Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: google group | github issues

Project: DependencyCheck

Scan Information (show all):

Display: Showing Vulnerable Dependencies (click to show all)

Dependency CPE GAV Highest Severity CVE Count CPE Confidence Evidence Count
activation-1.1.jar javax.activation:activation:1.1   0 19
annogen-0.1.0.jar annogen:annogen:0.1.0   0 11
annotations-3.0.1u2.jar com.google.code.findbugs:annotations:3.0.1u2   0 18
ant-1.9.7.jar org.apache.ant:ant:1.9.7   0 19
aopalliance-1.0.jar aopalliance:aopalliance:1.0   0 13
aspectjrt-1.6.5.jar org.aspectj:aspectjrt:1.6.5   0 18
aspectjweaver-1.6.5.jar org.aspectj:aspectjweaver:1.6.5   0 19
binutils/configure   0 4
binutils/configure.ac   0 3
ghostscript/configure.ac cpe:/a:ghostscript:ghostscript:8.62 High 5 HIGHEST 4
readable-code/configure   0 6
readable-code/configure.ac   0 6
axiom-api-1.2.7.jar org.apache.ws.commons.axiom:axiom-api:1.2.7   0 16
axiom-dom-1.2.7.jar org.apache.ws.commons.axiom:axiom-dom:1.2.7   0 16
axiom-impl-1.2.7.jar org.apache.ws.commons.axiom:axiom-impl:1.2.7   0 16
axis-1.4.jar cpe:/a:apache:axis:1.4 axis:axis:1.4 Medium 2 HIGHEST 17
axis2-kernel-1.4.1.jar cpe:/a:apache:axis2:1.4.1 org.apache.axis2:axis2-kernel:1.4.1 High 6 HIGHEST 16
backport-util-concurrent-3.1.jar backport-util-concurrent:backport-util-concurrent:3.1   0 16
bootable-0.1.0.jar org.owasp.testing:bootable:0.1.0   0 9
bootable-0.1.0.jar: lib-0.1.0.jar org.owasp.testing:lib:0.1.0   0 10
ffmpeg\ffmpeg_version.cmake cpe:/a:ffmpeg:ffmpeg:55.18.102 High 3 LOW 3
cmake\cl2cpp.cmake   0 2
cmake\copyAndroidLibs.cmake   0 1
cmake\FindCUDA.cmake   0 1
FindCUDA\make2cmake.cmake   0 2
FindCUDA\parse_cubin.cmake   0 1
FindCUDA\run_nvcc.cmake   0 1
cmake\OpenCVCompilerOptions.cmake   0 1
cmake\OpenCVConfig.cmake   0 1
cmake\OpenCVCRTLinkage.cmake   0 1
cmake\OpenCVDetectAndroidSDK.cmake cpe:/a:android:android_sdk:-   0 LOW 1
cmake\OpenCVDetectApacheAnt.cmake   0 1
cmake\OpenCVDetectCStripes.cmake   0 1
cmake\OpenCVDetectCUDA.cmake   0 1
cmake\OpenCVDetectCXXCompiler.cmake   0 3
cmake\OpenCVDetectDirectX.cmake   0 1
cmake\OpenCVDetectOpenCL.cmake   0 1
cmake\OpenCVDetectPython.cmake cpe:/a:python:python:- High 11 LOW 1
cmake\OpenCVDetectTBB.cmake   0 1
cmake\OpenCVDetectVTK.cmake   0 1
cmake\OpenCVExtraTargets.cmake   0 1
cmake\OpenCVFindIntelPerCSDK.cmake   0 1
cmake\OpenCVFindIPP.cmake   0 1
cmake\OpenCVFindIPPAsync.cmake   0 1
cmake\OpenCVFindLATEX.cmake   0 1
cmake\OpenCVFindLibsGrfmt.cmake   0 1
cmake\OpenCVFindLibsGUI.cmake   0 1
cmake\OpenCVFindLibsPerf.cmake   0 1
cmake\OpenCVFindLibsVideo.cmake   0 1
cmake\OpenCVFindMatlab.cmake   0 1
cmake\OpenCVFindOpenEXR.cmake cpe:/a:openexr:openexr:-   0 LOW 1
cmake\OpenCVFindOpenNI.cmake   0 1
cmake\OpenCVFindOpenNI2.cmake   0 2
cmake\OpenCVFindWebP.cmake   0 1
cmake\OpenCVFindXimea.cmake   0 1
cmake\OpenCVGenABI.cmake   0 1
cmake\OpenCVGenAndroidMK.cmake   0 1
cmake\OpenCVGenConfig.cmake   0 1
cmake\OpenCVGenHeaders.cmake   0 1
cmake\OpenCVGenInfoPlist.cmake   0 1
cmake\OpenCVGenPkgconfig.cmake   0 1
cmake\OpenCVMinDepVersions.cmake   0 1
cmake\OpenCVModule.cmake   0 1
cmake\OpenCVPackaging.cmake   0 1
cmake\OpenCVPCHSupport.cmake   0 1
cmake\OpenCVUtils.cmake   0 1
cmake\OpenCVVersion.cmake   0 1
opencv\CMakeLists.txt   0 2
zlib\CMakeLists.txt   0 2
commons-cli-1.2.jar commons-cli:commons-cli:1.2   0 25
commons-codec-1.2.jar commons-codec:commons-codec:1.2   0 20
commons-collections-3.2.2.jar cpe:/a:apache:commons_collections:3.2.2 commons-collections:commons-collections:3.2.2   0 LOW 28
commons-compress-1.12.jar cpe:/a:apache:commons-compress:1.12 org.apache.commons:commons-compress:1.12   0 LOW 29
commons-fileupload-1.2.1.jar cpe:/a:apache:commons_fileupload:1.2.1 commons-fileupload:commons-fileupload:1.2.1 High 3 HIGHEST 23
commons-httpclient-3.1.jar cpe:/a:apache:commons-httpclient:3.1
cpe:/a:apache:httpclient:3.1
commons-httpclient:commons-httpclient:3.1 Medium 2 LOW 20
commons-io-2.5.jar commons-io:commons-io:2.5   0 28
commons-lang-2.4.jar commons-lang:commons-lang:2.4   0 25
commons-lang3-3.3.2.jar org.apache.commons:commons-lang3:3.3.2   0 26
commons-logging-1.1.1.jar commons-logging:commons-logging:1.1.1   0 21
commons-pool-1.5.3.jar commons-pool:commons-pool:1.5.3   0 25
commons-validator-1.4.0.jar commons-validator:commons-validator:1.4.0   0 26
composer.lock   0 1
daytrader-ear-2.1.7.ear   0 2
daytrader-ear-2.1.7.ear: dt-ejb.jar cpe:/a:apache:geronimo:2.1.7 org.apache.geronimo.daytrader:daytrader-ejb:2.1.7 High 2 HIGHEST 15
daytrader-ear-2.1.7.ear: geronimo-jaxrpc_1.1_spec-2.0.0.jar org.apache.geronimo.specs:geronimo-jaxrpc_1.1_spec:2.0.0   0 18
daytrader-ear-2.1.7.ear: streamer.jar cpe:/a:apache:apache_test:2.1.7
cpe:/a:apache:geronimo:2.1.7
org.apache.geronimo.daytrader:daytrader-streamer:2.1.7 High 2 HIGHEST 17
daytrader-ear-2.1.7.ear: web.war   0 5
daytrader-ear-2.1.7.ear: wsappclient.jar cpe:/a:apache:geronimo:2.1.7 org.apache.geronimo.daytrader:daytrader-wsappclient:2.1.7 High 2 HIGHEST 17
dependency-check-utils-1.4.4-SNAPSHOT.jar org.owasp:dependency-check-utils:1.4.4-SNAPSHOT   0 14
dojo-war-1.3.0.war cpe:/a:dojotoolkit:dojo:1.3 org.dojotoolkit:dojo-war:1.3.0 High 4 HIGHEST 12
dwr.jar cpe:/a:getahead:direct_web_remoting:1.1.1 uk.ltd.getahead:dwr:1.1.1 High 3 HIGHEST 7
ehcache-core-2.2.0.jar net.sf.ehcache:ehcache-core:2.2.0   0 16
FileHelpers.2.0.0.0.nupkg cpe:/a:file:file:2.0.0.0 High 1 LOW 2
FileHelpers.2.0.0.0.nupkg: FileHelpers.nuspec   0 6
FileHelpers.2.0.0.0.nupkg: FileHelpers.dll   0 4
FileHelpers.2.0.0.0.nupkg: FileHelpers.ExcelStorage.dll   0 4
FileHelpers.2.0.0.0.nupkg: Interop.Excel.dll   0 4
FileHelpers.2.0.0.0.nupkg: Interop.Office.dll   0 4
freemarker-2.3.12.jar org.freemarker:freemarker:2.3.12   0 18
geronimo-activation_1.1_spec-1.0.1.jar org.apache.geronimo.specs:geronimo-activation_1.1_spec:1.0.1   0 18
geronimo-javamail_1.4_spec-1.2.jar org.apache.geronimo.specs:geronimo-javamail_1.4_spec:1.2   0 18
geronimo-jms_1.1_spec-1.1.1.jar org.apache.geronimo.specs:geronimo-jms_1.1_spec:1.1.1   0 18
geronimo-jpa_2.0_spec-1.1.jar org.apache.geronimo.specs:geronimo-jpa_2.0_spec:1.1   0 22
geronimo-jta_1.1_spec-1.1.1.jar org.apache.geronimo.specs:geronimo-jta_1.1_spec:1.1.1   0 18
geronimo-stax-api_1.0_spec-1.0.1.jar org.apache.geronimo.specs:geronimo-stax-api_1.0_spec:1.0.1   0 18
guice-3.0.jar com.google.inject:guice:3.0   0 22
h2-1.3.176.jar com.h2database:h2:1.3.176   0 18
hamcrest-core-1.3.jar org.hamcrest:hamcrest-core:1.3   0 17
hazelcast-2.5.jar com.hazelcast:hazelcast:2.5   0 21
hibernate3.jar   0 10
httpcore-4.0-beta1.jar org.apache.httpcomponents:httpcore:4.0-beta1   0 15
httpcore-nio-4.0-beta1.jar org.apache.httpcomponents:httpcore-nio:4.0-beta1   0 15
javax.inject-1.jar javax.inject:javax.inject:1   0 13
javax.json-1.0.4.jar org.glassfish:javax.json:1.0.4   0 20
jaxb-xercesImpl-1.5.jar activesoap:jaxb-xercesImpl:1.5   0 22
jaxen-1.1.1.jar jaxen:jaxen:1.1.1   0 19
jcip-annotations-1.0.jar net.jcip:jcip-annotations:1.0   0 13
jetty-6.1.0.jar cpe:/a:jetty:jetty:6.1.0
cpe:/a:mortbay:jetty:6.1.0
cpe:/a:mortbay_jetty:jetty:6.1
org.mortbay.jetty:jetty:6.1.0 High 10 HIGHEST 14
jmockit-1.24.jar org.jmockit:jmockit:1.24   0 13
jsoup-1.9.2.jar org.jsoup:jsoup:1.9.2   0 17
jsr305-3.0.1.jar com.google.code.findbugs:jsr305:3.0.1   0 15
junit-4.12.jar junit:junit:4.12   0 17
junit4-ant-2.0.13.jar com.carrotsearch.randomizedtesting:junit4-ant:2.0.13   0 15
log4net.2.0.3.nuspec cpe:/a:apache:log4net:2.0.3   0 LOW 7
log4net.dll cpe:/a:apache:log4net:1.2.13.0   0 LOW 5
logback-classic-1.1.7.jar ch.qos.logback:logback-classic:1.1.7   0 19
logback-core-1.1.7.jar ch.qos.logback:logback-core:1.1.7   0 19
lucene-analyzers-common-4.7.2.jar org.apache.lucene:lucene-analyzers-common:4.7.2   0 21
lucene-codecs-4.7.2.jar org.apache.lucene:lucene-codecs:4.7.2   0 21
lucene-core-4.7.2.jar org.apache.lucene:lucene-core:4.7.2   0 20
lucene-queries-4.7.2.jar org.apache.lucene:lucene-queries:4.7.2   0 22
lucene-queryparser-4.7.2.jar org.apache.lucene:lucene-queryparser:4.7.2   0 22
lucene-sandbox-4.7.2.jar org.apache.lucene:lucene-sandbox:4.7.2   0 22
lucene-test-framework-4.7.2.jar cpe:/a:apache:apache_test:4.7.2 org.apache.lucene:lucene-test-framework:4.7.2   0 LOW 20
mail-1.4.jar cpe:/a:sun:javamail:1.4 javax.mail:mail:1.4 Medium 1 LOW 20
mailapi-1.5.6.jar cpe:/a:sun:javamail:1.5.6 com.sun.mail:mailapi:1.5.6 Medium 1 LOW 27
maven-scm-api-1.8.1.jar org.apache.maven.scm:maven-scm-api:1.8.1   0 18
maven-scm-provider-cvs-commons-1.8.1.jar org.apache.maven.scm:maven-scm-provider-cvs-commons:1.8.1   0 18
maven-scm-provider-cvsexe-1.8.1.jar org.apache.maven.scm:maven-scm-provider-cvsexe:1.8.1   0 18
mysql-connector-java-5.1.27-bin.jar cpe:/a:mysql:mysql:5.1.27 High 97 HIGHEST 12
neethi-2.0.4.jar cpe:/a:apache:apache_test:2.0.4 org.apache.neethi:neethi:2.0.4   0 LOW 16
debug/package.json   0 7
shelljs/package.json   0 7
dns-sync/package.json cpe:/a:dns-sync_project:dns-sync:0.1.0::~~~node.js~~ High 1 HIGHEST 6
ognl-2.6.11.jar opensymphony:ognl:2.6.11   0 12
openjpa-2.0.1.jar cpe:/a:apache:openjpa:2.0.1 org.apache.openjpa:openjpa:2.0.1 High 1 HIGHEST 22
openssl\opensslv.h cpe:/a:openssl:openssl:1.0.2c High 33 HIGH 4
org.mortbay.jetty.jar cpe:/a:jetty:jetty:4.2.27
cpe:/a:mortbay:jetty:4.2.27
cpe:/a:mortbay_jetty:jetty:4.2.27
jetty:jetty:4.2.27 Medium 5 HIGHEST 19
org.mortbay.jmx.jar   0 3
plexus-utils-3.0.7.jar org.codehaus.plexus:plexus-utils:3.0.7   0 17
EggTest-0.0.1-py2.7.egg   0 7
Django-1.7.2-py2.py3-none-any.whl cpe:/a:django_project:django:1.7.2
cpe:/a:djangoproject:django:1.7.2
High 14 HIGHEST 7
eggtest/__init__.py   0 6
Django-1.7.2.dist-info/METADATA cpe:/a:django_project:django:1.7.2   0 LOW 6
django/__init__.py   0 1
EGG-INFO/PKG-INFO   0 6
randomizedtesting-runner-2.0.13.jar com.carrotsearch.randomizedtesting:randomizedtesting-runner:2.0.13   0 17
regexp-1.3.jar regexp:regexp:1.3   0 10
Gemfile.lock   0 1
dalli-2.7.5.gemspec   0 10
Gemfile.lock   0 1
activerecord-oracle_enhanced-adapter-1.1.7.gemspec   0 9
serp-1.13.1.jar net.sourceforge.serp:serp:1.13.1   0 13
servlet-api-2.5.jar cpe:/a:sun:one_application_server:2.5 javax.servlet:servlet-api:2.5 Medium 3 LOW 16
slf4j-api-1.7.21.jar org.slf4j:slf4j-api:1.7.21   0 20
spring-aop-3.0.0.RELEASE.jar org.springframework:spring-aop:3.0.0.RELEASE   0 19
spring-asm-3.0.0.RELEASE.jar org.springframework:spring-asm:3.0.0.RELEASE   0 19
spring-core-2.5.5.jar cpe:/a:pivotal:spring_framework:2.5.5
cpe:/a:pivotal_software:spring_framework:2.5.5
cpe:/a:springsource:spring_framework:2.5.5
cpe:/a:vmware:springsource_spring_framework:2.5.5
org.springframework:spring-core:2.5.5 High 7 HIGHEST 26
