD5: 1b43f32e2211546040597a9e2d07b869
SHA1: 0f59f504ba8c521e61e25f417ec652fd485010f3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-5000  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions:

CVE-2017-5644  

Severity: High
CVSS Score: 7.1 (AV:N/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

Vulnerable Software & Versions:

tika-core-1.5.jar

Description: This is the core Apache Tika™ toolkit library from which all other modules inherit functionality. It also includes the core facades for the Tika API.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tika/tika-core/1.5/tika-core-1.5.jar
MD5: e864bf637f51283dc525087b015d7b1a
SHA1: 194ca0fb3d73b07737524806fbc3bec89063c03a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-6809  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.

Vulnerable Software & Versions:

CVE-2018-11761  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.

Vulnerable Software & Versions: (show all)

CVE-2018-11762  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.

Vulnerable Software & Versions: (show all)

CVE-2018-11796  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.

Vulnerable Software & Versions: (show all)

CVE-2018-1335  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-1338  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-1339  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-8017  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser.

Vulnerable Software & Versions: (show all)

vorbis-java-core-0.1-tests.jar

File Path: /home/ciagent/.m2/repository/org/gagravarr/vorbis-java-core/0.1/vorbis-java-core-0.1-tests.jar
MD5: d58f076c08a917277d03f3417aa867a6
SHA1: c849979e199d8a7c3da1a00799c623c00f94efac
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:test,provided
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

vorbis-java-tika-0.1.jar

File Path: /home/ciagent/.m2/repository/org/gagravarr/vorbis-java-tika/0.1/vorbis-java-tika-0.1.jar
MD5: 1fccc6796a0924ba4f32eb1d44b8616b
SHA1: 6966c8663a7f689021accb13cceaa6101f53ea3d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-6809  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.

Vulnerable Software & Versions:

CVE-2018-11761  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.

Vulnerable Software & Versions: (show all)

CVE-2018-11796  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.

Vulnerable Software & Versions: (show all)

CVE-2018-1335  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-1338  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.

Vulnerable Software & Versions: (show all)

CVE-2018-1339  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.

Vulnerable Software & Versions: (show all)

netcdf-4.2-min.jar

Description: The NetCDF-Java Library is a Java interface to NetCDF files, as well as to many other types of scientific data formats.

License:

(MIT-style) netCDF C library license.: http://www.unidata.ucar.edu/software/netcdf/copyright.html
File Path: /home/ciagent/.m2/repository/edu/ucar/netcdf/4.2-min/netcdf-4.2-min.jar
MD5: eb00b40b0511f0fc1dfcfc9cb89e3c53
SHA1: 0f3c3f3db4c54483aa1fbc4497e300879ce24da1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

apache-mime4j-core-0.7.2.jar

Description: Java stream based MIME message parser

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/james/apache-mime4j-core/0.7.2/apache-mime4j-core-0.7.2.jar
MD5: 88f799546eca803c53eee01a4ce5edcd
SHA1: a81264fe0265ebe8fd1d8128aad06dc320de6eef
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

xz-1.2.jar

Description: XZ data compression

License:

Public Domain
File Path: /home/ciagent/.m2/repository/org/tukaani/xz/1.2/xz-1.2.jar
MD5: 04bd31459826c30c2a3c304e3b225ad4
SHA1: bfc66dda280a18ab341b5023248925265c00394c
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.tukaani:xz:1.2    Confidence:Highest
  • cpe: cpe:/a:tukaani:xz:1.2   Confidence:Low   

CVE-2015-4035  

Severity: Medium
CVSS Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.

Vulnerable Software & Versions:

commons-compress-1.5.jar

Description:  Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, xz and ar, cpio, jar, tar, zip, dump.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/commons/commons-compress/1.5/commons-compress-1.5.jar
MD5: 5e18cfcf472548c2e0b90a4ea1cedf42
SHA1: d2bd2c0bd328f1dabdf33e10b6d223ebcbe93343
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

tagsoup-1.2.1.jar

Description: TagSoup is a SAX-compliant parser written in Java that, instead of parsing well-formed or valid XML, parses HTML as it is found in the wild: poor, nasty and brutish, though quite often far from short. TagSoup is designed for people who have to process this stuff using some semblance of a rational application design. By providing a SAX interface, it allows standard XML tools to be applied to even the worst HTML. TagSoup also includes a command-line processor that reads HTML files and can generate either clean HTML or well-formed XML that is a close approximation to XHTML.

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/ccil/cowan/tagsoup/tagsoup/1.2.1/tagsoup-1.2.1.jar
MD5: ae73a52cdcbec10cd61d9ef22fab5936
SHA1: 5584627487e984c03456266d3f8802eb85a9ce97
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

asm-debug-all-4.1.jar

File Path: /home/ciagent/.m2/repository/org/ow2/asm/asm-debug-all/4.1/asm-debug-all-4.1.jar
MD5: 6c3a8842f484dd3d620002b361e3610e
SHA1: dd6ba5c392d4102458494e29f54f70ac534ec2a2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

isoparser-1.0-RC-1.jar

Description: A generic parser and writer for all ISO 14496 based files (MP4, Quicktime, DCF, PDCF, ...)

License:

Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/googlecode/mp4parser/isoparser/1.0-RC-1/isoparser-1.0-RC-1.jar
MD5: b0444fde2290319c9028564c3c3ff1ab
SHA1: 4a5768b1070b9488a433362d736720fd7a7b264f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2013-0259  

Severity: Low
CVSS Score: 2.1 (AV:N/AC:H/Au:S/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the Boxes module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with administer or edit boxes permissions to inject arbitrary web script or HTML via the subject parameter.

Vulnerable Software & Versions: (show all)

xmpcore-5.1.2.jar

Description:  The XMP Library for Java is based on the C++ XMPCore library and the API is similar.

License:

The BSD License: http://www.adobe.com/devnet/xmp/library/eula-xmp-library-java.html
File Path: /home/ciagent/.m2/repository/com/adobe/xmp/xmpcore/5.1.2/xmpcore-5.1.2.jar
MD5: 0b2cf2a09d32abdedd17de864e93ad25
SHA1: 55615fa2582424e38705487d1d3969af8554f637
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

metadata-extractor-2.6.2.jar

Description: Java library for reading metadata from image files.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/drewnoakes/metadata-extractor/2.6.2/metadata-extractor-2.6.2.jar
MD5: 8f3acbee87dbd5b0cdfacee3bb3aff8b
SHA1: 13930ff22d3f152bd969a63e88537d2f2adc2cd5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

vorbis-java-core-0.1.jar

File Path: /home/ciagent/.m2/repository/org/gagravarr/vorbis-java-core/0.1/vorbis-java-core-0.1.jar
MD5: b88115be2754cb6883e652ba68ca46c8
SHA1: 662a02b94701947e6e66e7793d996043f05fad4a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

juniversalchardet-1.0.3.jar

Description: Java port of universalchardet

License:

Mozilla Public License 1.1 (MPL 1.1): http://www.mozilla.org/MPL/MPL-1.1.html
File Path: /home/ciagent/.m2/repository/com/googlecode/juniversalchardet/juniversalchardet/1.0.3/juniversalchardet-1.0.3.jar
MD5: d9ea0a9a275336c175b343f2e4cd8f27
SHA1: cd49678784c46aa8789c060538e0154013bb421b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jhighlight-1.0.jar

Description:  JHighlight is an embeddable pure Java syntax highlighting library that supports Java, HTML, XHTML, XML and LZX languages and outputs to XHTML. It also supports RIFE templates tags and highlights them clearly so that you can easily identify the difference between your RIFE markup and the actual marked up source.

License:

CDDL, v1.0: http://www.opensource.org/licenses/cddl1.php
LGPL, v2.1 or later: http://www.opensource.org/licenses/lgpl-license.php
File Path: /home/ciagent/.m2/repository/com/uwyn/jhighlight/1.0/jhighlight-1.0.jar
MD5: 0ad5cf1bc56657f5e9e327e5e768da0a
SHA1: 0b1774029ee29472df8c25e5ba796431f7689fd6
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

xmlbeans-2.6.0.jar

Description: XmlBeans main jar

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/xmlbeans/xmlbeans/2.6.0/xmlbeans-2.6.0.jar
MD5: 6591c08682d613194dacb01e95c78c2c
SHA1: 29e80d2dd51f9dcdef8f9ffaee0d4dc1c9bbfc87
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

exo.core.component.document-5.2.x-SNAPSHOT.jar

Description: Implementation of Document Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.document/5.2.x-SNAPSHOT/exo.core.component.document-5.2.x-SNAPSHOT.jar
MD5: 69b892df386bf38d7c09d9d3cfd4e06c
SHA1: f9a9df0f2efee1dadf79891e667107fb7279d18f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.document:5.2.x-SNAPSHOT   Confidence:High

ecms-core-publication-plugins-5.2.x-SNAPSHOT.jar

Description: eXo Publication Plugins

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-publication-plugins/5.2.x-SNAPSHOT/ecms-core-publication-plugins-5.2.x-SNAPSHOT.jar
MD5: 8157795683a4f92baf455b67ad96cbbe
SHA1: f7401725ed546f32e537f43312e9a842cc370121
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-publication-plugins:5.2.x-SNAPSHOT   Confidence:High

ecms-core-viewer-5.2.x-SNAPSHOT.jar

Description: eXo PDF Viewer

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-viewer/5.2.x-SNAPSHOT/ecms-core-viewer-5.2.x-SNAPSHOT.jar
MD5: d7db5fcd5340c7f0c5663bcdaf286fe0
SHA1: 7f2758ffd646af23fedbac44092a839c19b8a4d3
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-viewer:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-administration-5.2.x-SNAPSHOT.jar

Description: eXo DMS Portlet Java Content: ECM Admin

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui-administration/5.2.x-SNAPSHOT/ecms-core-webui-administration-5.2.x-SNAPSHOT.jar
MD5: 7195bdd895e58f4200942d438833dd94
SHA1: 1cee9dee13b64218ea5477017b82bc8afa64fe8d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui-administration:5.2.x-SNAPSHOT   Confidence:High

ecms-ext-authoring-webui-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-ext-authoring-webui/5.2.x-SNAPSHOT/ecms-ext-authoring-webui-5.2.x-SNAPSHOT.jar
MD5: d0b68a635992a11ea9b1233bdf0f0700
SHA1: 4bec450821aa7da705d674ffe4480a1b571e41f3
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-ext-authoring-webui:5.2.x-SNAPSHOT   Confidence:High

ecms-ext-webui-5.2.x-SNAPSHOT.jar

Description: Action View Information on Right click popup menu

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-ext-webui/5.2.x-SNAPSHOT/ecms-ext-webui-5.2.x-SNAPSHOT.jar
MD5: ab8628f214622322391214c18b3be377
SHA1: 3de59a23a621be0759b87612425db0ded6c3d286
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-ext-webui:5.2.x-SNAPSHOT   Confidence:High

ecms-upgrade-plugins-5.2.x-SNAPSHOT.jar

Description: eXo ECMS Upgrade Plugins

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-upgrade-plugins/5.2.x-SNAPSHOT/ecms-upgrade-plugins-5.2.x-SNAPSHOT.jar
MD5: 2ebb56c7b6cc7764c290f05f972072bb
SHA1: 5ec3b903fc623655ecc999ec3a671580dd80e63b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-upgrade-plugins:5.2.x-SNAPSHOT   Confidence:High

forum-forum-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-forum-webapp/5.2.x-SNAPSHOT/forum-forum-webapp-5.2.x-SNAPSHOT.war
MD5: 020deb0c5b8f5bd5a15802bf90dc9ab1
SHA1: 2cf59ff13ed4d25d3003335773d514353d73e634
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-forum-webapp:5.2.x-SNAPSHOT   Confidence:High

commons-webui-component-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-webui-component/5.2.x-SNAPSHOT/commons-webui-component-5.2.x-SNAPSHOT.jar
MD5: 76472093acb45eeee5df564ed245a98e
SHA1: 04c7f2095b916b755e4236606dd9d172967609c9
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-webui-component:5.2.x-SNAPSHOT   Confidence:High

forum-application-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-application-common/5.2.x-SNAPSHOT/forum-application-common-5.2.x-SNAPSHOT.jar
MD5: b92ca82c49a3eabb3751382c5c00a614
SHA1: 68583d791e5fcc2457f13ff3997fa75ae1f42458
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-application-common:5.2.x-SNAPSHOT   Confidence:High

htmlcleaner-2.7.jar

Description:  HtmlCleaner is an HTML parser written in Java. It transforms dirty HTML to well-formed XML following the same rules that most web-browsers use.

License:

BSD License: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/net/sourceforge/htmlcleaner/htmlcleaner/2.7/htmlcleaner-2.7.jar
MD5: 59c43d382a268e31867fcd3de90991a0
SHA1: e2f6f5e109695701578258934d9819379c5bffe4
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

stax-utils-20070216.jar

Description: Provides a set of utility classes to integrate StAX into existing XML processing applications.

License:

BSD: http://www.opensource.org/licenses/bsd-license.html
File Path: /home/ciagent/.m2/repository/net/java/dev/stax-utils/stax-utils/20070216/stax-utils-20070216.jar
MD5: e4e3c9cad3b8289b1f905d6705bb6368
SHA1: 1d9fc60be26a0482c36b7a04d2c581ddf758b6ea
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

xwiki-commons-xml-5.4.7.jar

Description: XWiki Commons - XML

License:

http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/xwiki/commons/xwiki-commons-xml/5.4.7/xwiki-commons-xml-5.4.7.jar
MD5: 292ec670c150223faee3a24a5288b9bd
SHA1: 788b59fc9ea9109aacc237a15f059530b1afb793
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.xwiki.commons:xwiki-commons-xml:5.4.7   Confidence:High
  • cpe: cpe:/a:xwiki:xwiki:5.4.7   Confidence:Low   

CVE-2018-16277  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The Image Import function in XWiki through 10.7 has XSS.

