rjackson64840 / test-project-1109 Goto Github PK
View Code? Open in Web Editor NEWauto-generated project for DepShield load testing
auto-generated project for DepShield load testing
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2018-8014] The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to ...
Details about the vulnerability are available on the OSS Index page for [CVE-2018-8014] The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to ....
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: com.fasterxml.jackson.core:jackson-databind:2.9.0
CVSS Score: 9.9
Vulnerability: [CVE-2018-7489] Incomplete Blacklist, Deserialization of Untrusted Data
Details about the vulnerability are available on the OSS Index page for [CVE-2018-7489] Incomplete Blacklist, Deserialization of Untrusted Data.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 8.1
Vulnerability: [CVE-2017-12617] When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC...
Details about the vulnerability are available on the OSS Index page for [CVE-2017-12617] When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC....
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2017-7675] Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal")
Details about the vulnerability are available on the OSS Index page for [CVE-2017-7675] Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal").
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 9.1
Vulnerability: [CVE-2017-5648] Improper Access Control
Details about the vulnerability are available on the OSS Index page for [CVE-2017-5648] Improper Access Control.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Vulnerabilities
DepShield reports that this application's usage of com.ning:async-http-client:1.9.0 results in the following vulnerability(s):
Occurrences
com.ning:async-http-client:1.9.0 is a transitive dependency introduced by the following direct dependency(s):
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 9.3
Vulnerability: [CVE-2013-2134] Improper Control of Generation of Code ("Code Injection")
Details about the vulnerability are available on the OSS Index page for [CVE-2013-2134] Improper Control of Generation of Code ("Code Injection").
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Vulnerabilities
DepShield reports that this application's usage of com.fasterxml.jackson.core:jackson-databind:2.9.0 results in the following vulnerability(s):
Occurrences
com.fasterxml.jackson.core:jackson-databind:2.9.0 is a transitive dependency introduced by the following direct dependency(s):
• com.fasterxml.jackson.core\[email protected]
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 9.8
Vulnerability: [CVE-2016-3082] Improper Input Validation
Details about the vulnerability are available on the OSS Index page for [CVE-2016-3082] Improper Input Validation.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 8.8
Vulnerability: [CVE-2016-0785] Improper Input Validation
Details about the vulnerability are available on the OSS Index page for [CVE-2016-0785] Improper Input Validation.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 9.8
Vulnerability: [CVE-2016-4436] Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have uns...
Details about the vulnerability are available on the OSS Index page for [CVE-2016-4436] Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have uns....
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 8.8
Vulnerability: [CVE-2016-4461] Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary cod...
Details about the vulnerability are available on the OSS Index page for [CVE-2016-4461] Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary cod....
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: com.fasterxml.jackson.core:jackson-databind:2.9.0
CVSS Score: 8.1
Vulnerability: [CVE-2018-5968] Incomplete Blacklist, Deserialization of Untrusted Data
Details about the vulnerability are available on the OSS Index page for [CVE-2018-5968] Incomplete Blacklist, Deserialization of Untrusted Data.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.1
Vulnerability: [CVE-2016-6816] Improper Input Validation
Details about the vulnerability are available on the OSS Index page for [CVE-2016-6816] Improper Input Validation.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2016-6797] Improper Access Control
Details about the vulnerability are available on the OSS Index page for [CVE-2016-6797] Improper Access Control.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 10.0
Vulnerability: [CVE-2013-4316] null, Improper Access Control
Details about the vulnerability are available on the OSS Index page for [CVE-2013-4316] null, Improper Access Control.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2017-5647] Information Exposure
Details about the vulnerability are available on the OSS Index page for [CVE-2017-5647] Information Exposure.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2016-8745] A bug in the error handling of the send file code for the NIO HTTP connector in ...
Details about the vulnerability are available on the OSS Index page for [CVE-2016-8745] A bug in the error handling of the send file code for the NIO HTTP connector in ....
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 9.8
Vulnerability: [CVE-2017-12611] In Apache Struts 2.0.1 through 2.3.33 and 2.5 through 2.5.10, using an unintenti...
Details about the vulnerability are available on the OSS Index page for [CVE-2017-12611] In Apache Struts 2.0.1 through 2.3.33 and 2.5 through 2.5.10, using an unintenti....
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 9.3
Vulnerability: [CVE-2013-1966] Improper Control of Generation of Code ("Code Injection")
Details about the vulnerability are available on the OSS Index page for [CVE-2013-1966] Improper Control of Generation of Code ("Code Injection").