spring-core-3.0.0.RELEASE.jar cpe:/a:pivotal:spring_framework:3.0.0
cpe:/a:pivotal_software:spring_framework:3.0.0
cpe:/a:springsource:spring_framework:3.0.0
cpe:/a:vmware:springsource_spring_framework:3.0.0
org.springframework:spring-core:3.0.0.RELEASE High 8 HIGHEST 23
spring-expression-3.0.0.RELEASE.jar org.springframework:spring-expression:3.0.0.RELEASE   0 19
spring-retry-1.1.0.RELEASE.jar org.springframework.retry:spring-retry:1.1.0.RELEASE   0 14
spring-security-core-3.0.0.RELEASE.jar cpe:/a:vmware:springsource_spring_security:3.0.0 org.springframework.security:spring-security-core:3.0.0.RELEASE Medium 5 HIGHEST 17
spring-security-web-3.0.0.RELEASE.jar org.springframework.security:spring-security-web:3.0.0.RELEASE   0 14
spring-tx-3.0.0.RELEASE.jar org.springframework:spring-tx:3.0.0.RELEASE   0 18
stagedhttp-modified.tar: commons-httpclient-2.0.jar cpe:/a:apache:commons-httpclient:2.0
cpe:/a:apache:httpclient:2.0
commons-httpclient:commons-httpclient:2.0 Medium 2 LOW 17
stagedhttp-modified.tar: commons-logging.jar commons-logging:commons-logging:1.0.3   0 18
stagedhttp-modified.tar: dom4j.jar dom4j:dom4j:1.4   0 14
stagedhttp-modified.tar: jgroups-all.jar jgroups:jgroups-all:2.2.7   0 8
stagedhttp-modified.tar: log4j.jar   0 7
stagedhttp-modified.tar: mail.jar cpe:/a:sun:javamail:1.3.2 Medium 3 HIGH 11
stagedhttp-modified.tar: serializer.jar   0 11
stagedhttp-modified.tar: xalan.jar cpe:/a:apache:xalan-java:2.7.0 High 1 MEDIUM 28
stagedhttp-modified.tar: xmlsec-1.3.0.jar org.codehaus.xfire:xmlsec:1.3.0   0 21
stagedhttp-modified.tar: xss4j.jar   0 4
struts.jar cpe:/a:apache:struts:1.2.7 struts:struts:1.2.7 High 10 HIGHEST 20
struts2-core-2.1.2.jar cpe:/a:apache:struts:2.1.2 org.apache.struts:struts2-core:2.1.2 High 32 HIGHEST 16
EasyPeasy.podspec   0 7
Gloss.podspec   0 8
uber-1.0-SNAPSHOT.jar   0 2
velocity-1.7.jar org.apache.velocity:velocity:1.7   0 27
war-4.0.war org.glassfish.main.admingui:war:4.0   0 9
war-4.0.war: commons-fileupload-1.1.1.jar cpe:/a:apache:commons_fileupload:1.1.1 commons-fileupload:commons-fileupload:1.1.1 High 3 HIGHEST 22
war-4.0.war: commons-io-1.3.1.jar commons-io:commons-io:1.3.1   0 22
war-4.0.war: dojo-ajax-nodemo-0.4.1.jar cpe:/a:sun:woodstock:0.4.1 com.sun.woodstock.dependlibs:dojo-ajax-nodemo:0.4.1   0 LOW 8
war-4.0.war: json-1.0.jar cpe:/a:sun:woodstock:1.0 com.sun.woodstock.dependlibs:json:1.0   0 LOW 9
war-4.0.war: prototype-1.5.0.jar cpe:/a:sun:woodstock:1.5.0 com.sun.woodstock.dependlibs:prototype:1.5.0   0 LOW 8
war-4.0.war: webui-jsf-4.0.2.10.jar com.sun.woodstock:webui-jsf:4.0.2.10   0 22
war-4.0.war: webui-jsf-suntheme-4.0.2.10.jar com.sun.woodstock:webui-jsf-suntheme:4.0.2.10   0 18
war-4.0.war: console-core-4.0.jar org.glassfish.main.admingui:console-core:4.0   0 15
woden-api-1.0M8.jar org.apache.woden:woden-api:1.0M8   0 16
woden-impl-dom-1.0M8.jar org.apache.woden:woden-impl-dom:1.0M8   0 16
wsdl4j-1.6.2.jar wsdl4j:wsdl4j:1.6.2   0 19
wstx-asl-3.2.4.jar org.codehaus.woodstox:wstx-asl:3.2.4   0 20
xalan-2.7.0.jar cpe:/a:apache:xalan-java:2.7.0 xalan:xalan:2.7.0 High 1 HIGHEST 28
xercesImpl-2.8.1.jar xerces:xercesImpl:2.8.1   0 55
xml-apis-1.0.b2.jar xml-apis:xml-apis:1.0.b2   0 35
xmlParserAPIs-2.6.0.jar xerces:xmlParserAPIs:2.6.0   0 31
xmlpull-1.1.3.1.jar xmlpull:xmlpull:1.1.3.1   0 12
XmlSchema-1.4.2.jar org.apache.ws.commons.schema:XmlSchema:1.4.2   0 17
xpp3_min-1.1.4c.jar xpp3:xpp3_min:1.1.4c   0 14
xstream-1.4.8.jar cpe:/a:x-stream:xstream:1.4.8 com.thoughtworks.xstream:xstream:1.4.8 Medium 1 HIGHEST 27
xwork-2.1.1.jar cpe:/a:opensymphony:xwork:2.1.1 com.opensymphony:xwork:2.1.1 Medium 3 HIGHEST 14
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-core/pom.xml org.hibernate:hibernate-core:3.6.6.Final   0 7
junit4-ant-2.0.13.jar\META-INF/maven/com.google.guava/guava/pom.xml com.google.guava:guava:14.0.1   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-commons-annotations/pom.xml org.hibernate:hibernate-commons-annotations:3.2.0.Final   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-ehcache/pom.xml org.hibernate:hibernate-ehcache:3.6.6.Final   0 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.owasp.dependency-check/uber/pom.xml org.owasp.dependency-check:uber:1.0-SNAPSHOT   0 5
junit4-ant-2.0.13.jar\META-INF/maven/commons-io/commons-io/pom.xml commons-io:commons-io:2.3   0 9
junit4-ant-2.0.13.jar\META-INF/maven/org.simpleframework/simple-xml/pom.xml org.simpleframework:simple-xml:2.6.2   0 6
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-jbosscache/pom.xml org.hibernate:hibernate-jbosscache:3.6.6.Final   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-infinispan/pom.xml org.hibernate:hibernate-infinispan:3.6.6.Final   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-testing/pom.xml org.hibernate:hibernate-testing:3.6.6.Final   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-oscache/pom.xml org.hibernate:hibernate-oscache:3.6.6.Final   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-swarmcache/pom.xml org.hibernate:hibernate-swarmcache:3.6.6.Final   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-c3p0/pom.xml org.hibernate:hibernate-c3p0:3.6.6.Final   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-proxool/pom.xml org.hibernate:hibernate-proxool:3.6.6.Final   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-entitymanager/pom.xml org.hibernate:hibernate-entitymanager:3.6.6.Final   0 7
hibernate3.jar\META-INF/maven/org.hibernate/hibernate-envers/pom.xml org.hibernate:hibernate-envers:3.6.6.Final   0 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/commons-io/commons-io/pom.xml commons-io:commons-io:1.3.2   0 9
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.yammer.dropwizard/dropwizard-core/pom.xml com.yammer.dropwizard:dropwizard-core:0.1.3   0 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.sun.jersey/jersey-core/pom.xml com.sun.jersey:jersey-core:1.11   0 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.sun.jersey/jersey-server/pom.xml com.sun.jersey:jersey-server:1.11   0 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.sun.jersey/jersey-servlet/pom.xml com.sun.jersey:jersey-servlet:1.11   0 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.yammer.metrics/metrics-core/pom.xml com.yammer.metrics:metrics-core:2.0.0-RC0   0 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.yammer.metrics/metrics-servlet/pom.xml com.yammer.metrics:metrics-servlet:2.0.0-RC0   0 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.yammer.metrics/metrics-jetty/pom.xml cpe:/a:jetty:jetty:2.0.0.rc0 com.yammer.metrics:metrics-jetty:2.0.0-RC0   0 LOW 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.yammer.metrics/metrics-log4j/pom.xml com.yammer.metrics:metrics-log4j:2.0.0-RC0   0 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/log4j/log4j/pom.xml log4j:log4j:1.2.16   0 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.yammer.metrics/metrics-jersey/pom.xml com.yammer.metrics:metrics-jersey:2.0.0-RC0   0 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.yammer.metrics/metrics-annotation/pom.xml com.yammer.metrics:metrics-annotation:2.0.0-RC0   0 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.slf4j/slf4j-api/pom.xml org.slf4j:slf4j-api:1.6.4   0 8
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.slf4j/slf4j-log4j12/pom.xml org.slf4j:slf4j-log4j12:1.6.4   0 8
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.slf4j/jul-to-slf4j/pom.xml org.slf4j:jul-to-slf4j:1.6.4   0 8
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.eclipse.jetty/jetty-server/pom.xml cpe:/a:jetty:jetty:7.6.0.rc4 org.eclipse.jetty:jetty-server:7.6.0.RC4   0 LOW 8
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.eclipse.jetty/jetty-continuation/pom.xml cpe:/a:jetty:jetty:7.6.0.rc4 org.eclipse.jetty:jetty-continuation:7.6.0.RC4   0 LOW 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.eclipse.jetty/jetty-servlet/pom.xml cpe:/a:jetty:jetty:7.6.0.rc4 org.eclipse.jetty:jetty-servlet:7.6.0.RC4   0 LOW 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.eclipse.jetty/jetty-security/pom.xml cpe:/a:jetty:jetty:7.6.0.rc4 org.eclipse.jetty:jetty-security:7.6.0.RC4   0 LOW 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.eclipse.jetty/jetty-http/pom.xml cpe:/a:jetty:jetty:7.6.0.rc4 org.eclipse.jetty:jetty-http:7.6.0.RC4   0 LOW 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.eclipse.jetty/jetty-io/pom.xml org.eclipse.jetty:jetty-io:7.6.0.RC4   0 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.eclipse.jetty/jetty-util/pom.xml cpe:/a:jetty:jetty:7.6.0.rc4 org.eclipse.jetty:jetty-util:7.6.0.RC4   0 LOW 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.google.guava/guava/pom.xml com.google.guava:guava:11.0.1   0 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.hibernate/hibernate-validator/pom.xml cpe:/a:hibernate:hibernate_validator:4.2.0 org.hibernate:hibernate-validator:4.2.0.Final Medium 1 HIGHEST 7
uber-1.0-SNAPSHOT.jar\META-INF/maven/com.googlecode.jtype/jtype/pom.xml com.googlecode.jtype:jtype:0.1.1   0 6
uber-1.0-SNAPSHOT.jar\META-INF/maven/javax.validation/validation-api/pom.xml javax.validation:validation-api:1.0.0.GA   0 5
uber-1.0-SNAPSHOT.jar\META-INF/maven/org.yaml/snakeyaml/pom.xml org.yaml:snakeyaml:1.9   0 6
ffmpeg\ffmpeg_version.cmake:libavformat   0 2
ffmpeg\ffmpeg_version.cmake:libavutil   0 2
ffmpeg\ffmpeg_version.cmake:libswscale   0 2
ffmpeg\ffmpeg_version.cmake:libavresample   0 2
composer.lock:classpreloader/classpreloader   0 3
composer.lock:danielstjules/stringy   0 3
composer.lock:dnoegel/php-xdg-base-dir   0 3
composer.lock:doctrine/inflector   0 3
composer.lock:jakub-onderka/php-console-color   0 3
composer.lock:jakub-onderka/php-console-highlighter   0 3
composer.lock:jeremeamia/SuperClosure   0 3
composer.lock:laravel/framework   0 3
composer.lock:laravel/laravel   0 3
composer.lock:league/flysystem   0 3
composer.lock:monolog/monolog   0 3
composer.lock:mtdowling/cron-expression   0 3
composer.lock:nesbot/carbon   0 3
composer.lock:nikic/php-parser   0 3
composer.lock:psr/log   0 3
composer.lock:psy/psysh   0 3
composer.lock:swiftmailer/swiftmailer   0 3
composer.lock:symfony/console   0 4
composer.lock:symfony/css-selector   0 4
composer.lock:symfony/debug   0 4
composer.lock:symfony/dom-crawler   0 4
composer.lock:symfony/event-dispatcher   0 4
composer.lock:symfony/finder   0 4
composer.lock:symfony/http-foundation   0 4
composer.lock:symfony/http-kernel   0 4
composer.lock:symfony/process   0 4
composer.lock:symfony/routing   0 4
composer.lock:symfony/translation   0 4
composer.lock:symfony/var-dumper   0 4
composer.lock:vlucas/phpdotenv   0 3