Vulnerable Software & Versions:

wiki-renderer-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-renderer/5.2.x-SNAPSHOT/wiki-renderer-5.2.x-SNAPSHOT.jar
MD5: 7e946c82cfa62dfdf16adf76914a0c03
SHA1: 5267f3a6b7d60528aba5cbc072c9008286a16409
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-renderer:5.2.x-SNAPSHOT   Confidence:High

forum-component-bbcode-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-component-bbcode/5.2.x-SNAPSHOT/forum-component-bbcode-5.2.x-SNAPSHOT.jar
MD5: 6dbef594485792ae3821a96e733c4061
SHA1: 7411c9c0b9f1232f9417fb7fb34d3d7d28d542e0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-component-bbcode:5.2.x-SNAPSHOT   Confidence:High

forum-component-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-component-common/5.2.x-SNAPSHOT/forum-component-common-5.2.x-SNAPSHOT.jar
MD5: c82ffeb5ed6a4e6938954849e5721309
SHA1: 5a9d007bf4bb9e1ee2d706858c5fe03802baa4a2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-component-common:5.2.x-SNAPSHOT   Confidence:High

forum-component-rendering-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-component-rendering/5.2.x-SNAPSHOT/forum-component-rendering-5.2.x-SNAPSHOT.jar
MD5: 01ad24fc6b98af3f550aacb83c30bea4
SHA1: e6f3da071ebc4731e615689677386aeaed55361a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-component-rendering:5.2.x-SNAPSHOT   Confidence:High

forum-forum-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-forum-service/5.2.x-SNAPSHOT/forum-forum-service-5.2.x-SNAPSHOT.jar
MD5: 2a53c825af2f57a4db5638c25495398a
SHA1: b668853a48453ea46751114a9166f7fd7866bd1f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-forum-service:5.2.x-SNAPSHOT   Confidence:High

xpp3-1.1.4c.jar

Description: MXP1 is a stable XmlPull parsing engine that is based on ideas from XPP and in particular XPP2 but completely revised and rewritten to take the best advantage of latest JIT JVMs such as Hotspot in JDK 1.4+.

License:

Indiana University Extreme! Lab Software License, vesion 1.1.1: http://www.extreme.indiana.edu/viewcvs/~checkout~/XPP3/java/LICENSE.txt
Public Domain: http://creativecommons.org/licenses/publicdomain
Apache Software License, version 1.1: http://www.apache.org/licenses/LICENSE-1.1
File Path: /home/ciagent/.m2/repository/xpp3/xpp3/1.1.4c/xpp3-1.1.4c.jar
MD5: 6e3c39f391e4994888b7d0030f775804
SHA1: 9b988ea84b9e4e9f1874e390ce099b8ac12cfff5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

integ-search-portlet-5.2.x-SNAPSHOT.war

Description: Integration search portlet

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-search-portlet/5.2.x-SNAPSHOT/integ-search-portlet-5.2.x-SNAPSHOT.war
MD5: 806ff4b17ee1d6174ea5660ec1998309
SHA1: a892d35abbfbc6ca501785864e6a374977aeb28a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-search-portlet:5.2.x-SNAPSHOT   Confidence:High

juzu-core-1.2.x-SNAPSHOT.jar

Description: Where all the magic happens

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-core/1.2.x-SNAPSHOT/juzu-core-1.2.x-SNAPSHOT.jar
MD5: 7b9082b1b1f088a0174a26e816198244
SHA1: 99eafcdc5c55af114eb8595fb5e1244b2da2ea0e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-core:1.2.x-SNAPSHOT   Confidence:High

rhino-1.7R3.jar

Description: Rhino is an open-source implementation of JavaScript written entirely in Java. It is typically embedded into Java applications to provide scripting to end users.

License:

Mozilla Public License, Version 1.1: http://www.mozilla.org/MPL/MPL-1.1.txt
GNU General Public License, Version 2: http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt
File Path: /home/ciagent/.m2/repository/org/mozilla/rhino/1.7R3/rhino-1.7R3.jar
MD5: 9dbdb24663f20db43a2c29467c13a204
SHA1: 3bff1e632c665f8cf2d438f77a9f4d0758277db5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

juzu-plugins-less-1.2.x-SNAPSHOT.jar

Description: The Less plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-less/1.2.x-SNAPSHOT/juzu-plugins-less-1.2.x-SNAPSHOT.jar
MD5: 7016b610eb6f024b5ac8a872fc22b811
SHA1: 1985e54c0a0eea1e082f88b7a1da31ca0b5ba471
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-less:1.2.x-SNAPSHOT   Confidence:High

juzu-plugins-portlet-1.2.x-SNAPSHOT.jar

Description: The Portlet plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-portlet/1.2.x-SNAPSHOT/juzu-plugins-portlet-1.2.x-SNAPSHOT.jar
MD5: 63a9ba045f4fa2481096596fd5e8322f
SHA1: a3ded038c08998747c7151a6b07af09be14b75cc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-portlet:1.2.x-SNAPSHOT   Confidence:High

commons-api-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-api/5.2.x-SNAPSHOT/commons-api-5.2.x-SNAPSHOT.jar
MD5: 4884d68613aa2d1b232f47bdaeebd6a6
SHA1: 369cf99f8c9ad8ac3256d6ecdb2900066c87e6e2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-api:5.2.x-SNAPSHOT   Confidence:High

integ-search-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-search-service/5.2.x-SNAPSHOT/integ-search-service-5.2.x-SNAPSHOT.jar
MD5: f3e570177902921fb62568f24f2ce75c
SHA1: 2075df97c60ee081d122eee9a5bc7ec209c10478
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-search-service:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:pro_search:pro_search:5.2.20190116   Confidence:Low   

exo.jcr.framework.command-5.2.x-SNAPSHOT.jar

Description: Implementation of Command Framework of Exoplatform SAS 'eXo JCR' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.framework.command/5.2.x-SNAPSHOT/exo.jcr.framework.command-5.2.x-SNAPSHOT.jar
MD5: 0f39fd3d6a8aee92249580ca322bb469
SHA1: 176eb7a6d19d187eb9f192678a3c11baf8e29f69
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.framework.command:5.2.x-SNAPSHOT   Confidence:High

exo.jcr.framework.web-5.2.x-SNAPSHOT.jar

Description: Implementation of JCR REST adapter of Exoplatform SAS 'eXo JCR' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/exo.jcr.framework.web/5.2.x-SNAPSHOT/exo.jcr.framework.web-5.2.x-SNAPSHOT.jar
MD5: 6fd3203d8557ff750a51f5acbe6bb7b9
SHA1: 7e636f19b48d15b3cc67a9744a6255eef5027d48
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.jcr:exo.jcr.framework.web:5.2.x-SNAPSHOT   Confidence:High

commons-component-product-5.2.x-SNAPSHOT.jar

Description: Product informations: version, revision and build numbers

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-component-product/5.2.x-SNAPSHOT/commons-component-product-5.2.x-SNAPSHOT.jar
MD5: 262f6b0da43a22089d247a70f55a833c
SHA1: ebe583d626729188f0e8abda1267671c94964336
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-component-product:5.2.x-SNAPSHOT   Confidence:High

platform-component-upgrade-plugins-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-upgrade-plugins/5.2.x-SNAPSHOT/platform-component-upgrade-plugins-5.2.x-SNAPSHOT.jar
MD5: e444a06bc85102d48cae6fd9add57f56
SHA1: 8f1c7a27ec345a3da08bdb68a6ab9158fb3a8602
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-upgrade-plugins:5.2.x-SNAPSHOT   Confidence:High

platform-exo-gadget-pack-gadget-pack-5.2.x-SNAPSHOT.war

Description: eXo gadgets

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-exo-gadget-pack-gadget-pack/5.2.x-SNAPSHOT/platform-exo-gadget-pack-gadget-pack-5.2.x-SNAPSHOT.war
MD5: 1f7a7d893f44d7cca5383bdf82f9cfce
SHA1: e6378b68dca76d4db617c22880f093d7c58661b7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-exo-gadget-pack-gadget-pack:5.2.x-SNAPSHOT   Confidence:High

exo.core.component.script.groovy-5.2.x-SNAPSHOT.jar

Description: Groovy Scripts Instantiator of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.script.groovy/5.2.x-SNAPSHOT/exo.core.component.script.groovy-5.2.x-SNAPSHOT.jar
MD5: 022956563b8583204d58958d5f0eebb0
SHA1: 3d42ec418cbd5bf17dd1836b136a15b095587fc2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.script.groovy:5.2.x-SNAPSHOT   Confidence:High

platform-exo-gadget-pack-gadget-pack-services-5.2.x-SNAPSHOT.jar

Description: Gadget pack services

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-exo-gadget-pack-gadget-pack-services/5.2.x-SNAPSHOT/platform-exo-gadget-pack-gadget-pack-services-5.2.x-SNAPSHOT.jar
MD5: 90a21984889280184768d62910c5927f
SHA1: 70f2708356c7491eb29869da3706b97540a29f63
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-exo-gadget-pack-gadget-pack-services:5.2.x-SNAPSHOT   Confidence:High

platform-extension-portlet-branding-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-portlet-branding/5.2.x-SNAPSHOT/platform-extension-portlet-branding-5.2.x-SNAPSHOT.war
MD5: d5e38b1d2caefefa4984e4649508e4cc
SHA1: 59e2873135dda120dfb79de949076b6b80d7ed45
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-portlet-branding:5.2.x-SNAPSHOT   Confidence:High

commons-fileupload-1.3.3.jar

Description:  The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-fileupload/commons-fileupload/1.3.3/commons-fileupload-1.3.3.jar
MD5: dd77e787b7b5dc56f6a1cb658716d55d
SHA1: 04ff14d809195b711fd6bcc87e6777f886730ca1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-juzu-5.2.x-SNAPSHOT.jar

Description: This module contains : - assemblies for Juzu application packaging inside eXoPlatform - eXo Kernel Provider Factory

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-juzu/5.2.x-SNAPSHOT/commons-juzu-5.2.x-SNAPSHOT.jar
MD5: 718cd408cba0c110006b97acaf40d0dd
SHA1: f324e8acdb02d86706e8ec206de6c3d6f4caa4e5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-juzu:5.2.x-SNAPSHOT   Confidence:High

juzu-plugins-upload-1.2.x-SNAPSHOT.jar

Description: The File Upload plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-upload/1.2.x-SNAPSHOT/juzu-plugins-upload-1.2.x-SNAPSHOT.jar
MD5: 9cbe928c4e7f3209c203aaee8c8fe2d8
SHA1: 231b5f95d283cb30299e87a9d206082f848ca783
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-upload:1.2.x-SNAPSHOT   Confidence:High

platform-extension-portlets-homepage-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-portlets-homepage/5.2.x-SNAPSHOT/platform-extension-portlets-homepage-5.2.x-SNAPSHOT.war
MD5: 12146c86cb2b53dadbd1adab3cedff47
SHA1: 2c3ea0e6fb949da3dd2092d41e839904a238fbf7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-portlets-homepage:5.2.x-SNAPSHOT   Confidence:High

aopalliance-1.0.jar

Description: AOP Alliance

License:

Public Domain
File Path: /home/ciagent/.m2/repository/aopalliance/aopalliance/1.0/aopalliance-1.0.jar
MD5: 04177054e180d09e3998808efa0401c7
SHA1: 0235ba8b489512805ac13a8f9ea77a1ca5ebe3e8
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

guice-3.0.jar

Description: Guice is a lightweight dependency injection framework for Java 5 and above

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/google/inject/guice/3.0/guice-3.0.jar
MD5: ca1c7ba366884cfcd2cfb48d2395c400
SHA1: 9d84f15fe35e2c716a02979fb62f50a29f38aefa
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

guice-multibindings-3.0.jar

Description: Guice is a lightweight dependency injection framework for Java 5 and above

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/google/inject/extensions/guice-multibindings/3.0/guice-multibindings-3.0.jar
MD5: 4be1e91408e173eb10ed53a1a565a793
SHA1: 5e670615a927571234df68a8b1fe1a16272be555
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-codec-1.10.jar

Description:  The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar
MD5: 353cf6a2bdba09595ccfa073b78c7fcb
SHA1: 4b95f4897fa13f2cd904aee711aeafc0c5295cd8
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

guava-18.0.jar

Description:  Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more. Guava has only one code dependency - javax.annotation, per the JSR-305 spec.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/google/guava/guava/18.0/guava-18.0.jar
MD5: 947641f6bb535b1d942d1bc387c45290
SHA1: cce0823396aa693798f8882e64213b1772032b09
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2018-10237  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable.

Vulnerable Software & Versions: (show all)

oauth-provider-20100527.jar

File Path: /home/ciagent/.m2/repository/net/oauth/core/oauth-provider/20100527/oauth-provider-20100527.jar
MD5: afdc85d3f14481e4842c317c4f414f7e
SHA1: 165bfc97e63e5af8e052a47f4dee832ce06bf7d7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

oauth-consumer-20090617.jar

File Path: /home/ciagent/.m2/repository/net/oauth/core/oauth-consumer/20090617/oauth-consumer-20090617.jar
MD5: f0e2849d152f4d8bf725aa4e11b8f969
SHA1: fb70a4c98119c27e78320c5e42a99f0b9eb7c356
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: net.oauth.core:oauth-consumer:20090617   Confidence:High

oauth-httpclient4-20090913.jar

File Path: /home/ciagent/.m2/repository/net/oauth/core/oauth-httpclient4/20090913/oauth-httpclient4-20090913.jar
MD5: 577e1f28c28bc5006b8adcf838ffd46d
SHA1: a42f9135d3d72e77274982c4aa14fa0f4dab882f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: net.oauth.core:oauth-httpclient4:20090913   Confidence:High

httpcore-4.3.3.jar

Description:  HttpComponents Core (blocking I/O)