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Vulnerabilities
DepShield reports that this application's usage of ognl:ognl:3.0.3 results in the following vulnerability(s):
Occurrences
ognl:ognl:3.0.3 is a transitive dependency introduced by the following direct dependency(s):
• org.apache.struts\[email protected]
└─ ognl\[email protected]
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Vulnerabilities
DepShield reports that this application's usage of io.netty:netty:3.9.5.Final results in the following vulnerability(s):
Occurrences
io.netty:netty:3.9.5.Final is a transitive dependency introduced by the following direct dependency(s):
• com.ning\[email protected]
└─ io.netty\[email protected]
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Vulnerabilities
DepShield reports that this application's usage of org.apache.tomcat.embed:tomcat-embed-core:8.5.0 results in the following vulnerability(s):
Occurrences
org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is a transitive dependency introduced by the following direct dependency(s):
• org.apache.tomcat.embed\[email protected]
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 8.1
Vulnerability: [CVE-2016-3081] Improper Neutralization of Special Elements used in a Command (Command Injection)
Details about the vulnerability are available on the OSS Index page for [CVE-2016-3081] Improper Neutralization of Special Elements used in a Command (Command Injection).
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2016-6817] Improper Restriction of Operations within the Bounds of a Memory Buffer
Details about the vulnerability are available on the OSS Index page for [CVE-2016-6817] Improper Restriction of Operations within the Bounds of a Memory Buffer.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 9.4
Vulnerability: [CVE-2013-2251] Improper Input Validation
Details about the vulnerability are available on the OSS Index page for [CVE-2013-2251] Improper Input Validation.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 8.1
Vulnerability: [CVE-2016-5388] Improper Access Control
Details about the vulnerability are available on the OSS Index page for [CVE-2016-5388] Improper Access Control.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 7.5
Vulnerability: [CVE-2015-5209] Improper Input Validation
Details about the vulnerability are available on the OSS Index page for [CVE-2015-5209] Improper Input Validation.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 9.3
Vulnerability: [CVE-2013-2115] Improper Control of Generation of Code ("Code Injection")
Details about the vulnerability are available on the OSS Index page for [CVE-2013-2115] Improper Control of Generation of Code ("Code Injection").
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Vulnerabilities
DepShield reports that this application's usage of org.apache.struts:struts2-core:2.3.1 results in the following vulnerability(s):
Occurrences
org.apache.struts:struts2-core:2.3.1 is a transitive dependency introduced by the following direct dependency(s):
• org.apache.struts\[email protected]
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2017-5664] The error page mechanism of the Java Servlet Specification requires that, when a...
Details about the vulnerability are available on the OSS Index page for [CVE-2017-5664] The error page mechanism of the Java Servlet Specification requires that, when a....
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 8.8
Vulnerability: [CVE-2016-3090] The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 a...
Details about the vulnerability are available on the OSS Index page for [CVE-2016-3090] The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 a....
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2017-5650] Resource Management Errors
Details about the vulnerability are available on the OSS Index page for [CVE-2017-5650] Resource Management Errors.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 9.3
Vulnerability: [CVE-2013-2135] Improper Control of Generation of Code ("Code Injection")
Details about the vulnerability are available on the OSS Index page for [CVE-2013-2135] Improper Control of Generation of Code ("Code Injection").
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 7.5
Vulnerability: [CVE-2014-0113] Permissions, Privileges, and Access Controls
Details about the vulnerability are available on the OSS Index page for [CVE-2014-0113] Permissions, Privileges, and Access Controls.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.struts:struts2-core:2.3.1
CVSS Score: 7.5
Vulnerability: [CVE-2014-0112] Permissions, Privileges, and Access Controls
Details about the vulnerability are available on the OSS Index page for [CVE-2014-0112] Permissions, Privileges, and Access Controls.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 9.8
Vulnerability: [CVE-2017-5651] Data Handling
Details about the vulnerability are available on the OSS Index page for [CVE-2017-5651] Data Handling.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
Vulnerabilities
DepShield reports that this application's usage of org.apache.struts.xwork:xwork-core:2.3.1 results in the following vulnerability(s):
Occurrences
org.apache.struts.xwork:xwork-core:2.3.1 is a transitive dependency introduced by the following direct dependency(s):
• org.apache.struts\[email protected]
└─ org.apache.struts.xwork\[email protected]
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Component: com.fasterxml.jackson.core:jackson-databind:2.9.0
CVSS Score: 9.9
Vulnerability: [CVE-2017-15095] Deserialization of Untrusted Data
Details about the vulnerability are available on the OSS Index page for [CVE-2017-15095] Deserialization of Untrusted Data.
This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.