Dependencies

activation-1.1.jar

Description:  JavaBeans Activation Framework (JAF) is a standard extension to the Java platform that lets you take advantage of standard services to: determine the type of an arbitrary piece of data; encapsulate access to it; discover the operations available on it; and instantiate the appropriate bean to perform the operation(s).

License:

Common Development and Distribution License (CDDL) v1.0: https://glassfish.dev.java.net/public/CDDLv1.0.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\activation-1.1.jar
MD5: 8ae38e87cd4f86059c0294a8fe3e0b18
SHA1: e6cb541461c2834bdea3eb920f1884d1eb508b50

Identifiers

annogen-0.1.0.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\annogen-0.1.0.jar
MD5: ff275c3491ac6715ad9f6c22a9660503
SHA1: a8de34ea7aa93765d24dc16ec9c61af5160bb899

Identifiers

annotations-3.0.1u2.jar

Description: Annotation the FindBugs tool supports

License:

GNU Lesser Public License: http://www.gnu.org/licenses/lgpl.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\annotations-3.0.1u2.jar
MD5: 4242c4e6b7719eeb3f91d3fe4c7af12c
SHA1: 89a670596c98e416fb2583c08ae34cc5c3ce2097

Identifiers

ant-1.9.7.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\ant-1.9.7.jar
MD5: a14502c25ee6bc76c4614315845b29e9
SHA1: 3b2a10512ee6537d3852c9b693a0284dcab5de68

Identifiers

aopalliance-1.0.jar

Description: AOP Alliance

License:

Public Domain
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\aopalliance-1.0.jar
MD5: 04177054e180d09e3998808efa0401c7
SHA1: 0235ba8b489512805ac13a8f9ea77a1ca5ebe3e8

Identifiers

aspectjrt-1.6.5.jar

Description: The runtime needed to execute a program using AspectJ

License:

Eclipse Public License - v 1.0: http://www.eclipse.org/legal/epl-v10.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\aspectjrt-1.6.5.jar
MD5: 71d9982a11bf94ac21221e2f052f3869
SHA1: d35f32a63eb823dc2dffc7ee6fdb8e00a680d114

Identifiers

aspectjweaver-1.6.5.jar

Description: The AspectJ weaver introduces advices to java classes

License:

Eclipse Public License - v 1.0: http://www.eclipse.org/legal/epl-v10.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\aspectjweaver-1.6.5.jar
MD5: 2fa7d0e921c46245d0e1b39f3ac365f5
SHA1: 3ead0550dc9e2e0a5abd0fdb3116e636b59e4dc4

Identifiers

binutils/configure

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\autoconf\binutils\configure
MD5: 87ef7e524d4c3190c297ce64df0e600e
SHA1: ed33427ceee41faa5e69fb89452cd69318e3723a

Identifiers

  • None

binutils/configure.ac

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\autoconf\binutils\configure.ac
MD5: 1982a659f09482b4eabbf19a000822fa
SHA1: 4dd69b029c1e0ebd8a087f0ef14742e83708b79a

Identifiers

  • None

ghostscript/configure.ac

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\autoconf\ghostscript\configure.ac
MD5: a7e8bdc5c0dab93d042e822130b8cfc9
SHA1: 94d7acda832dc53ab91892dcdd4b1ac9fc191e75

Identifiers

CVE-2009-0792  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.

Vulnerable Software & Versions: (show all)

CVE-2009-0584  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.

Vulnerable Software & Versions: (show all)

CVE-2009-0583  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.

Vulnerable Software & Versions: (show all)

CVE-2009-0196  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.

Vulnerable Software & Versions: (show all)

CVE-2008-6679  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in the BaseFont writer module in Ghostscript 8.62, and possibly other versions, allows remote attackers to cause a denial of service (ps2pdf crash) and possibly execute arbitrary code via a crafted Postscript file.