File Path: /home/ciagent/.m2/repository/org/apache/httpcomponents/httpcore/4.3.3/httpcore-4.3.3.jar
MD5: c26171852f9810cd3d2416604a387e71
SHA1: f91b7a4aadc5cf486df6e4634748d7dd7a73f06d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

httpclient-4.3.6.jar

Description:  HttpComponents Client

File Path: /home/ciagent/.m2/repository/org/apache/httpcomponents/httpclient/4.3.6/httpclient-4.3.6.jar
MD5: 2d29a27bb6c6b44bc8a608a0e5d09735
SHA1: 4c47155e3e6c9a41a28db36680b828ced53b8af4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

platform-extension-portlets-platformNavigation-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-portlets-platformNavigation/5.2.x-SNAPSHOT/platform-extension-portlets-platformNavigation-5.2.x-SNAPSHOT.war
MD5: ece0f58dd866d7b22081eddc87407368
SHA1: de1c33dbaf21c750af787f350c8a4974ca77d561
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-portlets-platformNavigation:5.2.x-SNAPSHOT   Confidence:High

calendar-component-create-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/calendar/calendar-component-create/5.2.x-SNAPSHOT/calendar-component-create-5.2.x-SNAPSHOT.jar
MD5: 2ddd0618c154a50c4302a9fd04b0c882
SHA1: 1c0702a6ca0606c2e1c12616b006415cbe6166ea
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.calendar:calendar-component-create:5.2.x-SNAPSHOT   Confidence:High

ecms-core-webui-seo-5.2.x-SNAPSHOT.jar

Description: eXo SEO Portlet Java Content

File Path: /home/ciagent/.m2/repository/org/exoplatform/ecms/ecms-core-webui-seo/5.2.x-SNAPSHOT/ecms-core-webui-seo-5.2.x-SNAPSHOT.jar
MD5: 8d65ed0e4239052ea1115ae56b3bc5a2
SHA1: ec48bde98a97a063be3d931c9efe09790b5cdb89
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.ecms:ecms-core-webui-seo:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:content_project:content:5.2   Confidence:Low   

forum-application-create-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/forum/forum-application-create/5.2.x-SNAPSHOT/forum-application-create-5.2.x-SNAPSHOT.jar
MD5: a8a71449abb05a81303e90928778b6be
SHA1: f110e4bb02597daa7db24059565c5047ed07022e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.forum:forum-application-create:5.2.x-SNAPSHOT   Confidence:High

platform-component-common-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-common/5.2.x-SNAPSHOT/platform-component-common-5.2.x-SNAPSHOT.jar
MD5: d2312bc4b23ee9601267a092b9e26a3a
SHA1: 8ab057589106fcf42c0df52f96b2fbd29d1ad377
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-common:5.2.x-SNAPSHOT   Confidence:High

platform-component-uxpnavigation-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-uxpnavigation/5.2.x-SNAPSHOT/platform-component-uxpnavigation-5.2.x-SNAPSHOT.jar
MD5: 0aa1d7eace2c1807f4afcd1dde3e1f0b
SHA1: 37a6aae669a860cd54efbfeb3434b61dd45f3bda
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-uxpnavigation:5.2.x-SNAPSHOT   Confidence:High

platform-component-webui-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-webui/5.2.x-SNAPSHOT/platform-component-webui-5.2.x-SNAPSHOT.jar
MD5: 2a13901beacd4bc0e57fd9d962eb9009
SHA1: 16bbfa3d21b0a3f06153e02349a2df6d6810f901
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-webui:5.2.x-SNAPSHOT   Confidence:High

social-component-webui-5.2.x-SNAPSHOT.jar

Description: eXo Social Web UI Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-webui/5.2.x-SNAPSHOT/social-component-webui-5.2.x-SNAPSHOT.jar
MD5: 8810a26ed1d60d0757b042866f673928
SHA1: 4263df8d7e61b1e564c75aa605123f5973b117e4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-webui:5.2.x-SNAPSHOT   Confidence:High

chromattic.common-1.3.0.jar

Description: Chromattic Framework Common

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.common/1.3.0/chromattic.common-1.3.0.jar
MD5: 15bfb4cc0312aefffb25952cdf18b2cd
SHA1: 55470175c1ba46a917504acf97018e6ef2932659
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

chromattic.metamodel-1.3.0.jar

Description: Chromattic Framework Metamodel

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.metamodel/1.3.0/chromattic.metamodel-1.3.0.jar
MD5: 0d534975c688ebabbc232601c6bc13da
SHA1: fbaa10037faf34a2d4d8eeb4e6b5ce28c95a9455
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jboss-logging-annotations-1.2.0.Beta1.jar

File Path: /home/ciagent/.m2/repository/org/jboss/logging/jboss-logging-annotations/1.2.0.Beta1/jboss-logging-annotations-1.2.0.Beta1.jar
MD5: 938e552e319015a8863dd91284aada54
SHA1: 2f437f37bb265d9f8f1392823dbca12d2bec06d6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

hibernate-commons-annotations-4.0.5.Final.jar

Description: Common reflection code used in support of annotation processing

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/hibernate/common/hibernate-commons-annotations/4.0.5.Final/hibernate-commons-annotations-4.0.5.Final.jar
MD5: 5dadbafd7c7bc1168c10a2ba87e927a2
SHA1: 2a581b9edb8168e45060d8bad8b7f46712d2c52c
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jackson-databind-2.3.1.jar

Description: General data-binding functionality for Jackson: works on core streaming API

License:

http://www.apache.org/licenses/LICENSE-2.0.txt, http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.1/jackson-databind-2.3.1.jar
MD5: 4de637793707fdecb1b7a90f677103ec
SHA1: c4096a8323bbbcbeda072e3def123a9b66783361
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2017-15095  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.

Vulnerable Software & Versions: (show all)

CVE-2017-17485  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

Vulnerable Software & Versions: (show all)

CVE-2017-7525  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.

Vulnerable Software & Versions: (show all)

CVE-2018-1000873  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Databind that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.

Vulnerable Software & Versions: (show all)

CVE-2018-14718  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-14719  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-14720  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-14721  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-918 Server-Side Request Forgery (SSRF)

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-19360  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-19361  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-19362  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.

Vulnerable Software & Versions: (show all)

CVE-2018-5968  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-184 Incomplete Blacklist

FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.

Vulnerable Software & Versions: (show all)

CVE-2018-7489  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-184 Incomplete Blacklist

FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.

Vulnerable Software & Versions: (show all)

social-component-service-5.2.x-SNAPSHOT.jar

Description: eXo Social Service Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-service/5.2.x-SNAPSHOT/social-component-service-5.2.x-SNAPSHOT.jar
MD5: 755cc5d3a4052a2915051ac4aaf0cdc8
SHA1: 2e915893e69865ca7601f7dc803a2bdad6cee64f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-service:5.2.x-SNAPSHOT   Confidence:High

itext-2.1.7.jar

Description: iText, a free Java-PDF library

License:

Mozilla Public License: http://www.mozilla.org/MPL/MPL-1.1.html
File Path: /home/ciagent/.m2/repository/com/lowagie/itext/2.1.7/itext-2.1.7.jar
MD5: 7587a618197a065eac4a453d173d4ed6
SHA1: 892bfb3e97074a61123b3b2d7caa2db112750864
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

validation-api-1.1.0.Final.jar

Description:  Bean Validation API

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar
MD5: 4c257f52462860b62ab3cdab45f53082
SHA1: 8613ae82954779d518631e05daa73a6a954817d5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

sac-1.3.jar

Description: SAC is a standard interface for CSS parsers.

License:

The W3C Software License: http://www.w3.org/Consortium/Legal/copyright-software-19980720
File Path: /home/ciagent/.m2/repository/org/w3c/css/sac/1.3/sac-1.3.jar
MD5: eb04fa63fc70c722f2b8ec156166343b
SHA1: cdb2dcb4e22b83d6b32b93095f644c3462739e82
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cssparser-0.9.18.jar

Description: A CSS parser which implements SAC (the Simple API for CSS).

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/net/sourceforge/cssparser/cssparser/0.9.18/cssparser-0.9.18.jar
MD5: dc57713d4c7a54a569fc67529ce3b525
SHA1: 61c015378d27b5e245a5deb7a324c7e716b4706a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

bcmail-jdk15-1.45.jar

Description: The Bouncy Castle Java CMS and S/MIME APIs for handling the CMS and S/MIME protocols. This jar contains CMS and S/MIME APIs for JDK 1.5. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs. If the S/MIME API is used, the JavaMail API and the Java activation framework will also be needed.

License:

Bouncy Castle Licence: http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/bouncycastle/bcmail-jdk15/1.45/bcmail-jdk15-1.45.jar
MD5: 13321fc7eff7bcada7b4fedfb592025c
SHA1: 3aed7e642dd8d39dc14ed1dec3ff79e084637148
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

bcprov-jdk15-1.45.jar

Description: The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5.

License:

Bouncy Castle Licence: http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/bouncycastle/bcprov-jdk15/1.45/bcprov-jdk15-1.45.jar
MD5: 2062f8e3d15748443ea60a94b266371c
SHA1: 7741883cb07b4634e8b5fd3337113b6ea770a9bb
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:bouncycastle:bouncy-castle-crypto-package:1.45   Confidence:Low   
  • maven: org.bouncycastle:bcprov-jdk15:1.45    Confidence:Highest
  • cpe: cpe:/a:bouncycastle:bouncy_castle_crypto_package:1.45   Confidence:Low   

CVE-2015-7940  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."

Vulnerable Software & Versions: (show all)

bctsp-jdk15-1.45.jar

Description: The Bouncy Castle Java API for handling the Time Stamp Protocol (TSP). This jar contains the TSP API for JDK 1.5. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs.

License:

Bouncy Castle Licence: http://www.bouncycastle.org/licence.html
File Path: /home/ciagent/.m2/repository/org/bouncycastle/bctsp-jdk15/1.45/bctsp-jdk15-1.45.jar
MD5: 84a2c3383fc991fb9d3902e723d96b7a
SHA1: 60647c99cbcd06b27987cb07643fb68b10c2eb74
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

mchange-commons-java-0.2.3.4.jar

Description: a library of arguably useful Java utilities.

License:

GNU Lesser General Public License, Version 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
Eclipse Public License, Version 1.0: http://www.eclipse.org/org/documents/epl-v10.php
File Path: /home/ciagent/.m2/repository/com/mchange/mchange-commons-java/0.2.3.4/mchange-commons-java-0.2.3.4.jar
MD5: cc99f685b11309071e1e94fd758c372b
SHA1: 5eb5a801d96f65912bcf418a831fa23c663b029b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

c3p0-0.9.2.1.jar

Description: a JDBC Connection pooling / Statement caching library

License:

GNU Lesser General Public License, Version 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
Eclipse Public License, Version 1.0: http://www.eclipse.org/org/documents/epl-v10.php
File Path: /home/ciagent/.m2/repository/com/mchange/c3p0/0.9.2.1/c3p0-0.9.2.1.jar
MD5: 35085ff8cfaf6576d118ad4492236ae6
SHA1: 11b29ccb286d34eb804b7f6a3786809c9bd2e1b7
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

hibernate-c3p0-4.2.21.Final.jar

Description: A module of the Hibernate O/RM project

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-c3p0/4.2.21.Final/hibernate-c3p0-4.2.21.Final.jar
MD5: a020364e0f8e4997c889977e491d0084
SHA1: 838aaf84a93af3930c1e30d314a242f34aeee57a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

exo.core.component.organization.jdbc-5.2.x-SNAPSHOT.jar

Description: Implementation of JDBC Service of Exoplatform SAS 'eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.organization.jdbc/5.2.x-SNAPSHOT/exo.core.component.organization.jdbc-5.2.x-SNAPSHOT.jar
MD5: a85f9b1e55c000a706afea15494e3a42
SHA1: 2b7d0ebfd37f3e8f20b6a600efd4789edbb71433
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.organization.jdbc:5.2.x-SNAPSHOT   Confidence:High

jrcs.rcs-0.4.2.jar

File Path: /home/ciagent/.m2/repository/org/suigeneris/jrcs.rcs/0.4.2/jrcs.rcs-0.4.2.jar
MD5: 39a0ad326f371e1b1b0b1f35cf0f6efb
SHA1: 50fde3e7078afa87aea35a11be3ee01e7805a103
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

flying-saucer-core-9.0.8.jar

Description: Flying Saucer is a CSS 2.1 renderer written in Java. This artifact contains the core rendering and layout code as well as Java2D output.

License:

GNU Lesser General Public License (LGPL), version 2.1 or later: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/org/xhtmlrenderer/flying-saucer-core/9.0.8/flying-saucer-core-9.0.8.jar
MD5: f95e2ae188539bb7c4d675c8c435660e
SHA1: 9c5a8fcd423e4a86d9f460a240f43911a5824a40
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

flying-saucer-pdf-9.0.8.jar

Description: Flying Saucer is a CSS 2.1 renderer written in Java. This artifact supports PDF output.

License:

GNU Lesser General Public License (LGPL), version 2.1 or later: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/org/xhtmlrenderer/flying-saucer-pdf/9.0.8/flying-saucer-pdf-9.0.8.jar
MD5: 7e9a77a1e8234ba5f1751376b7f152f9
SHA1: b7f04073f273918f81be38b1db1f3b2a93e7984b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

wiki-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-service/5.2.x-SNAPSHOT/wiki-service-5.2.x-SNAPSHOT.jar
MD5: efcf7b807362f3e41542e43ec8b2e6c2
SHA1: d6df7b9cf0d372f7edf4e674cc19ec82bde18662
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-service:5.2.x-SNAPSHOT   Confidence:High

wiki-macros-iframe-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-macros-iframe/5.2.x-SNAPSHOT/wiki-macros-iframe-5.2.x-SNAPSHOT.jar
MD5: 679e56e4ffa8a5e99a6c39345d392e3f
SHA1: b3ecad95a99363a647857aed31a76d44460e481d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-macros-iframe:5.2.x-SNAPSHOT   Confidence:High

jython-standalone-2.5.4-rc1.jar

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar
MD5: 947e7602dd7ff324e67b0557c088570d
SHA1: 2c7f8e1a5bcc210a686d15f372276365ccd5dffc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

pygments-1.6.jar

Description: pygments

License:

Simplified BSD License: http://www.opensource.org/licenses/BSD-2-Clause
File Path: /home/ciagent/.m2/repository/org/pygments/pygments/1.6/pygments-1.6.jar
MD5: a2522f9d0b69803307071c79d2e6f00f
SHA1: 0ca48ef8f443c2c01679414d15e2f2c525583a43
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jdom2-2.0.5.jar

Description:  A complete, Java-based solution for accessing, manipulating, and outputting XML data

License:

Similar to Apache License but with the acknowledgment clause removed: https://raw.github.com/hunterhacker/jdom/master/LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/jdom/jdom2/2.0.5/jdom2-2.0.5.jar
MD5: 302db3c65c38d3c10ef31bca76bd76b4
SHA1: 2001db51c131e555bafdb77fc52af6a9408c505e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

wiki-webui-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-webui/5.2.x-SNAPSHOT/wiki-webui-5.2.x-SNAPSHOT.jar
MD5: 2071c3e4f0a39d61ae69525b04856ee4
SHA1: 11092043cf943a8db1386b44dfb7e6d702d9402d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-webui:5.2.x-SNAPSHOT   Confidence:High

platform-extension-portlets-notification-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-portlets-notification/5.2.x-SNAPSHOT/platform-extension-portlets-notification-5.2.x-SNAPSHOT.war
MD5: 72bcbbe6ceb5e23c084de1640014c7b2
SHA1: 956c41b0f93ef4a4584c9db6af78c944781507aa
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-portlets-notification:5.2.x-SNAPSHOT   Confidence:High

platform-extension-resources-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-resources/5.2.x-SNAPSHOT/platform-extension-resources-5.2.x-SNAPSHOT.war
MD5: 6fdd40ddf069a2ac3cd7d797d28174e3
SHA1: c6d1cf43c98daf2e308f6c4cd9d27588c9dde314
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-resources:5.2.x-SNAPSHOT   Confidence:High

platform-extension-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-webapp/5.2.x-SNAPSHOT/platform-extension-webapp-5.2.x-SNAPSHOT.war
MD5: ad80ac2b77cdfdb35f2c8b0ad507ca10
SHA1: 67045936c598601c68ecc3251ebc3e88042d9dd4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-webapp:5.2.x-SNAPSHOT   Confidence:High

juzu-plugins-validation-1.2.x-SNAPSHOT.jar

Description: The Validation plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-validation/1.2.x-SNAPSHOT/juzu-plugins-validation-1.2.x-SNAPSHOT.jar
MD5: 8f330f9b9e0079cfe424c932c91938f5
SHA1: 783a1d9a08b113c0e8f4fb76a585b9b7f854b927
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-validation:1.2.x-SNAPSHOT   Confidence:High

protobuf-java-2.5.0.jar

Description:  Protocol Buffers are a way of encoding structured data in an efficient yet extensible format.

