Code Monkey home page Code Monkey logo

test-project-804's Introduction

depshield

test-project-804's People

Contributors

rjackson64840 avatar

Watchers

 avatar

test-project-804's Issues

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2016-6797] Improper Access Control

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2016-6797] Improper Access Control

Details about the vulnerability are available on the OSS Index page for [CVE-2016-6797] Improper Access Control.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2017-5651] Data Handling

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 9.8
Vulnerability: [CVE-2017-5651] Data Handling

Details about the vulnerability are available on the OSS Index page for [CVE-2017-5651] Data Handling.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] com.fasterxml.jackson.core:jackson-databind:2.9.0 is vulnerable to [CVE-2018-5968] Incomplete Blacklist, Deserialization of Untrusted Data

Component: com.fasterxml.jackson.core:jackson-databind:2.9.0
CVSS Score: 8.1
Vulnerability: [CVE-2018-5968] Incomplete Blacklist, Deserialization of Untrusted Data

Details about the vulnerability are available on the OSS Index page for [CVE-2018-5968] Incomplete Blacklist, Deserialization of Untrusted Data.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.httpcomponents:httpclient:4.3 is vulnerable to [CVE-2013-4366] http/impl/client/HttpClientBuilder.java in Apache HttpClient 4.3.x before 4.3.1 ...

Component: org.apache.httpcomponents:httpclient:4.3
CVSS Score: 9.8
Vulnerability: [CVE-2013-4366] http/impl/client/HttpClientBuilder.java in Apache HttpClient 4.3.x before 4.3.1 ...

Details about the vulnerability are available on the OSS Index page for [CVE-2013-4366] http/impl/client/HttpClientBuilder.java in Apache HttpClient 4.3.x before 4.3.1 ....

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2016-5388] Improper Access Control

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 8.1
Vulnerability: [CVE-2016-5388] Improper Access Control

Details about the vulnerability are available on the OSS Index page for [CVE-2016-5388] Improper Access Control.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2018-8014] The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to ...

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2018-8014] The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to ...

Details about the vulnerability are available on the OSS Index page for [CVE-2018-8014] The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to ....

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2016-6817] Improper Restriction of Operations within the Bounds of a Memory Buffer

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2016-6817] Improper Restriction of Operations within the Bounds of a Memory Buffer

Details about the vulnerability are available on the OSS Index page for [CVE-2016-6817] Improper Restriction of Operations within the Bounds of a Memory Buffer.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] Vulnerability due to usage of org.apache.tomcat.embed:tomcat-embed-core:8.5.0

Vulnerabilities

DepShield reports that this application's usage of org.apache.tomcat.embed:tomcat-embed-core:8.5.0 results in the following vulnerability(s):


Occurrences

org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is a transitive dependency introduced by the following direct dependency(s):

org.apache.tomcat.embed\[email protected]

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2017-5650] Resource Management Errors

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2017-5650] Resource Management Errors

Details about the vulnerability are available on the OSS Index page for [CVE-2017-5650] Resource Management Errors.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2016-8745] A bug in the error handling of the send file code for the NIO HTTP connector in ...

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2016-8745] A bug in the error handling of the send file code for the NIO HTTP connector in ...

Details about the vulnerability are available on the OSS Index page for [CVE-2016-8745] A bug in the error handling of the send file code for the NIO HTTP connector in ....

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2017-5647] Information Exposure

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2017-5647] Information Exposure

Details about the vulnerability are available on the OSS Index page for [CVE-2017-5647] Information Exposure.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] com.fasterxml.jackson.core:jackson-databind:2.9.0 is vulnerable to [CVE-2017-15095] Deserialization of Untrusted Data

Component: com.fasterxml.jackson.core:jackson-databind:2.9.0
CVSS Score: 9.9
Vulnerability: [CVE-2017-15095] Deserialization of Untrusted Data

Details about the vulnerability are available on the OSS Index page for [CVE-2017-15095] Deserialization of Untrusted Data.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2016-6816] Improper Input Validation

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.1
Vulnerability: [CVE-2016-6816] Improper Input Validation

Details about the vulnerability are available on the OSS Index page for [CVE-2016-6816] Improper Input Validation.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2017-5664] The error page mechanism of the Java Servlet Specification requires that, when a...

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2017-5664] The error page mechanism of the Java Servlet Specification requires that, when a...

Details about the vulnerability are available on the OSS Index page for [CVE-2017-5664] The error page mechanism of the Java Servlet Specification requires that, when a....

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] Vulnerability due to usage of com.fasterxml.jackson.core:jackson-databind:2.9.0

Vulnerabilities

DepShield reports that this application's usage of com.fasterxml.jackson.core:jackson-databind:2.9.0 results in the following vulnerability(s):


Occurrences

com.fasterxml.jackson.core:jackson-databind:2.9.0 is a transitive dependency introduced by the following direct dependency(s):

com.fasterxml.jackson.core\[email protected]

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2017-12617] When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC...

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 8.1
Vulnerability: [CVE-2017-12617] When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC...

Details about the vulnerability are available on the OSS Index page for [CVE-2017-12617] When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC....

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] com.fasterxml.jackson.core:jackson-databind:2.9.0 is vulnerable to [CVE-2018-7489] Incomplete Blacklist, Deserialization of Untrusted Data

Component: com.fasterxml.jackson.core:jackson-databind:2.9.0
CVSS Score: 9.9
Vulnerability: [CVE-2018-7489] Incomplete Blacklist, Deserialization of Untrusted Data

Details about the vulnerability are available on the OSS Index page for [CVE-2018-7489] Incomplete Blacklist, Deserialization of Untrusted Data.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2017-5648] Improper Access Control

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 9.1
Vulnerability: [CVE-2017-5648] Improper Access Control

Details about the vulnerability are available on the OSS Index page for [CVE-2017-5648] Improper Access Control.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] org.apache.tomcat.embed:tomcat-embed-core:8.5.0 is vulnerable to [CVE-2017-7675] Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal")

Component: org.apache.tomcat.embed:tomcat-embed-core:8.5.0
CVSS Score: 7.5
Vulnerability: [CVE-2017-7675] Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal")

Details about the vulnerability are available on the OSS Index page for [CVE-2017-7675] Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal").

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

[DepShield] Vulnerability due to usage of org.apache.httpcomponents:httpclient:4.3

Vulnerabilities

DepShield reports that this application's usage of org.apache.httpcomponents:httpclient:4.3 results in the following vulnerability(s):


Occurrences

org.apache.httpcomponents:httpclient:4.3 is a transitive dependency introduced by the following direct dependency(s):

org.apache.httpcomponents\[email protected]

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.