Vulnerable Software & Versions:

readable-code/configure

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\autoconf\readable-code\configure
MD5: e4b0986a605c8d223bcd8cbf036caae8
SHA1: cd18db2a682ef6c3deeeab099d2036e405a1f07c

Identifiers

  • None

readable-code/configure.ac

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\autoconf\readable-code\configure.ac
MD5: d130e2fa32a516b4898b3de12b1b42bc
SHA1: 5dba846da57603462614e4b6801cc82655519023

Identifiers

  • None

axiom-api-1.2.7.jar

Description: The Axiom API

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\axiom-api-1.2.7.jar
MD5: b06e716d6e5c3a0e3289d28126d01121
SHA1: aa260a5f3fcaee3b95b551a9bbcbe63f56e5a2ad

Identifiers

axiom-dom-1.2.7.jar

Description: The Axiom DOM implementation.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\axiom-dom-1.2.7.jar
MD5: 9d1ff1229a42b8a93fc1db8c349ce830
SHA1: 34f6d22244963bc617f3971a826104162eef1da4

Identifiers

axiom-impl-1.2.7.jar

Description: The Axiom default implementation.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\axiom-impl-1.2.7.jar
MD5: b58763085089fe3d4d106386323ccd63
SHA1: 378b814d1a6129a3e8175d95cf60d48c60ae9d51

Identifiers

axis-1.4.jar

Description:  An implementation of the SOAP ("Simple Object Access Protocol") submission to W3C.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\axis-1.4.jar
MD5: 03dcfdd88502505cc5a805a128bfdd8d
SHA1: 94a9ce681a42d0352b3ad22659f67835e560d107

Identifiers

CVE-2014-3596  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Vulnerable Software & Versions: (show all)

CVE-2012-5784  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Vulnerable Software & Versions: (show all)

axis2-kernel-1.4.1.jar

Description: Core Parts of Axis 2.0. This includes Axis 2.0 engine, Client API, Addressing support, etc.,

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\axis2-kernel-1.4.1.jar
MD5: f5f5255626be01918cece10d14f937df
SHA1: fd59331a4bbc734c290744316e627ea343329f49

Identifiers

CVE-2012-5785  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Axis2/Java 1.6.2 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Vulnerable Software & Versions: (show all)

CVE-2012-5351  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CWE: CWE-287 Improper Authentication

Apache Axis2 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a "Signature exclusion attack," a different vulnerability than CVE-2012-4418.

Vulnerable Software & Versions:

CVE-2012-4418  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-287 Improper Authentication

Apache Axis2 allows remote attackers to forge messages and bypass authentication via an "XML Signature wrapping attack."

Vulnerable Software & Versions:

CVE-2010-2103  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in axis2-admin/axis2-admin/engagingglobally in the administration console in Apache Axis2/Java 1.4.1, 1.5.1, and possibly other versions, as used in SAP Business Objects 12, 3com IMC, and possibly other products, allows remote attackers to inject arbitrary web script or HTML via the modules parameter. NOTE: some of these details are obtained from third party information.

Vulnerable Software & Versions: (show all)

CVE-2010-1632  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to the Synapse SimpleStockQuoteService.

Vulnerable Software & Versions: (show all)

CVE-2010-0219  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-255 Credentials Management

Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.

Vulnerable Software & Versions: (show all)

backport-util-concurrent-3.1.jar

Description: Dawid Kurzyniec's backport of JSR 166

License:

Public Domain: http://creativecommons.org/licenses/publicdomain
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\backport-util-concurrent-3.1.jar
MD5: 748bb0cbf4780b2e3121dc9c12e10cd9
SHA1: 682f7ac17fed79e92f8e87d8455192b63376347b

Identifiers

bootable-0.1.0.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\bootable-0.1.0.jar
MD5: 22d05d41c7d7174a1166802d5cb34a01
SHA1: f8801c5780e56c6b7e86b3a729b0f4003225dae7

Identifiers

  • maven: org.owasp.testing:bootable:0.1.0   Confidence:HIGH

bootable-0.1.0.jar: lib-0.1.0.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\bootable-0.1.0.jar\lib\lib-0.1.0.jar
MD5: 877e0eb39e3c985e2c1d553bb6dad934
SHA1: 13af17492135898d8ebced6cfe7aa3b9914ddeaa

Identifiers

  • maven: org.owasp.testing:lib:0.1.0   Confidence:HIGH

ffmpeg\ffmpeg_version.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\3rdparty\ffmpeg\ffmpeg_version.cmake
MD5: 47c336385aec534dee9a316f3ac04773
SHA1: 81feb6f931f727482b71b2e34f325387f46ad09b

Identifiers

CVE-2011-4031  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer underflow in the asfrtp_parse_packet function in libavformat/rtpdec_asf.c in FFmpeg before 0.8.3 allows remote attackers to execute arbitrary code via a crafted ASF packet.

Vulnerable Software & Versions: (show all)

CVE-2009-0385  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer signedness error in the fourxm_read_header function in libavformat/4xm.c in FFmpeg before revision 16846 allows remote attackers to execute arbitrary code via a malformed 4X movie file with a large current_track value, which triggers a NULL pointer dereference.

Vulnerable Software & Versions:

CVE-2005-4048  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in the avcodec_default_get_buffer function (utils.c) in FFmpeg libavcodec 0.4.9-pre1 and earlier, as used in products such as (1) mplayer, (2) xine-lib, (3) Xmovie, and (4) GStreamer, allows remote attackers to execute arbitrary commands via small PNG images with palettes.

Vulnerable Software & Versions: (show all)

cmake\cl2cpp.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\cl2cpp.cmake
MD5: 39ac6f35af7d4dd3ac3d75c06afe0613
SHA1: 1113347fe96d7d514c9f0bf711b96b352808dd0a

Identifiers

  • None

cmake\copyAndroidLibs.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\copyAndroidLibs.cmake
MD5: 6cea8a766548a7db3855ccec5627271d
SHA1: 8c9e2de7b35767238467548af3e05166e39edf4f

Identifiers

  • None

cmake\FindCUDA.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\FindCUDA.cmake
MD5: 082b257f892af1049627ab591e88ad5e
SHA1: 30b72858802f64c3e5331b6ec70e59dbad58673a

Identifiers

  • None

FindCUDA\make2cmake.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\FindCUDA\make2cmake.cmake
MD5: 5a3c246f2fc21437ba265fa979b160d8
SHA1: 43d5d598c58f5f140d162975a92d2730806cce3f

Identifiers

  • None

FindCUDA\parse_cubin.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\FindCUDA\parse_cubin.cmake
MD5: 5e5fb166c6c93c04621796f04189d0d7
SHA1: 3ecad79fcfe7c5d88a1535d1030026e1fcb2fce0

Identifiers

  • None

FindCUDA\run_nvcc.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\FindCUDA\run_nvcc.cmake
MD5: d6160a6dcaaec3e526bc34cfcea2ee23
SHA1: 0349f1a43fbd380b0c7b578ae3242a7cb6d43cae

Identifiers

  • None

cmake\OpenCVCompilerOptions.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVCompilerOptions.cmake
MD5: b40df1c984b511841c40d05a907d433d
SHA1: 30589febdc497eb330eb932a6a1f10197b362fb4

Identifiers

  • None

cmake\OpenCVConfig.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVConfig.cmake
MD5: f1f68ff13813a495470c6e73cc9b892a
SHA1: ad85337bb1ccac4a1261f6dda6ad1efcbce8b19d

Identifiers

  • None

cmake\OpenCVCRTLinkage.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVCRTLinkage.cmake
MD5: 7f8dcbf9848068f53e352679c0859cd5
SHA1: 25bcb6542245cf8497b467a1363fdf6adeaa67e2

Identifiers

  • None

cmake\OpenCVDetectAndroidSDK.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectAndroidSDK.cmake
MD5: bd17bbe3d290b31f39ca4f7876baf725
SHA1: c72e36dd3a7e6b933595c0724a2ce47a9d0fc45e

Identifiers

  • cpe: cpe:/a:android:android_sdk:-   Confidence:LOW   

cmake\OpenCVDetectApacheAnt.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectApacheAnt.cmake
MD5: c94b15ca35aec95bb1bdc6a8eec5ede1
SHA1: 33e018cfb004b30a5bd9c58e613172c36d74af41

Identifiers

  • None

cmake\OpenCVDetectCStripes.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectCStripes.cmake
MD5: b7be59d929d4daf4ff6e367cd413f795
SHA1: a9e20a51d1d50603da768ab3fd7b6fdc03257370

Identifiers

  • None

cmake\OpenCVDetectCUDA.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectCUDA.cmake
MD5: e8acb70a35eafaf93531804da5b3e827
SHA1: ca9162fe9849f5ebe84e14fc0ac6ea2a864da811

Identifiers

  • None

cmake\OpenCVDetectCXXCompiler.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectCXXCompiler.cmake
MD5: d57d4cab100ce6d86a2abcf43895759d
SHA1: 1ed30817b5b2dd7c02d832ba95654ae120175715

Identifiers

  • None

cmake\OpenCVDetectDirectX.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectDirectX.cmake
MD5: 30652d429f0a8562c7e8856517c4514d
SHA1: ce1afeafae26f37681b1a5ac698723e9d098dcff

Identifiers

  • None

cmake\OpenCVDetectOpenCL.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectOpenCL.cmake
MD5: 7420a52a371cea66b93e2067c70b7f38
SHA1: 7d318b5bf007a532d3adc8f1c6978fdb365fa2c5

Identifiers

  • None

cmake\OpenCVDetectPython.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectPython.cmake
MD5: 5be7cd9ed88517f1017de27b8eb3228c
SHA1: 9bc4060369dbf9e7ece57639db81488115c84e13

Identifiers

  • cpe: cpe:/a:python:python:-   Confidence:LOW   

CVE-2016-5699  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')

CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.

Vulnerable Software & Versions: (show all)

CVE-2016-5636  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-190 Integer Overflow or Wraparound

Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.

Vulnerable Software & Versions: (show all)

CVE-2016-1494  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-20 Improper Input Validation

The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack.

Vulnerable Software & Versions:

CVE-2016-0772  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-693 Protection Mechanism Failure

The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."

Vulnerable Software & Versions: (show all)

CVE-2015-5652  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says "It was determined that this is a longtime behavior of Python that cannot really be altered at this point."

Vulnerable Software & Versions:

CVE-2014-7185  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

Vulnerable Software & Versions: (show all)

CVE-2013-7338  

Severity: High
CVSS Score: 7.1 (AV:N/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.

Vulnerable Software & Versions: (show all)

CVE-2012-1150  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-310 Cryptographic Issues

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Vulnerable Software & Versions: (show all)

CVE-2012-0845  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.

Vulnerable Software & Versions: (show all)

CVE-2011-4940  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The list_directory function in Lib/SimpleHTTPServer.py in SimpleHTTPServer in Python before 2.5.6c1, 2.6.x before 2.6.7 rc2, and 2.7.x before 2.7.2 does not place a charset parameter in the Content-Type HTTP header, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer 7 via UTF-7 encoding.

Vulnerable Software & Versions: (show all)

CVE-2010-3492  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The asyncore module in Python before 3.2 does not properly handle unsuccessful calls to the accept function, and does not have accompanying documentation describing how daemon applications should handle unsuccessful calls to the accept function, which makes it easier for remote attackers to conduct denial of service attacks that terminate these applications via network connections.