License:

New BSD license: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/com/google/protobuf/protobuf-java/2.5.0/protobuf-java-2.5.0.jar
MD5: a44473b98947e2a54c54e0db1387d137
SHA1: a10732c76bfacdbd633a7eb0f7968b1059a65dfa
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

less4j-1.4.0.jar

Description: Less language is an extension of css and less4j compiles it into regular css. It adds several dynamic features into css: variables, expressions, nested rules. Less4j is a port. The original compiler was written in JavaScript and is called less.js. The less language is mostly defined in less.js documentation/issues and by what less.js actually do. Links to less.js: * home page: http://lesscss.org/ * source code & issues: https://github.com/cloudhead/less.js

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
Eclipse Public License (EPL): http://www.eclipse.org/legal/epl-v10.html
Gnu General Public License, Version 3: http://www.gnu.org/licenses/gpl-3.0.html
File Path: /home/ciagent/.m2/repository/com/github/sommeri/less4j/1.4.0/less4j-1.4.0.jar
MD5: 599d020aa5e514142fc4acdfa0549ac8
SHA1: bce0d21fe039f12ffd2b8ac366ce7d9599ace27a
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

juzu-plugins-less4j-1.2.x-SNAPSHOT.jar

Description: The Less4j plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-less4j/1.2.x-SNAPSHOT/juzu-plugins-less4j-1.2.x-SNAPSHOT.jar
MD5: 71cab9e22ec72b786ae0662a31655979
SHA1: 0b3823beeb105d620100ba3ed8ca8404dc146a03
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-less4j:1.2.x-SNAPSHOT   Confidence:High

webjars-locator-0.4.jar

Description: WebJar Locator

License:

None: http://webjars.org
File Path: /home/ciagent/.m2/repository/org/webjars/webjars-locator/0.4/webjars-locator-0.4.jar
MD5: 396406ea3c611d1448cf4ecf62500dc4
SHA1: 238a9af5803c4ed4321dedd281a0b1e01b8f6e7b
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

juzu-plugins-webjars-1.2.x-SNAPSHOT.jar

Description: The Webjars plugin

File Path: /home/ciagent/.m2/repository/org/juzu/juzu-plugins-webjars/1.2.x-SNAPSHOT/juzu-plugins-webjars-1.2.x-SNAPSHOT.jar
MD5: 1c408db11400b5f3ce52d82dd823e38f
SHA1: dfca4ee3c78a0c67f58a32af0f7a5ff5a2829a2e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.juzu:juzu-plugins-webjars:1.2.x-SNAPSHOT   Confidence:High

jsr311-api-1.1.1.jar

License:

                CDDL License
            : http://www.opensource.org/licenses/cddl1.php
File Path: /home/ciagent/.m2/repository/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar
MD5: c9803468299ec255c047a280ddec510f
SHA1: 59033da2a1afd56af1ac576750a8d0b1830d59e6
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

chromattic.api-1.3.0.jar

Description: Chromattic Framework API

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.api/1.3.0/chromattic.api-1.3.0.jar
MD5: 11f2df6e3a3b4451719710c0f4c08103
SHA1: 4f60a9585bd6e68833eaaea1f1a615c682adbe27
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

reflext.api-1.1.0.jar

Description: The Reflext Framework API

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.api/1.1.0/reflext.api-1.1.0.jar
MD5: fe732172fa2fb5ae4b63866ef15da41f
SHA1: 28374c509099736aeedc52fef3d7b8e78238c2a0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

reflext.core-1.1.0.jar

Description: The Reflect Framework Core

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.core/1.1.0/reflext.core-1.1.0.jar
MD5: cc65231f60a70dec43a57ccba5adce81
SHA1: 56316a714b99d7ac85d23d0f1a4680149c3273d6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

reflext.spi-1.1.0.jar

Description: The Reflext Framework SPI

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.spi/1.1.0/reflext.spi-1.1.0.jar
MD5: 2c967ae0c3078d23b615f8825377f304
SHA1: 4df0428c39922079c53955602bce66735f9d20a8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

reflext.apt-1.1.0.jar

Description: The Reflext Framework Annotation Processing Tool Plugin

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.apt/1.1.0/reflext.apt-1.1.0.jar
MD5: e6bb0195d6cdd15b618939c78999ea4e
SHA1: 093ab21e03197c1c7a2d2d20da4d3dd34a60ac24
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

chromattic.apt-1.3.0.jar

Description: Chromattic Framework APT Plugin

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.apt/1.3.0/chromattic.apt-1.3.0.jar
MD5: 5f51682435a2e2014a9bd9c5936a5cc5
SHA1: f2e219c2b8e13983a26b4c3f4e8eb54d71730b4d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

chromattic.ext-1.3.0.jar

Description: Chromattic Framework Extensions

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.ext/1.3.0/chromattic.ext-1.3.0.jar
MD5: a8482bb9fe7572e77a58627251740ee1
SHA1: ea3bd25892c827d9b830aea768de69e200a93165
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

chromattic.spi-1.3.0.jar

Description: Chromattic Framework SPI

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.spi/1.3.0/chromattic.spi-1.3.0.jar
MD5: e440e3f5a8e5ad38720975546ab7f06d
SHA1: 64c36f826b832acab48fea793b7c70b019a46181
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

pc-api-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/pc/pc-api/5.2.x-SNAPSHOT/pc-api-5.2.x-SNAPSHOT.jar
MD5: 227a043d01bcd39f7aee187a2c4f4df8
SHA1: 4110ec8816dd8bdd083ff36fc8f176628b13cf52
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.pc:pc-api:5.2.x-SNAPSHOT   Confidence:High

picocontainer-1.1.jar

Description: Please refer to the main website for documentation.

File Path: /home/ciagent/.m2/repository/picocontainer/picocontainer/1.1/picocontainer-1.1.jar
MD5: 98f476491eed3b106b9a015f15bf5fda
SHA1: a2babe80a3af3a3672095341625e4a9ba4278c1b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

sso-integration-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/sso/sso-integration/5.2.x-SNAPSHOT/sso-integration-5.2.x-SNAPSHOT.jar
MD5: c05ebac6a8d7e7f132614c64947e4e4d
SHA1: d2a441c5b03109306619b781f7d68976a7071f22
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.sso:sso-integration:5.2.x-SNAPSHOT   Confidence:High

sso-agent-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/sso/sso-agent/5.2.x-SNAPSHOT/sso-agent-5.2.x-SNAPSHOT.jar
MD5: 491a2d727c66ea0ca04949ce74ce597a
SHA1: f222fcca2c69bf9439a7a467d0187430d6bf0ae2
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.sso:sso-agent:5.2.x-SNAPSHOT   Confidence:High

xmlpull-1.1.3.1.jar

License:

Public Domain: http://www.xmlpull.org/v1/download/unpacked/LICENSE.txt
File Path: /home/ciagent/.m2/repository/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar
MD5: cc57dacc720eca721a50e78934b822d2
SHA1: 2b8e230d2ab644e4ecaa94db7cdedbc40c805dfa
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

xstream-1.4.10.jar

Description: XStream is a serialization library from Java objects to XML and back.

License:

http://x-stream.github.io/license.html
File Path: /home/ciagent/.m2/repository/com/thoughtworks/xstream/xstream/1.4.10/xstream-1.4.10.jar
MD5: d00eec778910f95b26201395ac64cca0
SHA1: dfecae23647abc9d9fd0416629a4213a3882b101
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

ccpp-1.0.jar

Description:  To enable interoperability between web servers and access mechanisms, and to facilitate development of device independent web applications, this specification will define a set of APIs for processing CC/PP information.

License:

Sun Microsystems, Inc. Binary Code License Agreement: http://java.sun.com/j2ee/ccpp
File Path: /home/ciagent/.m2/repository/javax/ccpp/ccpp/1.0/ccpp-1.0.jar
MD5: c2139f1a4791279047beac43f8004e92
SHA1: c3d4ca935e954140e325c305126ca1866d6786dd
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

portals-bridges-common-1.0.4.jar

Description:  Apache Portals Bridges Common Utilties and Interfaces

File Path: /home/ciagent/.m2/repository/org/apache/portals/bridges/portals-bridges-common/1.0.4/portals-bridges-common-1.0.4.jar
MD5: ea12be4025e9b906f0d22b5ed130a1f5
SHA1: c7ee4640a35fc158cf8c4a645b8e3e21ca3b52ff
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

asm-3.1.jar

File Path: /home/ciagent/.m2/repository/asm/asm/3.1/asm-3.1.jar
MD5: b9b8d2d556f9458aac8c463fd511f86d
SHA1: c157def142714c544bdea2e6144645702adf7097
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

cglib-2.2.jar

License:

ASF 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/cglib/cglib/2.2/cglib-2.2.jar
MD5: 54bd85d9ebe3f194edba210fe0e5f255
SHA1: 97d03461dc1c04ffc636dcb2579aae7724a78ef2
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

chromattic.cglib-1.3.0.jar

Description: Chromattic Framework CGLib Plugin

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.cglib/1.3.0/chromattic.cglib-1.3.0.jar
MD5: a81fd6fb445a53cc9a1f6e4565674c7f
SHA1: 082e032bfca75a8481bd3cd747beba603ac677b5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

javaparser-1.0.8.jar

Description: A Java 1.5 Parser with AST generation and visitor support. The AST records the source code structure, javadoc and comments. It is also possible to change the AST nodes or create new ones to modify the source code.

License:

GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/com/google/code/javaparser/javaparser/1.0.8/javaparser-1.0.8.jar
MD5: 32228e53ef6cc2ebe515bc40d7c9a4f9
SHA1: 9ca2f8ef2233babc53a8c2b6bb21869d94f5fcc1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: com.google.code.javaparser:javaparser:1.0.8   Confidence:High

chromattic.groovy-1.3.0.jar

Description: Chromattic Framework Groovy

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.groovy/1.3.0/chromattic.groovy-1.3.0.jar
MD5: 0380f4b86e1af34ce3ad4f2861a0b059
SHA1: 744c2bb6f74a9bf3d35ffd6ba3540635ce129337
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

reflext.jlr-1.1.0.jar

Description: The Reflext Framework Java Lang Reflect Plugin

File Path: /home/ciagent/.m2/repository/org/reflext/reflext.jlr/1.1.0/reflext.jlr-1.1.0.jar
MD5: 1103f3b1ed3762e0bd100cbee6e7f345
SHA1: 79ad1a5053213cbb350d37ff12d5f767243c8c46
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

chromattic.dataobject-1.3.0.jar

Description: Chromattic Data Object

File Path: /home/ciagent/.m2/repository/org/chromattic/chromattic.dataobject/1.3.0/chromattic.dataobject-1.3.0.jar
MD5: 3e09c98edcb4ccf64e065e55023e1f18
SHA1: 572d95530907c9a738a2580dc539636a1a519b77
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-search-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-search/5.2.x-SNAPSHOT/commons-search-5.2.x-SNAPSHOT.jar
MD5: f9d0d4d749b4e59fd9dbaff17cdd0537
SHA1: 120701f955e5ed432ba719479860f8f44831fcaf
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:pro_search:pro_search:5.2.20190113   Confidence:Low   
  • maven: org.exoplatform.commons:commons-search:5.2.x-SNAPSHOT   Confidence:High

commons-file-storage-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/commons/commons-file-storage/5.2.x-SNAPSHOT/commons-file-storage-5.2.x-SNAPSHOT.jar
MD5: 6fa1cd6579ac51d2f186bf0394e555ad
SHA1: 058378e34e1f16702b38288535d1dbff01a4659c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.commons:commons-file-storage:5.2.x-SNAPSHOT   Confidence:High

jboss-logging-3.3.0.Final.jar

Description: The JBoss Logging Framework

License:

Apache License, version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar
MD5: bc11af4b8ce7138cdc79b7ba8561638c
SHA1: 3616bb87707910296e2c195dc016287080bba5af
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

exo.core.component.database-5.2.x-SNAPSHOT.jar

Description: Implementation of Database Service of Exoplatform SAS eXo Core' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/core/exo.core.component.database/5.2.x-SNAPSHOT/exo.core.component.database-5.2.x-SNAPSHOT.jar
MD5: accd57fc337ec6f516e9ac1b327c3c45
SHA1: c1a6cad3babe71079e9563ab7d7b0a2bc780536b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.core:exo.core.component.database:5.2.x-SNAPSHOT   Confidence:High

integ-calendar-social-5.2.x-SNAPSHOT.jar

Description: Calendar with Social activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-calendar-social/5.2.x-SNAPSHOT/integ-calendar-social-5.2.x-SNAPSHOT.jar
MD5: 4397cd4b187cb1a5f18e464abeb094ee
SHA1: 9147500dc83173e7543886411d49e1c174054308
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-calendar-social:5.2.x-SNAPSHOT   Confidence:High

integ-ecms-social-5.2.x-SNAPSHOT.jar

Description: ECMS with Social activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-ecms-social/5.2.x-SNAPSHOT/integ-ecms-social-5.2.x-SNAPSHOT.jar
MD5: f40f95640f928a89b25f71c15bf85970
SHA1: d211e7e28d7cbef17348b80483818e2bb40415bc
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-ecms-social:5.2.x-SNAPSHOT   Confidence:High

integ-forum-social-5.2.x-SNAPSHOT.jar

Description: Forum with Social activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-forum-social/5.2.x-SNAPSHOT/integ-forum-social-5.2.x-SNAPSHOT.jar
MD5: 75150a23dc5208f2b16d6ab021374d45
SHA1: 6c4485c5617a704ab48754071172e6a61fb24815
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-forum-social:5.2.x-SNAPSHOT   Confidence:High

integ-social-ecms-5.2.x-SNAPSHOT.jar

Description: Select document to public on activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-social-ecms/5.2.x-SNAPSHOT/integ-social-ecms-5.2.x-SNAPSHOT.jar
MD5: ae533eb4f0a48782a7816dca89a3d0fc
SHA1: b0a9aee325a8ac4621926948b006327fcf3e324f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-social-ecms:5.2.x-SNAPSHOT   Confidence:High

integ-wiki-social-5.2.x-SNAPSHOT.jar

Description: Wiki with Social activity

File Path: /home/ciagent/.m2/repository/org/exoplatform/integration/integ-wiki-social/5.2.x-SNAPSHOT/integ-wiki-social-5.2.x-SNAPSHOT.jar
MD5: ae5cd39cc29590f4fe875bc655bda2dc
SHA1: 836142e46eb1593a99cbe602fdb3bec25faa5bf5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.integration:integ-wiki-social:5.2.x-SNAPSHOT   Confidence:High

platform-component-gadgets-5.2.x-SNAPSHOT.jar

Description: Populate gadgets for user dashboard and GadgetRegistry

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-gadgets/5.2.x-SNAPSHOT/platform-component-gadgets-5.2.x-SNAPSHOT.jar
MD5: 9a3a383453da8bb02a6563db2b481ad4
SHA1: 3fd479b6e086a77797ec2f26de87816a439b4616
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-gadgets:5.2.x-SNAPSHOT   Confidence:High
  • cpe: cpe:/a:user_dashboard_project:user_dashboard:5.2   Confidence:Low   

platform-component-organization-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-organization/5.2.x-SNAPSHOT/platform-component-organization-5.2.x-SNAPSHOT.jar
MD5: b4c2363068e482189a08a9fe66f6247b
SHA1: 4ec4acda74281ae0f9c2bb12480a6ef1af9ff6f8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-organization:5.2.x-SNAPSHOT   Confidence:High

platform-extension-config-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-extension-config/5.2.x-SNAPSHOT/platform-extension-config-5.2.x-SNAPSHOT.jar
MD5: 3999d6d404757a470521a36830d9ec50
SHA1: fbcf47ebb00efbb9323b9127bffa85214358a159
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-extension-config:5.2.x-SNAPSHOT   Confidence:High

exo.ws.rest.core-5.2.x-SNAPSHOT.jar

Description: Implementation of REST Core for Exoplatform SAS 'Web Services' project.

File Path: /home/ciagent/.m2/repository/org/exoplatform/ws/exo.ws.rest.core/5.2.x-SNAPSHOT/exo.ws.rest.core-5.2.x-SNAPSHOT.jar
MD5: 0cf1aac1d6cd62ef97aac56b5290f4b1
SHA1: f62bde727a6a7b4a74e6b1b5668c3beb22390c32
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:ws_project:ws:5.2.20190113   Confidence:Low   
  • maven: org.exoplatform.ws:exo.ws.rest.core:5.2.x-SNAPSHOT   Confidence:High

redirect-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/gatein/web/redirect/5.2.x-SNAPSHOT/redirect-5.2.x-SNAPSHOT.jar
MD5: 2c7b7f5ec3b62f6894205b457142c46a
SHA1: 719377f0a9252fe0f53e7731b895b6057fef00d8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2014-8304  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in In-Portal CMS 5.2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the next_template parameter to admin/index.php.

Vulnerable Software & Versions:

hibernate-validator-4.2.0.Final.jar

Description: Hibernate's Bean Validation (JSR-303) reference implementation.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-validator/4.2.0.Final/hibernate-validator-4.2.0.Final.jar
MD5: 2b6b64bce7156ca6e9b7f5e6a0a6de7c
SHA1: eac2db0a9d86a9749724fe93d43afffa8106f25e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2014-3558  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

ReflectionHelper (org.hibernate.validator.util.ReflectionHelper) in Hibernate Validator 4.1.0 before 4.2.1, 4.3.x before 4.3.2, and 5.x before 5.1.2 allows attackers to bypass Java Security Manager (JSM) restrictions and execute restricted reflection calls via a crafted application.

Vulnerable Software & Versions: (show all)

platform-sample-acme-intranet-portlet-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-acme-intranet-portlet/5.2.x-SNAPSHOT/platform-sample-acme-intranet-portlet-5.2.x-SNAPSHOT.war
MD5: 27a284a561b77f24eab8139dbf8b2583
SHA1: 61f85b7b240b7ce3d7db2b9254852253a3bae863
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-acme-intranet-portlet:5.2.x-SNAPSHOT   Confidence:High

platform-sample-acme-intranet-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-acme-intranet-webapp/5.2.x-SNAPSHOT/platform-sample-acme-intranet-webapp-5.2.x-SNAPSHOT.war
MD5: efd49e839d1ecf29d9eae0cd34350d5c
SHA1: f4d98cbd59d81e2ab6ce202059f0ed3423ebff2c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-acme-intranet-webapp:5.2.x-SNAPSHOT   Confidence:High

platform-sample-gadgets-sample-exo-gadget-resources-5.2.x-SNAPSHOT.war

Description: eXo gadget resources

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-gadgets-sample-exo-gadget-resources/5.2.x-SNAPSHOT/platform-sample-gadgets-sample-exo-gadget-resources-5.2.x-SNAPSHOT.war
MD5: bf9304386590015fc011380699a195b9
SHA1: 10615f1bfff90bfd722fc9c8b845f380d7da3bdb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-gadgets-sample-exo-gadget-resources:5.2.x-SNAPSHOT   Confidence:High

platform-sample-gadgets-sample-gadgets-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-gadgets-sample-gadgets/5.2.x-SNAPSHOT/platform-sample-gadgets-sample-gadgets-5.2.x-SNAPSHOT.war
MD5: dfbc2102c3a2fe9ff92c68aac2eb038c
SHA1: 4e840e5401c13b02afaca87b52f68ef7175647c8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-gadgets-sample-gadgets:5.2.x-SNAPSHOT   Confidence:High

platform-sample-gadgets-sample-service-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-sample-gadgets-sample-service/5.2.x-SNAPSHOT/platform-sample-gadgets-sample-service-5.2.x-SNAPSHOT.jar
MD5: 0f5fe723e1dcdc12c73776855d4858d1
SHA1: fe623bfd6ba1793685de7e15ffe0bc581faf1ecd
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-sample-gadgets-sample-service:5.2.x-SNAPSHOT   Confidence:High

platform-registration-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-registration/5.2.x-SNAPSHOT/platform-registration-5.2.x-SNAPSHOT.war
MD5: 3454f50468945e64833634c1a53c9483
SHA1: 11b2ed4df6f0447bf45ed7fcc48971f06d2fbc26
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-registration:5.2.x-SNAPSHOT   Confidence:High

platform-ui-skin-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform-ui/platform-ui-skin/5.2.x-SNAPSHOT/platform-ui-skin-5.2.x-SNAPSHOT.war
MD5: 57bf3ad85887c9b42bf633c8e6ba09ea
SHA1: 85a0934241d2adf0857e1008588dc4d7ab57e9e8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform-ui:platform-ui-skin:5.2.x-SNAPSHOT   Confidence:High

plf-root-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/distributions/plf-root-webapp/5.2.x-SNAPSHOT/plf-root-webapp-5.2.x-SNAPSHOT.war
MD5: 8fb0ea98577315df0f58200b553e1591
SHA1: 17c6717b9766f1fa57f96b987c24bc14a09681c8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform.distributions:plf-root-webapp:5.2.x-SNAPSHOT   Confidence:High

social-extension-war-5.2.x-SNAPSHOT.war

Description: eXo Social Extension WAR

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-extension-war/5.2.x-SNAPSHOT/social-extension-war-5.2.x-SNAPSHOT.war
MD5: 5c7dd36451dcc108d77846ca06f985f8
SHA1: 95b6c572bcb56b4a591b25c9008ef6872f034df6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-extension-war:5.2.x-SNAPSHOT   Confidence:High

social-notification-extension-5.2.x-SNAPSHOT.war

Description: eXo Social Notification Extension

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-notification-extension/5.2.x-SNAPSHOT/social-notification-extension-5.2.x-SNAPSHOT.war
MD5: 90debf22a64210d8fd97a3e8157eca69
SHA1: ff81fc8850e9f9799c5247dffa1cb269f600a70c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-notification-extension:5.2.x-SNAPSHOT   Confidence:High

social-component-notification-5.2.x-SNAPSHOT.jar

Description: eXo Social Notification Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-notification/5.2.x-SNAPSHOT/social-component-notification-5.2.x-SNAPSHOT.jar
MD5: e4f5d9727faa9264dbaf3ba1a44ed40d
SHA1: 7667289534e6048727aae745a3c6d14f8be72543
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-notification:5.2.x-SNAPSHOT   Confidence:High

social-component-core-jpa-5.2.x-SNAPSHOT.jar

Description: eXo Social Core JPA Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-core-jpa/5.2.x-SNAPSHOT/social-component-core-jpa-5.2.x-SNAPSHOT.jar
MD5: 5e1f8995105e5669e8d98fe55820a32f
SHA1: c251772f43f23a0f288cb1107e829297b7c344c8
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-core-jpa:5.2.x-SNAPSHOT   Confidence:High

social-extras-feedmash-5.2.x-SNAPSHOT.jar

Description: eXo Social Feedmash

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-extras-feedmash/5.2.x-SNAPSHOT/social-extras-feedmash-5.2.x-SNAPSHOT.jar
MD5: aa1e99aeb97f13c6b50704fc18c87bce
SHA1: e679296e5da5899a9ed15f9124a4c4ebcac54f14
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-extras-feedmash:5.2.x-SNAPSHOT   Confidence:High

oauth-20100527.jar

File Path: /home/ciagent/.m2/repository/net/oauth/core/oauth/20100527/oauth-20100527.jar
MD5: 91c7c70579f95b7ddee95b2143a49b41
SHA1: a84c5331e225bc25a5a288db328048d6b1bb6fd5
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

social-component-opensocial-5.2.x-SNAPSHOT.jar

Description: eXo Social OpenSocial Component

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-component-opensocial/5.2.x-SNAPSHOT/social-component-opensocial-5.2.x-SNAPSHOT.jar
MD5: f3a7377ee8a4cfa26cd80aa530a961ee
SHA1: 81b52232d686643a6a0ac11bf96a97ac03721d43
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-component-opensocial:5.2.x-SNAPSHOT   Confidence:High

joda-time-2.4.jar

Description: Date and time library to replace JDK date handling

License:

Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/joda-time/joda-time/2.4/joda-time-2.4.jar
MD5: 1231c3e09de6aa5d6b6d9982c0224e20
SHA1: 89e9725439adffbbd41c5f5c215c136082b34a7f
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

ehcache-core-2.6.9.jar

Description: This is the ehcache core module. Pair it with other modules for added functionality.

License:

The Apache Software License, Version 2.0: src/assemble/EHCACHE-CORE-LICENSE.txt
File Path: /home/ciagent/.m2/repository/net/sf/ehcache/ehcache-core/2.6.9/ehcache-core-2.6.9.jar
MD5: 521348c6da7c20dba2058917a6a8c0a9
SHA1: e892585cc2cf95d46a2533df438a1d3323034ae8
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

juel-impl-2.2.7.jar

File Path: /home/ciagent/.m2/repository/de/odysseus/juel/juel-impl/2.2.7/juel-impl-2.2.7.jar
MD5: c5d7a62edafb5706b6beadbbcfd8f57d
SHA1: 97958467acef4c2b230b72354a4eefc66628dd99
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

shindig-common-2.5.2.jar

Description: Common java code for Shindig

File Path: /home/ciagent/.m2/repository/org/apache/shindig/shindig-common/2.5.2/shindig-common-2.5.2.jar
MD5: 9deeebec74d0530849d5dd42e19ee9cd
SHA1: 8e3d0ee31607e7a18f20612ef705b32ab8eace2b
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

caja-r5054.jar

Description:  Caja is a HTML/CSS/JavaScript compiler which allows websites to safely embed web applications from third parties, and enables rich interaction between the embedding page and the embedded applications using an object-capability security model.

License:

Apache 2.0: http://www.apache.org/licenses/LICENSE-2.0.html
File Path: /home/ciagent/.m2/repository/caja/caja/r5054/caja-r5054.jar
MD5: 7379ecf5bc7945ca6ab533b905e449a3
SHA1: 18b47afa0172413346d9c8ae1595b6ffbbddd499
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: com.google.caja:caja:r5054   Confidence:High

htmlparser-r4209.jar

Description:  A patched version of the nu.validator v1.2.1 HTML parser.

License:

No Warranty
File Path: /home/ciagent/.m2/repository/caja/htmlparser/r4209/htmlparser-r4209.jar
MD5: 31c18bc52991e53ed4eaa28347c44189
SHA1: 0573217e5c9bf8fad6ce827a94191ca0f5785087
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: caja:htmlparser:r4209   Confidence:High

nekohtml-1.9.22.jar

Description: An HTML parser and tag balancer.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.22/nekohtml-1.9.22.jar
MD5: a97dfe2d0ceb81ffbdd15436961b0f23
SHA1: 4f54af68ecb345f2453fb6884672ad08414154e3
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

xercesImpl-2.9.1.jar

Description:  Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program.

File Path: /home/ciagent/.m2/repository/xerces/xercesImpl/2.9.1/xercesImpl-2.9.1.jar
MD5: f807f86d7d9db25edbfc782aca7ca2a9
SHA1: 7bc7e49ddfe4fb5f193ed37ecc96c12292c8ceb6
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: xerces:xercesImpl:2.9.1    Confidence:Highest
  • cpe: cpe:/a:apache:xerces2_java:2.9.1   Confidence:Low   

CVE-2012-0881  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.

Vulnerable Software & Versions:

sanselan-0.97-incubator.jar

Description: Apache Sanselan is a pure-Java image library.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/sanselan/sanselan/0.97-incubator/sanselan-0.97-incubator.jar
MD5: 84f823e61d93fcedcb3c10a827c45989
SHA1: 8396778b076a2eaf62024b64f6d924e4e0095fca
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

social-webapp-portlet-5.2.x-SNAPSHOT.war

Description: eXo Social Portlet Web App

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-webapp-portlet/5.2.x-SNAPSHOT/social-webapp-portlet-5.2.x-SNAPSHOT.war
MD5: b6e6b4c95eb76c23d4eb0c3fdaccf759
SHA1: 212232997aff521a269be4e663e9c9c24b2edab4
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:app_project:app:5.2   Confidence:Low   
  • maven: org.exoplatform.social:social-webapp-portlet:5.2.x-SNAPSHOT   Confidence:High

CVE-2018-13661  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-190 Integer Overflow or Wraparound

The mintToken function of a smart contract implementation for APP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.