Vulnerable Software & Versions: (show all)

cmake\OpenCVDetectTBB.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectTBB.cmake
MD5: 35189457dc179a836ad4484994d5976d
SHA1: 40ea5f223fe4deb3713b3f3d2e16e6e1b6772617

Identifiers

  • None

cmake\OpenCVDetectVTK.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVDetectVTK.cmake
MD5: c134da83c26ab7a2da167d844c79ad03
SHA1: 47fe39d954f02e6ece66d6b30294798c2d1057bf

Identifiers

  • None

cmake\OpenCVExtraTargets.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVExtraTargets.cmake
MD5: 300f1984f05136a2550662b4bba28484
SHA1: f9df6c52285f609bc449e0d264cec3ba4d33495c

Identifiers

  • None

cmake\OpenCVFindIntelPerCSDK.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindIntelPerCSDK.cmake
MD5: 4a8839ddf7a69626978b6f51d8148ba8
SHA1: a0c46db81c0ccadc5c0d4d8d1b28c506836e3dc5

Identifiers

  • None

cmake\OpenCVFindIPP.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindIPP.cmake
MD5: 1b0e6265a662426ed5ee3a8eae3571f1
SHA1: 1bffb60918a63d6865165cb47e53d08971bfdb3e

Identifiers

  • None

cmake\OpenCVFindIPPAsync.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindIPPAsync.cmake
MD5: 9053f0d6f31a969eaa1fc6ae03d72b45
SHA1: 0487f605adcfaabf4c4d2898691c3c453c6cd98d

Identifiers

  • None

cmake\OpenCVFindLATEX.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindLATEX.cmake
MD5: c048924d7b99ee46b0ad194b0e9236a2
SHA1: 59493c4b35f9772e5f46b8195804b73bc0b8cd68

Identifiers

  • None

cmake\OpenCVFindLibsGrfmt.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindLibsGrfmt.cmake
MD5: 471c89912ae29f34ce3d8951bfaba775
SHA1: e41b7bd06b878254fba925fd6d5d97e8f7e4abdd

Identifiers

  • None

cmake\OpenCVFindLibsGUI.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindLibsGUI.cmake
MD5: c744b1958188a1418eab4eb8f295631a
SHA1: e4791e1c486531692bc0aa07ee144276ff957b17

Identifiers

  • None

cmake\OpenCVFindLibsPerf.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindLibsPerf.cmake
MD5: 10f99115bf875881b2802eabd746a628
SHA1: 1ebfda9512e60f2f75ec491b17c3b2bf3649980d

Identifiers

  • None

cmake\OpenCVFindLibsVideo.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindLibsVideo.cmake
MD5: 4d81f6af4a31bd51dee812e87617219d
SHA1: 979689596b9e86b846f514d87e56bf87895c1279

Identifiers

  • None

cmake\OpenCVFindMatlab.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindMatlab.cmake
MD5: 9f8df03241c51e2003d1bcfe9f99949d
SHA1: 895e96702c15ae75ed3a9904762104e8e67c9349

Identifiers

  • None

cmake\OpenCVFindOpenEXR.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindOpenEXR.cmake
MD5: c596e3648c5aed16362c90abf1a69885
SHA1: 91cd4c5d5cd98d1990f23dfd8a52de7525fe2636

Identifiers

  • cpe: cpe:/a:openexr:openexr:-   Confidence:LOW   

cmake\OpenCVFindOpenNI.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindOpenNI.cmake
MD5: 98bcd2f11e0793e231abd8a3ffb32faa
SHA1: b7274cea06a5973a42553d6b4b9ff428785f6d48

Identifiers

  • None

cmake\OpenCVFindOpenNI2.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindOpenNI2.cmake
MD5: 1409780229828db7219727ad64db1f6e
SHA1: daa97eb9f5072aa4bc951eda2a921fc35d2eac2b

Identifiers

  • None

cmake\OpenCVFindWebP.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindWebP.cmake
MD5: 02b64eac70bf1852a0be5fda17c92e11
SHA1: 949fb1bd9eeebf9b55eeaa3a8f4d95a450c47b13

Identifiers

  • None

cmake\OpenCVFindXimea.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVFindXimea.cmake
MD5: b65b6afa478b612f1ab8f4486b3ba791
SHA1: f8cf6b2baa915d9488062a317f2c6e473ad96ef1

Identifiers

  • None

cmake\OpenCVGenABI.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVGenABI.cmake
MD5: dab62ee8b994fba211e1877c88dcb7ae
SHA1: d01fed523caff4a3be0c0b0062e7a192f0b3e592

Identifiers

  • None

cmake\OpenCVGenAndroidMK.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVGenAndroidMK.cmake
MD5: 9523098110ae460e82b9d5e44ad4c7ad
SHA1: 63024b62e8b39fa23658b8ec10830d94b72587d9

Identifiers

  • None

cmake\OpenCVGenConfig.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVGenConfig.cmake
MD5: a2ab87729d247b60a7c4aaedd9a9389d
SHA1: 0bdf47a9c04ac44f62d8cf7806640bf8be9825b2

Identifiers

  • None

cmake\OpenCVGenHeaders.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVGenHeaders.cmake
MD5: 5a7d0877b8f16a4f5c62757a0051dcc5
SHA1: d7cfe5e707b00ec2e79d6aef77b339ea3c7b2f17

Identifiers

  • None

cmake\OpenCVGenInfoPlist.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVGenInfoPlist.cmake
MD5: ce0875d872f99c9ef28d52a8f59a85f2
SHA1: 313376669a28af75d25ab8b735132550a4f3052e

Identifiers

  • None

cmake\OpenCVGenPkgconfig.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVGenPkgconfig.cmake
MD5: 61f497e15c639f7231c0657cf51202fd
SHA1: d2e5ea3b8a68485bbac4a205c7a68217ed66e779

Identifiers

  • None

cmake\OpenCVMinDepVersions.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVMinDepVersions.cmake
MD5: d1dde2680e36cc1889856ca3f1502d2a
SHA1: 139df4b6c44a3454d180e608dcac8a6489c68a18

Identifiers

  • None

cmake\OpenCVModule.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVModule.cmake
MD5: 5f5dcd91004c42bdf9f42babcc2d2d56
SHA1: ff2a67f9ac07ca9e24060423f17ca6c9b9249a5b

Identifiers

  • None

cmake\OpenCVPackaging.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVPackaging.cmake
MD5: 523b5531ee9126224ba0573830643176
SHA1: 96797a22ee5edac0629dc40cbe823f492d531d69

Identifiers

  • None

cmake\OpenCVPCHSupport.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVPCHSupport.cmake
MD5: 9d50a0c038a112a9f3b4312930244fd0
SHA1: ed94777aaa7d9f2b58411a3ce2ec38863473f9f7

Identifiers

  • None

cmake\OpenCVUtils.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVUtils.cmake
MD5: bf033cbe5749eb6eb060c3ac076a33f8
SHA1: 97c14247374bce9ff0595063c2fe0ff96081b0fb

Identifiers

  • None

cmake\OpenCVVersion.cmake

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\cmake\OpenCVVersion.cmake
MD5: 9afc0036841d17576b57b714120fc629
SHA1: aff16bf50579427fd3e55d407b0d3ac2f72ef18e

Identifiers

  • None

opencv\CMakeLists.txt

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\opencv\CMakeLists.txt
MD5: b1b39612f8273876aeed9039f3aa7254
SHA1: 69a4df896246065fc9a16ff259d415c833b9c95a

Identifiers

  • None

zlib\CMakeLists.txt

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\cmake\zlib\CMakeLists.txt
MD5: 6452c3208faaaafdb71447a509a9c78a
SHA1: 7b4d80f4fe6bf3086fa3f6c19a8fc8179e172721

Identifiers

  • None

commons-cli-1.2.jar

Description:  Commons CLI provides a simple API for presenting, processing and validating a command line interface.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-cli-1.2.jar
MD5: bfdcae1ff93f0c07d733f03bdce28c9e
SHA1: 2bf96b7aa8b611c177d329452af1dc933e14501c

Identifiers

commons-codec-1.2.jar

Description: The codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-codec-1.2.jar
MD5: 2617b220009f952bb9542af167d040cf
SHA1: 397f4731a9f9b6eb1907e224911c77ea3aa27a8b

Identifiers

commons-collections-3.2.2.jar

Description: Types that extend and augment the Java Collections Framework.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-collections-3.2.2.jar
MD5: f54a8510f834a1a57166970bfc982e94
SHA1: 8ad72fe39fa8c91eaaf12aadb21e0c3661fe26d5

Identifiers

commons-compress-1.12.jar

Description:  Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE and ar, cpio, jar, tar, zip, dump, 7z, arj.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-compress-1.12.jar
MD5: b394a44c74c1e904c1ab6df0893ebb7e
SHA1: 84caa68576e345eb5e7ae61a0e5a9229eb100d7b

Identifiers

commons-fileupload-1.2.1.jar

Description:  The FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-fileupload-1.2.1.jar
MD5: 951b36984148fc4f4e901f06ab382273
SHA1: 384faa82e193d4e4b0546059ca09572654bc3970

Identifiers

CVE-2016-3092  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.

Vulnerable Software & Versions: (show all)

CVE-2014-0050  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.

Vulnerable Software & Versions: (show all)

CVE-2013-0248  

Severity: Low
CVSS Score: 3.3 (AV:L/AC:M/Au:N/C:N/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.

Vulnerable Software & Versions: (show all)

commons-httpclient-3.1.jar

Description: The HttpClient component supports the client-side of RFC 1945 (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework by which new request types (methods) or HTTP extensions can be created easily.

License:

Apache License: http://www.apache.org/licenses/LICENSE-2.0
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-httpclient-3.1.jar
MD5: 8ad8c9229ef2d59ab9f59f7050e846a5
SHA1: 964cd74171f427720480efdec40a7c7f6e58426a

Identifiers

  • maven: commons-httpclient:commons-httpclient:3.1   Confidence:HIGHEST
  • cpe: cpe:/a:apache:commons-httpclient:3.1   Confidence:LOW   
  • cpe: cpe:/a:apache:httpclient:3.1   Confidence:LOW   

CVE-2015-5262  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.