Vulnerable Software & Versions:

social-webapp-juzu-portlet-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/social/social-webapp-juzu-portlet/5.2.x-SNAPSHOT/social-webapp-juzu-portlet-5.2.x-SNAPSHOT.war
MD5: 99ae0be443897916e9d46e3100f7b71e
SHA1: 0645a59fe2c645246675d3cad313ddcb9ef41580
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.social:social-webapp-juzu-portlet:5.2.x-SNAPSHOT   Confidence:High

wiki-upgrade-plugins-5.2.x-SNAPSHOT.jar

Description: eXo Wiki Upgrade Plugins

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-upgrade-plugins/5.2.x-SNAPSHOT/wiki-upgrade-plugins-5.2.x-SNAPSHOT.jar
MD5: 0c38639cfabb00b49223db99ee6047ad
SHA1: 0c11e37efe299443d1878ba6403946e542a71980
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-upgrade-plugins:5.2.x-SNAPSHOT   Confidence:High

wiki-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-webapp/5.2.x-SNAPSHOT/wiki-webapp-5.2.x-SNAPSHOT.war
MD5: 589ac4decff9e628c3cf8818cdde3cdc
SHA1: 6e05ea15299ef9f833150ab38dcd1162f9eb19f1
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-webapp:5.2.x-SNAPSHOT   Confidence:High

gwt-servlet-2.6.1.jar

Description:  Protocol Buffers are a way of encoding structured data in an efficient yet extensible format.

License:

New BSD license: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/com/google/gwt/gwt-servlet/2.6.1/gwt-servlet-2.6.1.jar
MD5: 46fa19a4859520cdf86c083e4c4519a4
SHA1: 983e26ec957ee3463f8554f4f03a58e16129e8f2
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

smartgwt-lgpl-6.0-p20170514.jar

File Path: /home/ciagent/.m2/repository/com/isomorphic/smartgwt/lgpl/smartgwt-lgpl/6.0-p20170514/smartgwt-lgpl-6.0-p20170514.jar
MD5: feef4d7601d4e2ca9cfdaa5315eb17c6
SHA1: b27485a980eca557785290c25f15349075e077b7
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2015-6737  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the Widgets extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via vectors involving base64 encoded content.

Vulnerable Software & Versions:

jcommon-1.0.17.jar

Description:  JCommon is a free general purpose Java class library that is used in several projects at www.jfree.org, including JFreeChart and JFreeReport.

License:

GNU Lesser General Public Licence: http://www.gnu.org/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/org/jfree/jcommon/1.0.17/jcommon-1.0.17.jar
MD5: d123cd511e2ebc4542e8b424cd20bbde
SHA1: 7bcb68fde08258e59fe7bcc758c08af830fb2c1d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jfreechart-1.0.14.jar

Description:  JFreeChart is a class library, written in Java, for generating charts. Utilising the Java2D APIs, it currently supports bar charts, pie charts, line charts, XY-plots and time series plots.

License:

GNU Lesser General Public Licence: http://www.gnu.org/licenses/lgpl.txt
File Path: /home/ciagent/.m2/repository/org/jfree/jfreechart/1.0.14/jfreechart-1.0.14.jar
MD5: e0ac6e8ecb858f946200b326209fe639
SHA1: fa67c798b0ae80b84f3854d69e341abacd3867c5
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

velocity-1.7.jar

Description: Apache Velocity is a general purpose template engine.

File Path: /home/ciagent/.m2/repository/org/apache/velocity/velocity/1.7/velocity-1.7.jar
MD5: 3692dd72f8367cb35fb6280dc2916725
SHA1: 2ceb567b8f3f21118ecdec129fe1271dbc09aa7a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

velocity-tools-1.4.jar

File Path: /home/ciagent/.m2/repository/velocity-tools/velocity-tools/1.4/velocity-tools-1.4.jar
MD5: 2ef7ed8b728186558b5d587c38900b84
SHA1: 4e1f4d507030a00959f4c0c7fcc60b3565617d08
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

ezmorph-1.0.6.jar

Description:  Simple java library for transforming an Object to another Object.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/net/sf/ezmorph/ezmorph/1.0.6/ezmorph-1.0.6.jar
MD5: 1fa113c6aacf3a01af1449df77acd474
SHA1: 01e55d2a0253ea37745d33062852fd2c90027432
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

json-lib-2.4-jdk15.jar

File Path: /home/ciagent/.m2/repository/net/sf/json-lib/json-lib/2.4/json-lib-2.4-jdk15.jar
MD5: f5db294d05b3d5a5bfb873455b0a8626
SHA1: 136743e0d12df4e785e62b48618cee169b2ae546
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

commons-configuration-1.10.jar

Description: Tools to assist in the reading of configuration/preferences files in various formats.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/commons-configuration/commons-configuration/1.10/commons-configuration-1.10.jar
MD5: b16511ce540fefd53981245f5f21c5f8
SHA1: 2b36e4adfb66d966c5aef2d73deb6be716389dc9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

snuggletex-core-1.1.0.jar

File Path: /home/ciagent/.m2/repository/uk/ac/ed/ph/snuggletex/snuggletex-core/1.1.0/snuggletex-core-1.1.0.jar
MD5: 1ea61a45bcb155a830d6a149f9f3f845
SHA1: 668865eca57ae9765b042558bc95522763333b70
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: uk.ac.ed.ph.snuggletex:snuggletex-core:1.1.0   Confidence:High

batik-css-1.7.jar

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/xmlgraphics/batik-css/1.7/batik-css-1.7.jar
MD5: b0203e64b3c06729baa0ef84743ab119
SHA1: e6bb5c85753331534593f33fb9236acb41a0ab79
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

CVE-2017-5662  

Severity: High
CVSS Score: 7.9 (AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

Vulnerable Software & Versions:

CVE-2018-8013  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

Vulnerable Software & Versions: (show all)

xmlgraphics-commons-1.3.1.jar

Description:  Apache XML Graphics Commons is a library that consists of several reusable components used by Apache Batik and Apache FOP. Many of these components can easily be used separately outside the domains of SVG and XSL-FO.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/xmlgraphics/xmlgraphics-commons/1.3.1/xmlgraphics-commons-1.3.1.jar
MD5: e63589601d939739349a50a029dab120
SHA1: f7d0fa54e2750acd82b1a241c043be6fce1bf0dc
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jeuclid-core-3.1.5.jar

Description: This is the core module containing the basic JEuclid rendering and document handling classes.

File Path: /home/ciagent/.m2/repository/net/sourceforge/jeuclid/jeuclid-core/3.1.5/jeuclid-core-3.1.5.jar
MD5: ef55609690f186df77611d25e79ae781
SHA1: e7b45abc13ba621b384b475ff6d10aa13e121b02
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

snuggletex-jeuclid-1.1.0.jar

File Path: /home/ciagent/.m2/repository/uk/ac/ed/ph/snuggletex/snuggletex-jeuclid/1.1.0/snuggletex-jeuclid-1.1.0.jar
MD5: 4b84195d37d3ad1ece60e9abb56e9bf7
SHA1: 14c790c08d2ca60b9067b5fd156ba01c83f25a3e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: uk.ac.ed.ph.snuggletex:snuggletex-jeuclid:1.1.0   Confidence:High

serializer-2.7.1.jar

Description:  Serializer to write out XML, HTML etc. as a stream of characters from an input DOM or from input SAX events.

File Path: /home/ciagent/.m2/repository/xalan/serializer/2.7.1/serializer-2.7.1.jar
MD5: a6b64dfe58229bdd810263fa0cc54cff
SHA1: 4b4b18df434451249bb65a63f2fb69e215a6a020
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

xalan-2.7.1.jar

Description:  Xalan-Java is an XSLT processor for transforming XML documents into HTML, text, or other XML document types. It implements XSL Transformations (XSLT) Version 1.0 and XML Path Language (XPath) Version 1.0 and can be used from the command line, in an applet or a servlet, or as a module in other program.

File Path: /home/ciagent/.m2/repository/xalan/xalan/2.7.1/xalan-2.7.1.jar
MD5: d43aad24f2c143b675292ccfef487f9c
SHA1: 75f1d83ce27bab5f29fff034fc74aa9f7266f22a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

wiki-jpa-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-jpa/5.2.x-SNAPSHOT/wiki-jpa-5.2.x-SNAPSHOT.jar
MD5: c55d49c5aae05fdea0c1813b3067bc66
SHA1: 17911075d749b25b10b811394d46f453ea1b9812
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-jpa:5.2.x-SNAPSHOT   Confidence:High

wiki-jpa-migration-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/wiki/wiki-jpa-migration/5.2.x-SNAPSHOT/wiki-jpa-migration-5.2.x-SNAPSHOT.jar
MD5: 2186867ed6de0fea84b87daa7e8fb6d5
SHA1: 4afbb3cc1280b4001697e58ce00a38cd7020da58
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.wiki:wiki-jpa-migration:5.2.x-SNAPSHOT   Confidence:High

gatein-management-api-2.1.0.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/management/gatein-management-api/2.1.0.Final/gatein-management-api-2.1.0.Final.jar
MD5: dde253e45fefd580cab7a4ee75c6d92e
SHA1: 5c73b152fe9497eb37386052f86bfa7ee7d33b87
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.management:gatein-management-api:2.1.0.Final   Confidence:High

jboss-dmr-1.1.1.Final.jar

File Path: /home/ciagent/.m2/repository/org/jboss/jboss-dmr/1.1.1.Final/jboss-dmr-1.1.1.Final.jar
MD5: d64cccf4531ef61115e70f3d8bb5e2e2
SHA1: 7506200d32c2bb0833969ab13e8a0e4795853198
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

gatein-management-core-2.1.0.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/management/gatein-management-core/2.1.0.Final/gatein-management-core-2.1.0.Final.jar
MD5: a03a655d42f401bc4eca6c95242808aa
SHA1: 146d88fc22a8c25021c62da29f6ec3b51aa1338f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.management:gatein-management-core:2.1.0.Final   Confidence:High

gatein-management-rest-2.1.0.Final.jar

File Path: /home/ciagent/.m2/repository/org/gatein/management/gatein-management-rest/2.1.0.Final/gatein-management-rest-2.1.0.Final.jar
MD5: 77edd585db54a9c915b1c4a8241bf890
SHA1: e818a46b6f5b74c05a6e181c3ae9ea409b20109f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.management:gatein-management-rest:2.1.0.Final   Confidence:High

twitter4j-core-3.0.5.jar

Description: A Java library for the Twitter API

License:

Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: /home/ciagent/.m2/repository/org/twitter4j/twitter4j-core/3.0.5/twitter4j-core-3.0.5.jar
MD5: e6c8d2b10c621b2bbd7809bad9cedca3
SHA1: c38ad47bc8ba5991886ce2c0e0acd76d0fdd6e6d
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:twitter_project:twitter:3.0.5   Confidence:Low   
  • maven: org.twitter4j:twitter4j-core:3.0.5    Confidence:Highest
  • cpe: cpe:/a:twitter:twitter:3.0.5   Confidence:Low   

scribe-1.3.5.jar

Description: The best OAuth library out there

License:

MIT: http://github.com/fernandezpablo85/scribe-java/blob/master/LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/scribe/scribe/1.3.5/scribe-1.3.5.jar
MD5: 0abb910da19741cd84aabf5520385bc2
SHA1: a3b3deded9d241d9f2c8aa9c9bcd90ad29e2581e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:scribe:scribe:1.3.5   Confidence:Low   
  • maven: org.scribe:scribe:1.3.5    Confidence:Highest

google-http-client-1.14.1-beta.jar

Description:  Google HTTP Client Library for Java. Functionality that works on all supported Java platforms, including Java 5 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.

File Path: /home/ciagent/.m2/repository/com/google/http-client/google-http-client/1.14.1-beta/google-http-client-1.14.1-beta.jar
MD5: 8a3711522ebceef2531d455e2f04a639
SHA1: cb503d4021739e6bac39442ac87b4e311ec77b5e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jsr305-1.3.9.jar

Description: JSR305 Annotations for Findbugs

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar
MD5: 1d5a772e400b04bb67a7ef4a0e0996d8
SHA1: 40719ea6961c0cb6afaeb6a921eaa1f6afd4cfdf
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

google-oauth-client-1.14.1-beta.jar

Description:  Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 5 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.