Vulnerable Software & Versions:

CVE-2014-3577  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

Vulnerable Software & Versions: (show all)

commons-io-2.5.jar

Description:  The Apache Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-io-2.5.jar
MD5: e2d74794fba570ec2115fb9d5b05dc9b
SHA1: 2852e6e05fbb95076fc091f6d1780f1f8fe35e0f

Identifiers

commons-lang-2.4.jar

Description:  Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-lang-2.4.jar
MD5: 237a8e845441bad2e535c57d985c8204
SHA1: 16313e02a793435009f1e458fa4af5d879f6fb11

Identifiers

commons-lang3-3.3.2.jar

Description:  Apache Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-lang3-3.3.2.jar
MD5: 3128bf75a2549ebe38663401191bacab
SHA1: 90a3822c38ec8c996e84c16a3477ef632cbc87a3

Identifiers

commons-logging-1.1.1.jar

Description: Commons Logging is a thin adapter allowing configurable bridging to other, well known logging systems.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-logging-1.1.1.jar
MD5: ed448347fc0104034aa14c8189bf37de
SHA1: 5043bfebc3db072ed80fbd362e7caf00e885d8ae

Identifiers

commons-pool-1.5.3.jar

Description: Commons Object Pooling Library

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-pool-1.5.3.jar
MD5: 0c6fdbaaac00387df7d738379422912e
SHA1: 7ad440d63c6eea5e79f1737e264810c76258d042

Identifiers

commons-validator-1.4.0.jar

Description:  Commons Validator provides the building blocks for both client side validation and server side data validation. It may be used standalone or with a framework like Struts.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\commons-validator-1.4.0.jar
MD5: 8f381c168688704a85c550cf343a5ca2
SHA1: 42fa1046955ade59f5354a1876cfc523cea33815

Identifiers

composer.lock

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\composer.lock
MD5: a4846582d3f217ac97801948bf8c496c
SHA1: 875ecf45948aeed57d09c0ddba43e5b2e99fa8c7

Identifiers

  • None

daytrader-ear-2.1.7.ear

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\daytrader-ear-2.1.7.ear
MD5: 9fa8c4e8072904589fc0d1a12e8eb291
SHA1: 61868609eb138c41c0298373c9f8c19713fefa54

Identifiers

  • None

daytrader-ear-2.1.7.ear: dt-ejb.jar

Description: Daytrader EJBs

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\daytrader-ear-2.1.7.ear\dt-ejb.jar
MD5: 26e92dbacad11c73f03ede043b113653
SHA1: f2f7c05243ec8e5fb93efb35f5908bba88651bf3

Identifiers

CVE-2011-5034  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.

Vulnerable Software & Versions: (show all)

CVE-2008-0732  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-59 Improper Link Resolution Before File Access ('Link Following')

The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.

Vulnerable Software & Versions:

daytrader-ear-2.1.7.ear: geronimo-jaxrpc_1.1_spec-2.0.0.jar

Description: Provides open-source implementations of Sun specifications.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\daytrader-ear-2.1.7.ear\geronimo-jaxrpc_1.1_spec-2.0.0.jar
MD5: 89b6273486a7c78353d919941f9f843c
SHA1: 4fad4b521e38ef8d9a2434a2421a9a1dc7910285

Identifiers

daytrader-ear-2.1.7.ear: streamer.jar

Description: Streamer Application for Day Trader

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\daytrader-ear-2.1.7.ear\streamer.jar
MD5: 5bc6de1a34935d20331ef777463fd28b
SHA1: ec631c926ab667182840b3e5e32bd3d2f8a808ac

Identifiers

CVE-2011-5034  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.

Vulnerable Software & Versions: (show all)

CVE-2008-0732  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-59 Improper Link Resolution Before File Access ('Link Following')

The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.

Vulnerable Software & Versions:

daytrader-ear-2.1.7.ear: web.war

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\daytrader-ear-2.1.7.ear\web.war
MD5: 857655bb1ddb4204f09d63e5ca8c56bc
SHA1: 7a7455f5d78bb4e1b8e66cd3e6c1f964d18705f9

Identifiers

  • None

daytrader-ear-2.1.7.ear: wsappclient.jar

Description: Client demonstrating Web Services

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\daytrader-ear-2.1.7.ear\wsappclient.jar
MD5: c343646c162fdd19156400fe83f41ce2
SHA1: ece01974be048ba75e2b344c39efb176915a1c16

Identifiers

CVE-2011-5034  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.

Vulnerable Software & Versions: (show all)

CVE-2008-0732  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-59 Improper Link Resolution Before File Access ('Link Following')

The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.

Vulnerable Software & Versions:

dependency-check-utils-1.4.4-SNAPSHOT.jar

Description: dependency-check-utils is a collection of common utility classes used within dependency-check that might be useful in other projects.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\dependency-check-utils-1.4.4-SNAPSHOT.jar
MD5: c1c61050f7fdb6af867729d932610092
SHA1: 62504c3acda5ffa039bca63231caee6209dc69bb

Identifiers

  • maven: org.owasp:dependency-check-utils:1.4.4-SNAPSHOT   Confidence:HIGH

dojo-war-1.3.0.war

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\dojo-war-1.3.0.war
MD5: cd00cb6bc15004638548148a21d799aa
SHA1: 36572b4e096421becab9346da41bbc4ec1316a54

Identifiers

CVE-2010-2276  

Severity: High
CVSS Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-16 Configuration

The default configuration of the build process in Dojo 0.4.x before 0.4.4, 1.0.x before 1.0.3, 1.1.x before 1.1.2, 1.2.x before 1.2.4, 1.3.x before 1.3.3, and 1.4.x before 1.4.2 has the copyTests=true and mini=false options, which makes it easier for remote attackers to have an unspecified impact via a request to a (1) test or (2) demo component.

Vulnerable Software & Versions: (show all)

CVE-2010-2275  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in dijit/tests/_testCommon.js in Dojo Toolkit SDK before 1.4.2 allows remote attackers to inject arbitrary web script or HTML via the theme parameter, as demonstrated by an attack against dijit/tests/form/test_Button.html.

Vulnerable Software & Versions: (show all)

CVE-2010-2274  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Multiple open redirect vulnerabilities in Dojo 1.0.x before 1.0.3, 1.1.x before 1.1.2, 1.2.x before 1.2.4, 1.3.x before 1.3.3, and 1.4.x before 1.4.2 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, possibly related to dojo/resources/iframe_history.html, dojox/av/FLAudio.js, dojox/av/FLVideo.js, dojox/av/resources/audio.swf, dojox/av/resources/video.swf, util/buildscripts/jslib/build.js, util/buildscripts/jslib/buildUtil.js, and util/doh/runner.html.

Vulnerable Software & Versions: (show all)

CVE-2010-2273  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in Dojo 1.0.x before 1.0.3, 1.1.x before 1.1.2, 1.2.x before 1.2.4, 1.3.x before 1.3.3, and 1.4.x before 1.4.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly related to dojo/resources/iframe_history.html, dojox/av/FLAudio.js, dojox/av/FLVideo.js, dojox/av/resources/audio.swf, dojox/av/resources/video.swf, util/buildscripts/jslib/build.js, and util/buildscripts/jslib/buildUtil.js, as demonstrated by the (1) dojoUrl and (2) testUrl parameters to util/doh/runner.html.

Vulnerable Software & Versions: (show all)

dwr.jar

Description: DWR is easy Ajax for Java.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\dwr.jar
MD5: b7f7865f90401b843ef5c032e6767f7f
SHA1: 3b8c0e896a586f825e31af06508b321b520e5aeb

Identifiers

CVE-2007-0185  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Getahead Direct Web Remoting (DWR) before 1.1.4 allows attackers to cause a denial of service (memory exhaustion and servlet outage) via unknown vectors related to a large number of calls in a batch.

Vulnerable Software & Versions: (show all)

CVE-2007-0184  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Getahead Direct Web Remoting (DWR) before 1.1.4 allows attackers to obtain unauthorized access to public methods via a crafted request that bypasses the include/exclude checks.

Vulnerable Software & Versions: (show all)

CVE-2006-6916  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Getahead Direct Web Remoting (DWR) before 1.1.3 allows attackers to cause a denial of service (infinite loop) via unknown vectors related to "crafted input."

Vulnerable Software & Versions:

ehcache-core-2.2.0.jar

Description: This is the ehcache core module. Pair it with other modules for added functionality.

License:

The Apache Software License, Version 2.0: src/assemble/LICENSE.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\ehcache-core-2.2.0.jar
MD5: 2c95e83b612691ba2a54e0c56cb9177f
SHA1: c3fba1f00073a38d370990ce7d8b5d4f9b05a11a

Identifiers

FileHelpers.2.0.0.0.nupkg

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\FileHelpers.2.0.0.0.nupkg
MD5: 0bf948b505852a2af8a597b8a129ef9a
SHA1: 30fb37d6163cf16e3ba740343becdd14d5457619

Identifiers

  • cpe: cpe:/a:file:file:2.0.0.0   Confidence:LOW   

CVE-2007-1536  

Severity: High
CVSS Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CWE: CWE-189 Numeric Errors

Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

FileHelpers.2.0.0.0.nupkg: FileHelpers.nuspec

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\FileHelpers.2.0.0.0.nupkg\FileHelpers.nuspec
MD5: 9e2287f0174bcd79cf7e2427d73a1197
SHA1: d14a722b66388d84ac3b57c4de56e702aa5fea96

Identifiers

  • None

FileHelpers.2.0.0.0.nupkg: FileHelpers.dll

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\FileHelpers.2.0.0.0.nupkg\lib\FileHelpers.dll
MD5: 4829fa768de37c315a3a3b7bca027b64
SHA1: a256f622a6209ec21a13d490443ffd6dbda4f5b7

Identifiers

  • None

FileHelpers.2.0.0.0.nupkg: FileHelpers.ExcelStorage.dll

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\FileHelpers.2.0.0.0.nupkg\lib\FileHelpers.ExcelStorage.dll
MD5: d22aeca6ee71a2e6f5b3d296280ba98a
SHA1: e416350e2ee0e0711e2716cf7efce54168accc52

Identifiers

  • None

FileHelpers.2.0.0.0.nupkg: Interop.Excel.dll

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\FileHelpers.2.0.0.0.nupkg\lib\Interop.Excel.dll
MD5: 728ff3aeae71cbd8d303f442e3843c4c
SHA1: cdaa993485f737951fd91c71f41c929cd06dffa3

Identifiers

  • None

FileHelpers.2.0.0.0.nupkg: Interop.Office.dll

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\FileHelpers.2.0.0.0.nupkg\lib\Interop.Office.dll
MD5: 7b55e3bf19775b7a6fa5bf3c271e2c0c
SHA1: eefcfe4b0c90b6f4232d07d588a08bc04fd32e84

Identifiers

  • None

freemarker-2.3.12.jar

Description:  FreeMarker is a "template engine"; a generic tool to generate text output based on templates.

License:

BSD-style license: http://www.freemarker.org/LICENSE.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\freemarker-2.3.12.jar
MD5: 719554bbc3d8a98582a8a93328134fe2
SHA1: 3501b670aa7e3822ddf7693082f621b1cd8ce086

Identifiers

geronimo-activation_1.1_spec-1.0.1.jar

Description: Provides open-source implementations of Sun specifications.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\geronimo-activation_1.1_spec-1.0.1.jar
MD5: fd89b8782af5fd2ac1cadb006477e828
SHA1: 79c75e201af44cf766e78a2515c3f88a19f69e1f

Identifiers

geronimo-javamail_1.4_spec-1.2.jar

Description: Provides open-source implementations of Sun specifications.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\geronimo-javamail_1.4_spec-1.2.jar
MD5: f9f0465816f2db5fa9f409fb1d9700c8
SHA1: 0f6b07582a3d6ba452b10527fb508809aff8b353

Identifiers

geronimo-jms_1.1_spec-1.1.1.jar

Description: Provides open-source implementations of Sun specifications.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\geronimo-jms_1.1_spec-1.1.1.jar
MD5: d80ce71285696d36c1add1989b94f084
SHA1: c872b46c601d8dc03633288b81269f9e42762cea

Identifiers

geronimo-jpa_2.0_spec-1.1.jar

Description: Implementation of Sun JSR-317 JPA 2.0 Spec API

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\geronimo-jpa_2.0_spec-1.1.jar
MD5: 007c972f6dcfea68a6686b262c6f3d2f
SHA1: f4d90788691f5f5f201f39a53a23d392cde660a3

Identifiers

geronimo-jta_1.1_spec-1.1.1.jar

Description: Provides open-source implementations of Sun specifications.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\geronimo-jta_1.1_spec-1.1.1.jar
MD5: 4aa8d50456bcec0bf6f032ceb182ad64
SHA1: aabab3165b8ea936b9360abbf448459c0d04a5a4

Identifiers

geronimo-stax-api_1.0_spec-1.0.1.jar

Description: Provides open-source implementations of Sun specifications.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\geronimo-stax-api_1.0_spec-1.0.1.jar
MD5: b7c2a715cd3d1c43dc4ccfae426e8e2e
SHA1: 1c171093a8b43aa550c6050ac441abe713ebb4f2

Identifiers

guice-3.0.jar

Description: Guice is a lightweight dependency injection framework for Java 5 and above

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\guice-3.0.jar
MD5: ca1c7ba366884cfcd2cfb48d2395c400
SHA1: 9d84f15fe35e2c716a02979fb62f50a29f38aefa

Identifiers

h2-1.3.176.jar

Description: H2 Database Engine

License:

The H2 License, Version 1.0: http://h2database.com/html/license.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\h2-1.3.176.jar
MD5: 9c15d378136b31e4fd8f54561e90713a
SHA1: fd369423346b2f1525c413e33f8cf95b09c92cbd

Identifiers

hamcrest-core-1.3.jar

Description:  This is the core API of hamcrest matcher framework to be used by third-party framework providers. This includes the a foundation set of matcher implementations for common operations.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\hamcrest-core-1.3.jar
MD5: 6393363b47ddcbba82321110c3e07519
SHA1: 42a25dc3219429f0e5d060061f71acb49bf010a0

Identifiers

hazelcast-2.5.jar

Description: Hazelcast In-Memory DataGrid

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\hazelcast-2.5.jar
MD5: cecb9f89cf60f8947451f620e542cbc8
SHA1: 3614fa9e42e8cd4d124ca37a2edb36d0e926959d

Identifiers

hibernate3.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\hibernate3.jar
MD5: b22bbafa38341db968033f1acbfa8dd9
SHA1: 826da9fc452e7009116dffc2d348ba705fe2aa82

Identifiers

  • None

httpcore-4.0-beta1.jar

Description:  HttpComponents Core (Java 1.3 compatible)

License:

Apache License: ../LICENSE.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\httpcore-4.0-beta1.jar
MD5: 7515cfff71e32ce55d5ba6b73251d93a
SHA1: c642a5f7c20539840957584b1af2ad798cd1ba52

Identifiers

httpcore-nio-4.0-beta1.jar

Description:  HttpComponents Core (NIO extensions)

License:

Apache License: ../LICENSE.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\httpcore-nio-4.0-beta1.jar
MD5: 926965bc84b5f5f138df66ddd05baed0
SHA1: a0d825beaa0bc0b03fcf11315abc4b7fd60fe2e8

Identifiers

javax.inject-1.jar

Description: The javax.inject API

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\javax.inject-1.jar
MD5: 289075e48b909e9e74e6c915b3631d2e
SHA1: 6975da39a7040257bd51d21a231b76c915872d38

Identifiers

javax.json-1.0.4.jar

Description: Default provider for JSR 353:Java API for Processing JSON

License:

https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\javax.json-1.0.4.jar
MD5: 569870f975deeeb6691fcb9bc02a9555
SHA1: 3178f73569fd7a1e5ffc464e680f7a8cc784b85a

Identifiers

jaxb-xercesImpl-1.5.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\jaxb-xercesImpl-1.5.jar
MD5: 8cd074364c830fc8ff40a8a19c0a74c8
SHA1: 73a51faadb407dccdbd77234e0d5a0a648665692

Identifiers

jaxen-1.1.1.jar

Description: Jaxen is a universal Java XPath engine.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\jaxen-1.1.1.jar
MD5: 261d1aa59865842ecc32b3848b0c6538
SHA1: 9f5d3c5974dbe5cf69c2c2ec7d8a4eb6e0fce7f9

Identifiers

jcip-annotations-1.0.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\jcip-annotations-1.0.jar
MD5: 9d5272954896c5a5d234f66b7372b17a
SHA1: afba4942caaeaf46aab0b976afd57cc7c181467e

Identifiers

jetty-6.1.0.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\jetty-6.1.0.jar
MD5: 121a72b1dea1a9adf83079a44ca08e7b
SHA1: fb39ebc0cdccea6b54ad87d229a352a894eebecc

Identifiers

CVE-2011-4461  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-310 Cryptographic Issues

Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

Vulnerable Software & Versions: (show all)

CVE-2009-4612  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the WebApp JSP Snoop page in Mort Bay Jetty 6.1.x through 6.1.21 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under (1) jspsnoop/, (2) jspsnoop/ERROR/, and (3) jspsnoop/IOException/, and possibly the PATH_INFO to (4) snoop.jsp.

Vulnerable Software & Versions: (show all)

CVE-2009-4611  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

Mort Bay Jetty 6.x and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.

Vulnerable Software & Versions: (show all)

CVE-2009-4610  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.x and 7.0.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/.

Vulnerable Software & Versions: (show all)

CVE-2009-4609  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The Dump Servlet in Mort Bay Jetty 6.x and 7.0.0 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.

Vulnerable Software & Versions: (show all)

CVE-2009-1524  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before 6.1.17 allows remote attackers to inject arbitrary web script or HTML via a directory listing request containing a ; (semicolon) character.

Vulnerable Software & Versions: (show all)

CVE-2009-1523  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.

Vulnerable Software & Versions: (show all)

CVE-2007-5615  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')

CRLF injection vulnerability in Mortbay Jetty before 6.1.6rc0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Vulnerable Software & Versions:

CVE-2007-5614  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Mortbay Jetty before 6.1.6rc1 does not properly handle "certain quote sequences" in HTML cookie parameters, which allows remote attackers to hijack browser sessions via unspecified vectors.

Vulnerable Software & Versions: (show all)

CVE-2007-5613  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in Dump Servlet in Mortbay Jetty before 6.1.6rc1 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters and cookies.

Vulnerable Software & Versions: (show all)

jmockit-1.24.jar

Description:  JMockit is a Java toolkit for automated developer testing. It contains mocking and faking APIs and a code coverage tool, supporting both JUnit and TestNG. The mocking API allows all kinds of Java code, without testability restrictions, to be tested in isolation from selected dependencies.

License:

The MIT License: http://www.opensource.org/licenses/mit-license.php
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\jmockit-1.24.jar
MD5: 27c6e2be6bda6f78f83604d1f1d40006
SHA1: c8f3d57267a9979727da9d679921f1e60fa2beec

Identifiers

jsoup-1.9.2.jar

Description: jsoup HTML parser

License:

The MIT License: https://jsoup.org/license
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\jsoup-1.9.2.jar
MD5: a8627c801e0d16169ef9ca83cf89861a
SHA1: 5e3bda828a80c7a21dfbe2308d1755759c2fd7b4

Identifiers

jsr305-3.0.1.jar

Description: JSR305 Annotations for Findbugs

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\jsr305-3.0.1.jar
MD5: c6532beb3f7cc54a8d73d25d5602b9e4
SHA1: f7be08ec23c21485b9b5a1cf1654c2ec8c58168d

Identifiers

junit-4.12.jar

Description: JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck.

License:

Eclipse Public License 1.0: http://www.eclipse.org/legal/epl-v10.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\junit-4.12.jar
MD5: 5b38c40c97fbd0adee29f91e60405584
SHA1: 2973d150c0dc1fefe998f834810d68f278ea58ec

Identifiers

junit4-ant-2.0.13.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\junit4-ant-2.0.13.jar
MD5: ebab7fecab4398e859176ecb81e63d0e
SHA1: 33904a47c5f920d270437ea1075cc9fa5ecb8099

Identifiers

log4net.2.0.3.nuspec

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\log4net.2.0.3.nuspec
MD5: d95207bfd2539c046ba7271b695b08f7
SHA1: b82102a0767f56525926698fbba4b7c47e96d4ab

Identifiers

  • cpe: cpe:/a:apache:log4net:2.0.3   Confidence:LOW   

log4net.dll

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\log4net.dll
MD5: e873f47ff9ed73a7ed7054aaf4e7601a
SHA1: 44d7ee86c72be615da883a24f0b54fd0725ad298

Identifiers

  • cpe: cpe:/a:apache:log4net:1.2.13.0   Confidence:LOW   

logback-classic-1.1.7.jar

Description: logback-classic module

License:

http://www.eclipse.org/legal/epl-v10.html, http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\logback-classic-1.1.7.jar
MD5: 7373c8ad1bfa162332d7d13c4596c2a1
SHA1: 9865cf6994f9ff13fce0bf93f2054ef6c65bb462

Identifiers

logback-core-1.1.7.jar

Description: logback-core module

License:

http://www.eclipse.org/legal/epl-v10.html, http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\logback-core-1.1.7.jar
MD5: 4021551de5018dfa4b79ec553280f00a
SHA1: 7873092d39ef741575ca91378a6a21c388363ac8

Identifiers

lucene-analyzers-common-4.7.2.jar

Description: Additional Analyzers

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\lucene-analyzers-common-4.7.2.jar
MD5: cbc49dfc4ed6ee29db3a1ed5a84c5a9e
SHA1: 72017b7643f6e2389a140099a3fce198a569b599

Identifiers

lucene-codecs-4.7.2.jar

Description:  Codecs and postings formats for Apache Lucene.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\lucene-codecs-4.7.2.jar
MD5: c442ec2c5e403d9c6f8ba8ad8762cd81
SHA1: 386adfd04528461f9ddfa0ff839190f6a6d9c1a5

Identifiers

lucene-core-4.7.2.jar

Description: Apache Lucene Java Core

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\lucene-core-4.7.2.jar
MD5: 6ed7375bfe046610363a10915ce2dd8b
SHA1: c9ec1d5b48635aa032ca3d2c824dea0e6523a4a5

Identifiers

lucene-queries-4.7.2.jar

Description: Lucene Queries Module

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\lucene-queries-4.7.2.jar
MD5: fe815419a0aff3f76452ac516fffb680
SHA1: c357a2494e341f2680fccbf9e96138c7083aaad4

Identifiers

lucene-queryparser-4.7.2.jar

Description: Lucene QueryParsers module

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\lucene-queryparser-4.7.2.jar
MD5: e7c72fce30aae45d9e3ad43b24b2a58f
SHA1: 0ef6eb0d081065d3b69a4f097eec115a80f3a8f7

Identifiers

lucene-sandbox-4.7.2.jar

Description: Lucene Sandbox

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\lucene-sandbox-4.7.2.jar
MD5: a6e13813e4bf0d0053423a51b6588f4d
SHA1: 447747b4ddd1f2af2ae8a1759ada5988393e945c

Identifiers

lucene-test-framework-4.7.2.jar

Description: Apache Lucene Java Test Framework

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\lucene-test-framework-4.7.2.jar
MD5: ceef8bf76c02cb58b40d6e43a22c5165
SHA1: 194947eb27a42e777c2a02ff3b6842c8dbfd2678

Identifiers

mail-1.4.jar

Description:  The JavaMail API provides a platform-independent and protocol-independent framework to build mail and messaging applications.