File Path: /home/ciagent/.m2/repository/com/google/oauth-client/google-oauth-client/1.14.1-beta/google-oauth-client-1.14.1-beta.jar
MD5: 71feea1d54eb7878c12855b7c47ef289
SHA1: 7260cd30808a6d1d4ddef6250e3d92d814aaa4cb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

google-api-client-1.14.1-beta.jar

File Path: /home/ciagent/.m2/repository/com/google/api-client/google-api-client/1.14.1-beta/google-api-client-1.14.1-beta.jar
MD5: 6832804471d4d635ed74ae1fbd5d9d86
SHA1: e95d3b6e36fc67bffd7e71ef60bc5af623e73843
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jackson-core-asl-1.9.11.jar

Description: Jackson is a high-performance JSON processor (parser, generator)

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/codehaus/jackson/jackson-core-asl/1.9.11/jackson-core-asl-1.9.11.jar
MD5: 49801a6d43725d5c3a1a52ca021d7dc5
SHA1: e32303ef8bd18a5c9272780d49b81c95e05ddf43
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

google-http-client-jackson-1.14.1-beta.jar

File Path: /home/ciagent/.m2/repository/com/google/http-client/google-http-client-jackson/1.14.1-beta/google-http-client-jackson-1.14.1-beta.jar
MD5: 85d9f42910a68e85ff22d24805688da9
SHA1: 3cfc08bf4b0f62234ff69ff2a0b3c26d7e447829
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

google-api-services-plus-v1-rev69-1.14.2-beta.jar

File Path: /home/ciagent/.m2/repository/com/google/apis/google-api-services-plus/v1-rev69-1.14.2-beta/google-api-services-plus-v1-rev69-1.14.2-beta.jar
MD5: fbddf71619f41f1359f0b3abff442444
SHA1: a6c5cc69690a3bd7777025a65b0f1abe66112a5e
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

google-api-services-oauth2-v2-rev36-1.14.2-beta.jar

File Path: /home/ciagent/.m2/repository/com/google/apis/google-api-services-oauth2/v2-rev36-1.14.2-beta/google-api-services-oauth2-v2-rev36-1.14.2-beta.jar
MD5: cd2ac31ad0317e53e660c2a4578749f3
SHA1: c7249e1e4832f6e6585f7b7db307585b3ae53881
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

platform-component-oauth-auth-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-oauth-auth/5.2.x-SNAPSHOT/platform-component-oauth-auth-5.2.x-SNAPSHOT.jar
MD5: a3281ee8b01b31c2b6a72a1f2067cfdf
SHA1: 305193231b7bfeec125164b306a8c52f81844493
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-oauth-auth:5.2.x-SNAPSHOT   Confidence:High

pc-portlet-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/pc/pc-portlet/5.2.x-SNAPSHOT/pc-portlet-5.2.x-SNAPSHOT.jar
MD5: 6f25e13a9de2d120ff36e267d48e1228
SHA1: 8a067c3d188d76c9a94163fd628eef7a28137166
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.gatein.pc:pc-portlet:5.2.x-SNAPSHOT   Confidence:High

gatein-cdi-injection-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/gatein/cdi/gatein-cdi-injection/5.2.x-SNAPSHOT/gatein-cdi-injection-5.2.x-SNAPSHOT.jar
MD5: b36bf5166b83c7a921d0fa4a555fbf14
SHA1: b6347671c5605e945b67c9f7088b9034dbe78d2f
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.cdi:gatein-cdi-injection:5.2.x-SNAPSHOT   Confidence:High

gatein-cdi-contexts-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/gatein/cdi/gatein-cdi-contexts/5.2.x-SNAPSHOT/gatein-cdi-contexts-5.2.x-SNAPSHOT.jar
MD5: ce556cb685c3fec124a64adcc5fff7d5
SHA1: 790e87fbadd1df93ee5ec9988a6d63bb25d8c571
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.gatein.cdi:gatein-cdi-contexts:5.2.x-SNAPSHOT   Confidence:High

platform-component-edition-community-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/platform-component-edition-community/5.2.x-SNAPSHOT/platform-component-edition-community-5.2.x-SNAPSHOT.jar
MD5: 3612c5573a3f31ad4761e75522245b96
SHA1: a4aea612eb6e7bb8b35ea98a2c426dc910a97d58
Referenced In Project/Scope: eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform:platform-component-edition-community:5.2.x-SNAPSHOT   Confidence:High

logback-core-1.1.2.jar

Description: logback-core module

License:

Eclipse Public License - v 1.0: http://www.eclipse.org/legal/epl-v10.html
GNU Lesser General Public License: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
File Path: /home/ciagent/.m2/repository/ch/qos/logback/logback-core/1.1.2/logback-core-1.1.2.jar
MD5: ae3b1f69540d87c5bb68260818764fe3
SHA1: 2d23694879c2c12f125dac5076bdfd5d771cc4cb
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2017-5929  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.

Vulnerable Software & Versions:

commons-compiler-2.6.1.jar

File Path: /home/ciagent/.m2/repository/org/codehaus/janino/commons-compiler/2.6.1/commons-compiler-2.6.1.jar
MD5: 502720f1e3cb359c54f794b718cc8b73
SHA1: f81764c6e9199c3ba1b2c525408734c45e772494
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

janino-2.6.1.jar

File Path: /home/ciagent/.m2/repository/org/codehaus/janino/janino/2.6.1/janino-2.6.1.jar
MD5: 88f965703a684a89f42094bfc20113eb
SHA1: 454255eb300ab38db19dd23c1f7ba5168bb646ab
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

plf-tomcat-integration-webapp-5.2.x-SNAPSHOT.war

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/distributions/plf-tomcat-integration-webapp/5.2.x-SNAPSHOT/plf-tomcat-integration-webapp-5.2.x-SNAPSHOT.war
MD5: ad130a8612e58614164fe72452cb869d
SHA1: e98381825dc76ade8270dfd549753aaab388f42d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform.distributions:plf-tomcat-integration-webapp:5.2.x-SNAPSHOT   Confidence:High

plf-tomcat-pc-creator-listener-5.2.x-SNAPSHOT.jar

Description: This module defines a LifecycleListener to attach to a Tomcat host to create all portal containers.

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/distributions/plf-tomcat-pc-creator-listener/5.2.x-SNAPSHOT/plf-tomcat-pc-creator-listener-5.2.x-SNAPSHOT.jar
MD5: fde38564435ec0fd8797ebaf35fb1d9a
SHA1: 48c8679e279a0e0500cfe9296a3b46d5a5ac2e55
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.platform.distributions:plf-tomcat-pc-creator-listener:5.2.x-SNAPSHOT   Confidence:High

jansi-1.11.jar

Description: Jansi is a java library for generating and interpreting ANSI escape sequences.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/fusesource/jansi/jansi/1.11/jansi-1.11.jar
MD5: e8bd19df14afe8a0f4e2a44d57c0cd8b
SHA1: 655c643309c2f45a56a747fda70e3fadf57e9f11
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

hsqldb-2.4.0.jar

Description: HSQLDB - Lightweight 100% Java SQL Database Engine

License:

HSQLDB License, a BSD open source license: http://hsqldb.org/web/hsqlLicense.html
File Path: /home/ciagent/.m2/repository/org/hsqldb/hsqldb/2.4.0/hsqldb-2.4.0.jar
MD5: 72cae1d3ef411edc74bc3ff4d12bd47c
SHA1: 195957160ed990dbc798207c0d577280d9919208
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jul-to-slf4j-1.7.7.jar

Description: JUL to SLF4J bridge

File Path: /home/ciagent/.m2/repository/org/slf4j/jul-to-slf4j/1.7.7/jul-to-slf4j-1.7.7.jar
MD5: 151a2a6f7f3fff8f5e5324659f6ccdbb
SHA1: def21bc1a6e648ee40b41a84f1db443132913105
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

log4j-over-slf4j-1.7.7.jar

Description: Log4j implemented over SLF4J

License:

Apache Software Licenses: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/slf4j/log4j-over-slf4j/1.7.7/log4j-over-slf4j-1.7.7.jar
MD5: 93ab42a5216afd683c35988c6b6fc3d8
SHA1: d521cb26a9c4407caafcec302e7804b048b07cea
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

liquibase-slf4j-2.0.0.jar

Description: Liquibase SLF4J Logger

License:

MIT License: http://www.opensource.org/licenses/mit-license.html
File Path: /home/ciagent/.m2/repository/com/mattbertolini/liquibase-slf4j/2.0.0/liquibase-slf4j-2.0.0.jar
MD5: c0de626cfee6e91f2fe3f28aca48a6f9
SHA1: 15d0d15b546ef66caf3385a3c13aeb75663b3ba4
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

snakeyaml-1.13.jar

Description: YAML 1.1 parser and emitter for Java

License:

Apache License Version 2.0: LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/yaml/snakeyaml/1.13/snakeyaml-1.13.jar
MD5: 88e239ab48632e2eab576ee86f56c47e
SHA1: 73cbb494a912866c4c831a178c3a2a9169f4eaad
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

plf-exo-tools-5.2.x-SNAPSHOT.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/distributions/plf-exo-tools/5.2.x-SNAPSHOT/plf-exo-tools-5.2.x-SNAPSHOT.jar
MD5: a20b5bbd6d2918e5455d7c92e2d18344
SHA1: ee38f21e7b56d733223000cf55549eed62add145
Referenced In Project/Scope: eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:form_tools:form_tools:5.2   Confidence:Low   
  • maven: org.exoplatform.platform.distributions:plf-exo-tools:5.2.x-SNAPSHOT   Confidence:High

exo-lgpl-license-resource-bundle-2.jar

Description: Header Texts and others License resources

File Path: /home/ciagent/.m2/repository/org/exoplatform/resources/exo-lgpl-license-resource-bundle/2/exo-lgpl-license-resource-bundle-2.jar
MD5: 51f6110e482a3bb59e2920e61284f440
SHA1: 5e0e93e2f9d4a62747ed8642dda37799644061fc
Referenced In Project/Scope: eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: org.exoplatform.resources:exo-lgpl-license-resource-bundle:2   Confidence:High

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar
MD5: 5aa69e6ed0bc5b6154ae6b91999abe10
SHA1: 678049cf38abee0b149e5052b9d93b87a083cc4a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Shared Resources:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:form_manager_project:form_manager:1.4   Confidence:Low   

jcr-parent-5.2.x-SNAPSHOT-source-release.zip: standard.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/jcr-parent/5.2.x-SNAPSHOT/jcr-parent-5.2.x-SNAPSHOT-source-release.zip/jcr-parent-5.2.x-SNAPSHOT/applications/exo.jcr.applications.browser/src/main/webapp/WEB-INF/lib/standard.jar
MD5: 65351d0487ad57edda9171bb3b46b98c
SHA1: a17e8a4d9a1f7fcc5eed606721c9ed6b7f18acf7
Referenced In Project/Scope: eXo PLF:: Platform Public Distributions - Sources:compile

Identifiers

  • maven: taglibs:standard:1.1.2    Confidence:Highest
  • cpe: cpe:/a:apache:standard_taglibs:1.1.2   Confidence:Low   

CVE-2015-0254  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.

Vulnerable Software & Versions:

jcr-parent-5.2.x-SNAPSHOT-source-release.zip: jstl.jar

File Path: /home/ciagent/.m2/repository/org/exoplatform/jcr/jcr-parent/5.2.x-SNAPSHOT/jcr-parent-5.2.x-SNAPSHOT-source-release.zip/jcr-parent-5.2.x-SNAPSHOT/applications/exo.jcr.applications.browser/src/main/webapp/WEB-INF/lib/jstl.jar
MD5: c2ced5f8505fe9d1cae685201e9cba07
SHA1: 3375e43c620df4f1114959400ff9bb90d12a2feb
Referenced In Project/Scope: eXo PLF:: Platform Public Distributions - Sources:compile

Identifiers

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar: jansi.dll

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/native/windows64/jansi.dll
MD5: fd3a20891286c958103f3ea07174cd3c
SHA1: 829195c9e338d5725cf304ae33fc209db53884eb
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Shared Resources:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar: jansi.dll

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/native/windows32/jansi.dll
MD5: 1e56641bb68937f8e2020cbff5d04a08
SHA1: 97f6e12599bb5848867b9762184d055ed918ab2a
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Shared Resources:compile
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: wininst-7.1.exe

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/Lib/distutils/command/wininst-7.1.exe
MD5: 60ca8d5d30a48745d2918fc59f663d82
SHA1: f1eceea0200b381e8df1bd21febe4d86216d3a9d
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: wininst-6.exe

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/Lib/distutils/command/wininst-6.exe
MD5: 2af1ae03a9ada576bbf62fab00b69be9
SHA1: 0f042eb468c23b791446c1594f8f3bb5023eea36
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: jffi-1.0.dll

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/jni/x86_64-Windows/jffi-1.0.dll
MD5: 63e4285e98616f329c88d741ca6f65e8
SHA1: 966259febd6c05d8287b7dd75be57bfcd77fd400
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: jffi-1.0.dll

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/jni/i386-Windows/jffi-1.0.dll
MD5: 570f7ce3eae96b92eb4aab891c076b50
SHA1: c35b34b1cf7a20c0478d34bcfbde3d75905a8b19
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: jline32.dll

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/jline/jline32.dll
MD5: b3d9a08ff70440ba3638a325512f2cd8
SHA1: 67a55d8f8ca4937d784d4334e554770adc2a1079
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

jython-standalone-2.5.4-rc1.jar: jline64.dll

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/jline/jline64.dll
MD5: d2f7b0db1231aac1846a857f5c0c4f2c
SHA1: e297e4e990ce820e64d41f3f27b9be90283f3f96
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:runtime
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

ehcache-core-2.6.9.jar: sizeof-agent.jar

File Path: /home/ciagent/.m2/repository/net/sf/ehcache/ehcache-core/2.6.9/ehcache-core-2.6.9.jar/net/sf/ehcache/pool/sizeof/sizeof-agent.jar
MD5: 5ad919b3ac0516897bdca079c9a222a8
SHA1: e86399a80ae6a6c7a563717eaa0ce9ba4708571c
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • maven: net.sf.ehcache:sizeof-agent:1.0.1   Confidence:High

smartgwt-lgpl-6.0-p20170514.jar: isomorphic_applets.jar

File Path: /home/ciagent/.m2/repository/com/isomorphic/smartgwt/lgpl/smartgwt-lgpl/6.0-p20170514/smartgwt-lgpl-6.0-p20170514.jar/com/smartclient/public/sc/system/helpers/isomorphic_applets.jar
MD5: 0f754cb070377f2176d66ab61c1adafe
SHA1: b1cfc819d68ad2ecb419ce92f2c36bfceebf0d09
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

exo.portal.gadgets-server-5.2.x-SNAPSHOT.war: jcr-1.0.jar

Description: Content Repository for Java technology API. Specifies a standard API to access content repositories in JavaTM 2 independently of implementation.

License:

Day Specification License: http://www.day.com/maven/jsr170/licenses/day-spec-license.htm
Day Specification License addendum: http://www.day.com/maven/jsr170/jars/LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/portal/exo.portal.gadgets-server/5.2.x-SNAPSHOT/exo.portal.gadgets-server-5.2.x-SNAPSHOT.war/WEB-INF/lib/jcr-1.0.jar
MD5: 16a1892a7b1e4553f6ce08d800d15687
SHA1: 86b984b459383c8d4ba911785afef426be8fca7e
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:content_project:content:1.0   Confidence:Low   
  • maven: javax.jcr:jcr:1.0    Confidence:Highest

CVE-2017-16111  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

The content module is a module to parse HTTP Content-* headers. It is used by the hapijs framework to provide this functionality. The module is vulnerable to regular expression denial of service when passed a specifically crafted Content-Type or Content-Disposition header.

Vulnerable Software & Versions:

exo.portal.gadgets-server-5.2.x-SNAPSHOT.war: slf4j-api-1.7.5.jar

Description: The slf4j API

File Path: /home/ciagent/.m2/repository/org/exoplatform/gatein/portal/exo.portal.gadgets-server/5.2.x-SNAPSHOT/exo.portal.gadgets-server-5.2.x-SNAPSHOT.war/WEB-INF/lib/slf4j-api-1.7.5.jar
MD5: 3b1ececad9ebc3fbad2953ccf4a070ca
SHA1: 6b262da268f8ad9eff941b25503a9198f0a0ac93
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Dependencies:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

tomcat-8.5.35.zip: taglibs-standard-impl-1.2.5.jar

Description:  An implementation of the JSP Standard Tag Library (JSTL).