License:

Common Development and Distribution License (CDDL) v1.0: https://glassfish.dev.java.net/public/CDDLv1.0.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\mail-1.4.jar
MD5: 2e64a3805d543bdb86e6e5eeca5529f8
SHA1: 1aa1579ae5ecd41920c4f355b0a9ef40b68315dd

Identifiers

CVE-2007-6059  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

** DISPUTED ** Javamail does not properly handle a series of invalid login attempts in which the same e-mail address is entered as username and password, and the domain portion of this address yields a Java UnknownHostException error, which allows remote attackers to cause a denial of service (connection pool exhaustion) via a large number of requests, resulting in a SQLNestedException. NOTE: Sun disputes this issue, stating "The report makes references to source code and files that do not exist in the mentioned products."

Vulnerable Software & Versions:

mailapi-1.5.6.jar

Description: JavaMail API (no providers)

License:

https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\mailapi-1.5.6.jar
MD5: 2d5d81cd7a3e1ca3caab3a3d70add6f7
SHA1: 8fe524d88c28362b50052200c28149bc8f1f45e4

Identifiers

CVE-2007-6059  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

** DISPUTED ** Javamail does not properly handle a series of invalid login attempts in which the same e-mail address is entered as username and password, and the domain portion of this address yields a Java UnknownHostException error, which allows remote attackers to cause a denial of service (connection pool exhaustion) via a large number of requests, resulting in a SQLNestedException. NOTE: Sun disputes this issue, stating "The report makes references to source code and files that do not exist in the mentioned products."

Vulnerable Software & Versions:

maven-scm-api-1.8.1.jar

Description: The SCM API provides mechanisms to manage all SCM tools.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\maven-scm-api-1.8.1.jar
MD5: c409fc1a6c9baf928cc37b2ffb852c83
SHA1: d72bcdc54a873e8bfbc53fde6200e53911c3d9fe

Identifiers

maven-scm-provider-cvs-commons-1.8.1.jar

Description: Common library for SCM CVS Provider.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\maven-scm-provider-cvs-commons-1.8.1.jar
MD5: 7d35f493a22226b821b5d5363e85765c
SHA1: 97411239d474ecafcc2ab89facaf2593eb0de49b

Identifiers

maven-scm-provider-cvsexe-1.8.1.jar

Description: Executable implementation for SCM CVS Provider.

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\maven-scm-provider-cvsexe-1.8.1.jar
MD5: 8900abe1192b79b35aedb0f683a8b412
SHA1: 5c7bf6d2c741885d2a6c17cb044ff8e2966f69ca

Identifiers

mysql-connector-java-5.1.27-bin.jar

File Path: C:\Users\jerem\projects\DependencyCheck\dependency-check-core\target\test-classes\mysql-connector-java-5.1.27-bin.jar
MD5: 0317d93cccab2dd08a7a3cca06403e78
SHA1: 180296391137c12da3ba2a35dcc93ef23fb2c1ff

Identifiers

CVE-2015-2575  

Severity: Medium
CVSS Score: 4.9 (AV:N/AC:M/Au:S/C:P/I:P/A:N)

Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.

Vulnerable Software & Versions:

CVE-2014-0437  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2014-0412  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.

Vulnerable Software & Versions: (show all)

CVE-2014-0402  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Locking.

Vulnerable Software & Versions: (show all)

CVE-2014-0401  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2014-0393  

Severity: Low
CVSS Score: 3.3 (AV:N/AC:L/Au:M/C:N/I:P/A:N)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect integrity via unknown vectors related to InnoDB.

Vulnerable Software & Versions: (show all)

CVE-2014-0386  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2014-0001  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.

Vulnerable Software & Versions: (show all)

CVE-2013-5908  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.

Vulnerable Software & Versions: (show all)

CVE-2013-3808  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.

Vulnerable Software & Versions: (show all)

CVE-2013-3804  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2013-3802  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.

Vulnerable Software & Versions: (show all)

CVE-2013-2392  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2013-2391  

Severity: Low
CVSS Score: 3.0 (AV:L/AC:M/Au:S/C:P/I:P/A:N)

Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.

Vulnerable Software & Versions: (show all)

CVE-2013-2389  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.

Vulnerable Software & Versions: (show all)

CVE-2013-2378  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)

Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.

Vulnerable Software & Versions: (show all)

CVE-2013-1555  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, and 5.5.29 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Partition.

Vulnerable Software & Versions: (show all)

CVE-2013-1552  

Severity: Medium
CVSS Score: 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)

Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2013-1548  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in Oracle MySQL 5.1.63 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Types.

Vulnerable Software & Versions: (show all)

CVE-2013-1521  

Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.

Vulnerable Software & Versions: (show all)

CVE-2013-1506  

Severity: Low
CVSS Score: 2.8 (AV:N/AC:M/Au:M/C:N/I:N/A:P)

Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.

Vulnerable Software & Versions: (show all)

CVE-2013-1492  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553.

Vulnerable Software & Versions: (show all)

CVE-2013-0389  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:L/Au:S/C:N/I:N/A:C)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2013-0385  

Severity: Medium
CVSS Score: 6.6 (AV:L/AC:L/Au:N/C:C/I:C/A:N)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication.

Vulnerable Software & Versions: (show all)

CVE-2013-0384  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:L/Au:S/C:N/I:N/A:C)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema.

Vulnerable Software & Versions: (show all)

CVE-2013-0383  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking.

Vulnerable Software & Versions: (show all)

CVE-2013-0375  

Severity: Medium
CVSS Score: 5.5 (AV:N/AC:L/Au:S/C:P/I:P/A:N)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.1.28 and earlier, allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Server Replication.

Vulnerable Software & Versions: (show all)

CVE-2012-5627  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CWE: CWE-255 Credentials Management

Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks.

Vulnerable Software & Versions: (show all)

CVE-2012-5060  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:L/Au:S/C:N/I:N/A:C)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.65 and earlier and 5.5.27 and earlier allows remote authenticated users to affect availability, related to GIS Extension.

Vulnerable Software & Versions: (show all)

CVE-2012-3197  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Replication.

Vulnerable Software & Versions: (show all)

CVE-2012-3180  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2012-3177  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:L/Au:S/C:N/I:N/A:C)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.

Vulnerable Software & Versions: (show all)

CVE-2012-3173  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB Plugin.

Vulnerable Software & Versions: (show all)

CVE-2012-3167  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Full Text Search.

Vulnerable Software & Versions: (show all)

CVE-2012-3166  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.

Vulnerable Software & Versions: (show all)

CVE-2012-3163  

Severity: High
CVSS Score: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.

Vulnerable Software & Versions: (show all)

CVE-2012-3160  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation.

Vulnerable Software & Versions: (show all)

CVE-2012-3158  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.

Vulnerable Software & Versions: (show all)

CVE-2012-3150  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2012-2749  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index.

Vulnerable Software & Versions: (show all)

CVE-2012-2102  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT.

Vulnerable Software & Versions: (show all)

CVE-2012-1734  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2012-1705  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2012-1703  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:L/Au:S/C:N/I:N/A:C)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2012-1702  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2012-1697  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.

Vulnerable Software & Versions: (show all)

CVE-2012-1696  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2012-1690  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2012-1689  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.

Vulnerable Software & Versions: (show all)

CVE-2012-1688  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability, related to Server DML.

Vulnerable Software & Versions: (show all)

CVE-2012-0882  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE.

Vulnerable Software & Versions: (show all)

CVE-2012-0583  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM.

Vulnerable Software & Versions: (show all)

CVE-2012-0574  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2012-0572  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.

Vulnerable Software & Versions: (show all)

CVE-2012-0553  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492.

Vulnerable Software & Versions: (show all)

CVE-2012-0540  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier and 5.5.23 and earlier allows remote authenticated users to affect availability, related to GIS Extension.

Vulnerable Software & Versions: (show all)

CVE-2012-0492  

Severity: Low
CVSS Score: 2.1 (AV:N/AC:H/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485.

Vulnerable Software & Versions: (show all)

CVE-2012-0490  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2012-0485  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492.

Vulnerable Software & Versions: (show all)

CVE-2012-0484  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2012-0120  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492.

Vulnerable Software & Versions: (show all)

CVE-2012-0119  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.

Vulnerable Software & Versions: (show all)

CVE-2012-0118  

Severity: Medium
CVSS Score: 4.9 (AV:N/AC:M/Au:S/C:P/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113.

Vulnerable Software & Versions: (show all)

CVE-2012-0116  

Severity: Medium
CVSS Score: 4.9 (AV:N/AC:M/Au:S/C:P/I:P/A:N)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2012-0115  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.

Vulnerable Software & Versions: (show all)

CVE-2012-0114  

Severity: Low
CVSS Score: 3.0 (AV:L/AC:M/Au:S/C:P/I:P/A:N)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2012-0113  

Severity: Medium
CVSS Score: 5.5 (AV:N/AC:L/Au:S/C:P/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118.

Vulnerable Software & Versions: (show all)

CVE-2012-0112  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.

Vulnerable Software & Versions: (show all)

CVE-2012-0102  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101.

Vulnerable Software & Versions: (show all)

CVE-2012-0101  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102.

Vulnerable Software & Versions: (show all)

CVE-2012-0087  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102.

Vulnerable Software & Versions: (show all)

CVE-2012-0075  

Severity: Low
CVSS Score: 1.7 (AV:N/AC:H/Au:M/C:N/I:P/A:N)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2011-2262  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors.

Vulnerable Software & Versions: (show all)

CVE-2010-3840  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points.

Vulnerable Software & Versions: (show all)

CVE-2010-3839  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.

Vulnerable Software & Versions: (show all)

CVE-2010-3838  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."

Vulnerable Software & Versions: (show all)

CVE-2010-3837  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.

Vulnerable Software & Versions: (show all)

CVE-2010-3836  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.

Vulnerable Software & Versions: (show all)

CVE-2010-3835  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.

Vulnerable Software & Versions: (show all)

CVE-2010-3834  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."

Vulnerable Software & Versions: (show all)

CVE-2010-3833  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."

Vulnerable Software & Versions: (show all)

CVE-2010-3683  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.

Vulnerable Software & Versions: (show all)

CVE-2010-3682  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.

Vulnerable Software & Versions: (show all)

CVE-2010-3681  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing "alternate reads from two indexes on a table," which triggers an assertion failure.

Vulnerable Software & Versions: (show all)

CVE-2010-3680  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure.

Vulnerable Software & Versions: (show all)

CVE-2010-3679  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind.

Vulnerable Software & Versions: (show all)

CVE-2010-3678  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier.

Vulnerable Software & Versions: (show all)

CVE-2010-3677  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.

Vulnerable Software & Versions: (show all)

CVE-2010-3676  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)

storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement.

Vulnerable Software & Versions: (show all)

CVE-2010-2008  

Severity: Low
CVSS Score: 3.5 (AV:N/AC:M/Au:S/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which causes MySQL to move certain directories to the server data directory.