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/webapps/examples/WEB-INF/lib/taglibs-standard-impl-1.2.5.jar
MD5: 8e5c8db242fbef3db1acfcbb3bc8ec8b
SHA1: 9b9783ccb2a323383e6e20e36d368f8997b71967
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

tomcat-8.5.35.zip: sample.war

File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/webapps/docs/appdev/sample/sample.war
MD5: 570f196c4a1025a717269d16d11d6f37
SHA1: 80f5053b166c69d81697ba21113c673f8372aca0
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • None

tomcat-8.5.35.zip: bootstrap.jar

File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/bin/bootstrap.jar
MD5: f3940fdc1b7cf81fee43d6963a4d3740
SHA1: 394ae5d3d92b3c7717c26d529729145c53149a22
Referenced In Projects/Scopes:

  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

  • cpe: cpe:/a:apache_software_foundation:tomcat:8.5.35   Confidence:Low   
  • cpe: cpe:/a:apache:tomcat:8.5.35   Confidence:Low   

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: commons-daemon.jar

Description:  Apache Commons Daemon software provides an alternative invocation mechanism for unix-daemon-like Java code.

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/bin/commons-daemon.jar
MD5: 6c64006960a9b6b449c32e6ad1b39b1e
SHA1: 96f07daacf0a3c832c47ac6b4052363fe43db9a1
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

tomcat-8.5.35.zip: websocket-api.jar

Description: WebSocket (JSR356) API

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/websocket-api.jar
MD5: 90dd0ad5e70b145083eee93eadf4c85d
SHA1: b5054013b7683c51e3843d4825b0ebebceb01360
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: jasper.jar

Description: Tomcats JSP Parser

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/jasper.jar
MD5: d961549ca96e11902a2906581744cb8d
SHA1: 40f8bea78fd54a3b9ce828b95c2247be4a8fbb64
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: catalina-ha.jar

Description: Tomcat High Availability Implementation

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/catalina-ha.jar
MD5: dcaa0641aed4554242655f9df769867a
SHA1: d533b5ecdcd30d1477078b248e9516ad1cf50fc6
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: tomcat-i18n-fr.jar

Description: French translations

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/tomcat-i18n-fr.jar
MD5: edd52f2e4eb4c7048ae099c163d43194
SHA1: ed332ceecf91573947433af082ac1d25f0776ede
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2017-6056  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-19 Data Handling

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Software & Versions:

tomcat-8.5.35.zip: ecj-4.6.3.jar

Description: Eclipse Compiler for Java(TM)

License:

Eclipse Public License: http://www.eclipse.org/legal/epl-v10.html
File Path: /home/ciagent/.m2/repository/org/apache/tomcat/tomcat/8.5.35/tomcat-8.5.35.zip/apache-tomcat-8.5.35/lib/ecj-4.6.3.jar
MD5: 33e190a0f0745306de54fba90f381fc3
SHA1: ade950992eb3caf6ab4f1a88706c755f0bf213d9
Referenced In Projects/Scopes:
  • eXo PLF:: Platform Public Distributions - Tomcat Resources:compile
  • eXo PLF:: Platform Public Distributions - Community Tomcat Standalone:provided

Identifiers

jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/com.fasterxml.jackson.dataformat/jackson-dataformat-yaml/pom.xml

Description: Support for reading and writing YAML-encoded data via Jackson abstractions.

File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/dataformat/jackson-dataformat-yaml/2.4.2/jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/com.fasterxml.jackson.dataformat/jackson-dataformat-yaml/pom.xml
MD5: 287aac9a700de46369cc0e327e3577bc
SHA1: da124b77ecdec56e2af7ef65828ec493590ab214

Identifiers

  • maven: com.fasterxml.jackson.dataformat:jackson-dataformat-yaml:2.4.2   Confidence:High
  • cpe: cpe:/a:fasterxml:jackson:2.4.2   Confidence:Low   

jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/org.yaml/snakeyaml/pom.xml

Description: YAML 1.1 parser and emitter for Java

License:

Apache License Version 2.0: LICENSE.txt
File Path: /home/ciagent/.m2/repository/com/fasterxml/jackson/dataformat/jackson-dataformat-yaml/2.4.2/jackson-dataformat-yaml-2.4.2.jar/META-INF/maven/org.yaml/snakeyaml/pom.xml
MD5: d103ace8c756cc13661469b53cff1794
SHA1: c9dbe57a55450ef61cdb139c01a8edea9206949d

Identifiers

  • maven: org.yaml:snakeyaml:1.12   Confidence:High

jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling/pom.xml

Description: JBoss Marshalling API

File Path: /home/ciagent/.m2/repository/org/jboss/marshalling/jboss-marshalling-osgi/2.0.0.Beta3/jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling/pom.xml
MD5: 2b0e9541ec4a0f19e378eaabc5e85ea0
SHA1: da91abf3554dceed9454faa89acafc48c0649df5

Identifiers

  • maven: org.jboss.marshalling:jboss-marshalling:2.0.0.Beta3   Confidence:High

jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-river/pom.xml

Description: JBoss Marshalling River Implementation

File Path: /home/ciagent/.m2/repository/org/jboss/marshalling/jboss-marshalling-osgi/2.0.0.Beta3/jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-river/pom.xml
MD5: 1dda062cdd15bd160a4ee6cf1be9f93d
SHA1: 366411529f00ec1eb4451b9b45012bfc09bde34b

Identifiers

  • maven: org.jboss.marshalling:jboss-marshalling-river:2.0.0.Beta3   Confidence:High

jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-serial/pom.xml

Description: JBoss Marshalling Serial Implementation

File Path: /home/ciagent/.m2/repository/org/jboss/marshalling/jboss-marshalling-osgi/2.0.0.Beta3/jboss-marshalling-osgi-2.0.0.Beta3.jar/META-INF/maven/org.jboss.marshalling/jboss-marshalling-serial/pom.xml
MD5: 16b74097e7ec70db37b74205776ad0a7
SHA1: cf519c8805a14e6ce20933b7a89bfe0d5a7dbf0f

Identifiers

  • maven: org.jboss.marshalling:jboss-marshalling-serial:2.0.0.Beta3   Confidence:High

jython-standalone-2.5.4-rc1.jar/META-INF/maven/jline/jline/pom.xml

Description: JLine is a java library for reading and editing user input in console applications. It features tab-completion, command history, password masking, customizable keybindings, and pass-through handlers to use to chain to other console applications.

License:

BSD: LICENSE.txt
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/jline/jline/pom.xml
MD5: 0d6d52cb98633c1b3a711696db169d43
SHA1: 4206e42ea819ceb6d541d9d394c44e2b5344fef2

Identifiers

  • maven: jline:jline:0.9.95-SNAPSHOT   Confidence:High

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.antlr/antlr-runtime/pom.xml

Description: A framework for constructing recognizers, compilers, and translators from grammatical descriptions containing Java, C#, C++, or Python actions.

File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.antlr/antlr-runtime/pom.xml
MD5: 2663ae2cc7c8739fa5b19e2224ab6e55
SHA1: d72704aaf6a6fd2cd6bc142b959f9206e8f71a90

Identifiers

  • maven: org.antlr:antlr-runtime:3.1.3   Confidence:High

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.ext.posix/jnr-posix/pom.xml

Description:  Common cross-project/cross-platform POSIX APIs

License:

Common Public License - v 1.0: http://www-128.ibm.com/developerworks/library/os-cpl.html
GNU General Public License Version 2: http://www.gnu.org/copyleft/gpl.html
GNU Lesser General Public License Version 2.1: http://www.gnu.org/licenses/lgpl.html
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.ext.posix/jnr-posix/pom.xml
MD5: feaa380889a30e4e2beee4746d9b0b54
SHA1: 28d89352183ec1db9f4cb75efe98f5f0b9ae589d

Identifiers

  • cpe: cpe:/a:jruby:jruby:1.1.4   Confidence:Highest   
  • maven: org.jruby.ext.posix:jnr-posix:1.1.4   Confidence:High

CVE-2010-1330  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

Vulnerable Software & Versions: (show all)

CVE-2011-4838  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Vulnerable Software & Versions: (show all)

CVE-2012-5370  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-310 Cryptographic Issues

JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.

Vulnerable Software & Versions:

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/constantine/pom.xml

Description: A set of platform constants (e.g. errno values)

License:

The MIT License: http://www.opensource.org/licenses/mit-license.php
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/constantine/pom.xml
MD5: 970585d7cb052c21db6caa55c946e35e
SHA1: 7d6faeadd03efb438919ff833a9814728c042f0c

Identifiers

  • maven: org.jruby.extras:constantine:0.7   Confidence:High
  • cpe: cpe:/a:values_project:values:0.7   Confidence:Low   

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jaffl/pom.xml

Description: An abstracted interface to invoking native functions from java

License:

GNU Lesser General Public License Version 3: http://www.gnu.org/licenses/lgpl-3.0.txt
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jaffl/pom.xml
MD5: 486f581e2d6cee3f3c1020bd1cd856e2
SHA1: d833022c9991b70bcf6ebc9924af7da3bc79f5d1

Identifiers

  • maven: org.jruby.extras:jaffl:0.5.1   Confidence:High

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jffi/pom.xml

Description: Java wrapper around libffi

License:

GNU LGPLv3: http://www.gnu.org/licenses/lgpl-3.0.txt
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jffi/pom.xml
MD5: 39e5edd1583d710078ef1f596bb29ce7
SHA1: 5aea815e74debbfc61f10e9274a9ba27cd3e22af

Identifiers

  • maven: org.jruby.extras:jffi:1.0.1   Confidence:High
  • cpe: cpe:/a:jruby:jruby:1.0.1   Confidence:Highest   

CVE-2010-1330  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

Vulnerable Software & Versions: (show all)

CVE-2011-4838  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Vulnerable Software & Versions: (show all)

CVE-2012-5370  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-310 Cryptographic Issues

JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.

Vulnerable Software & Versions:

jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jnr-netdb/pom.xml

Description: Lookup TCP and UDP services from java

License:

GNU Lesser General Public License Version 3: http://www.gnu.org/licenses/lgpl-3.0.txt
File Path: /home/ciagent/.m2/repository/org/python/jython-standalone/2.5.4-rc1/jython-standalone-2.5.4-rc1.jar/META-INF/maven/org.jruby.extras/jnr-netdb/pom.xml
MD5: 303650108f1ec73ff0561d8b3b879769
SHA1: 1cef127eec64ffe5fa5ac078e14b6fd481536436

Identifiers

  • maven: org.jruby.extras:jnr-netdb:0.4   Confidence:High

hibernate-validator-4.2.0.Final.jar/META-INF/maven/com.googlecode.jtype/jtype/pom.xml

Description: Library for working with the Java 5 type system

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/hibernate/hibernate-validator/4.2.0.Final/hibernate-validator-4.2.0.Final.jar/META-INF/maven/com.googlecode.jtype/jtype/pom.xml
MD5: a1dde0cb5b6ebe7e7d3540e0310042ac
SHA1: 2b51d041544482b183c1ae49eba99099d6f14998

Identifiers

  • maven: com.googlecode.jtype:jtype:0.1.1   Confidence:High

jansi-1.11.jar/META-INF/maven/org.fusesource.hawtjni/hawtjni-runtime/pom.xml

Description: The API that projects using HawtJNI should build against.

File Path: /home/ciagent/.m2/repository/org/fusesource/jansi/jansi/1.11/jansi-1.11.jar/META-INF/maven/org.fusesource.hawtjni/hawtjni-runtime/pom.xml
MD5: 9343dc158b5894310f26732ebb2b73ee
SHA1: 14df4655274e472909050661f8e9ed98a28b6721

Identifiers

  • maven: org.fusesource.hawtjni:hawtjni-runtime:1.8   Confidence:High

jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi-native/pom.xml

Description: Jansi is a java library for generating and interpreting ANSI escape sequences.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/fusesource/jansi/jansi/1.11/jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi-native/pom.xml
MD5: 1bbb551ce034727cd799619954437ab5
SHA1: 0177ae5fbf3b24c3e9adb94d98e29213259a8bc6

Identifiers

  • cpe: cpe:/a:id:id-software:1.5   Confidence:Low   
  • maven: org.fusesource.jansi:jansi-native:1.5   Confidence:High

jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi/pom.xml

Description: Jansi is a java library for generating and interpreting ANSI escape sequences.

File Path: /home/ciagent/.m2/repository/org/fusesource/jansi/jansi/1.11/jansi-1.11.jar/META-INF/maven/org.fusesource.jansi/jansi/pom.xml
MD5: 18c6eba91ac7aa1a27324b482dca06d5
SHA1: 3aea48c5e47064eec9903f4a14e5acee8fe345d8

Identifiers

  • maven: org.fusesource.jansi:jansi:1.11   Confidence:High
  • cpe: cpe:/a:id:id-software:1.11   Confidence:Low   

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/com.beust/jcommander/pom.xml

Description: A Java framework to parse command line options with annotations.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/maven/com.beust/jcommander/pom.xml
MD5: 476d9301d9a9ba636a79e1e127cb201d
SHA1: 643abcc29f656bfd9ff6b0c720264642bc10017f

Identifiers

  • maven: com.beust:jcommander:1.35   Confidence:High

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/jline/jline/pom.xml

License:

The BSD License: http://www.opensource.org/licenses/bsd-license.php
File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/maven/jline/jline/pom.xml
MD5: c115487107302a4d8b15dfe918a3ee92
SHA1: c360defa993e6b59531e23966a89415c3db54848

Identifiers

  • maven: jline:jline:2.12   Confidence:High

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-api/pom.xml

Description:  The application programming interface for the repository system.

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-api/pom.xml
MD5: fc000d7bc8dbb2b892a953bc3c9ab822
SHA1: ea104d5d0d8d6e495088cc49c71ae3a5b9c04634

Identifiers

  • maven: org.eclipse.aether:aether-api:1.1.0   Confidence:High

addons-manager-1.4.x-SNAPSHOT.zip: addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-util/pom.xml

Description:  A collection of utility classes to ease usage of the repository system.

File Path: /home/ciagent/.m2/repository/org/exoplatform/platform/addons-manager/1.4.x-SNAPSHOT/addons-manager-1.4.x-SNAPSHOT.zip/addons/addons-manager.jar/META-INF/maven/org.eclipse.aether/aether-util/pom.xml
MD5: cfb325be4744f65098b66ee34e265322
SHA1: 2648fa8032a1428718a58b53fb9badae64643dd0

Identifiers

  • maven: org.eclipse.aether:aether-util:1.1.0   Confidence:High


This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the Node Security Platform.