Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: google group | github issues

Project: Fine Grained Service Monitoring System

Scan Information (show all):

Display: Showing Vulnerable Dependencies (click to show all)

Dependency CPE GAV Highest Severity CVE Count CPE Confidence Evidence Count
antlr-2.7.7.jar antlr:antlr:2.7.7   0 11
aopalliance-1.0.jar aopalliance:aopalliance:1.0   0 13
asm-3.3.1.jar asm:asm:3.3.1   0 13
avalon-framework-4.1.3.jar avalon-framework:avalon-framework:4.1.3   0 12
batik-awt-util-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-awt-util:1.6 Medium 1 LOW 16
batik-dom-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-dom:1.6 Medium 1 LOW 15
batik-svggen-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-svggen:1.6 Medium 1 LOW 15
batik-util-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-util:1.6 Medium 1 LOW 15
batik-xml-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-xml:1.6 Medium 1 LOW 15
cewolf-1.2.4-java7.jar cewolf:cewolf:1.2.4-java7   0 14
gson-2.2.4.jar com.google.code.gson:gson:2.2.4   0 18
resolver-20050927.jar com.sun.org.apache.xml.internal:resolver:20050927   0 14
jaxb-impl-2.1.13.jar com.sun.xml.bind:jaxb-impl:2.1.13   0 19
jaxb-impl-2.2.4.jar com.sun.xml.bind:jaxb-impl:2.2.4   0 20
jaxb-impl-2.2.6.jar com.sun.xml.bind:jaxb-impl:2.2.6   0 20
jaxb-xjc-2.1.13.jar com.sun.xml.bind:jaxb-xjc:2.1.13   0 18
jaxb-xjc-2.2.4.jar com.sun.xml.bind:jaxb-xjc:2.2.4   0 18
FastInfoset-1.2.7.jar com.sun.xml.fastinfoset:FastInfoset:1.2.7   0 15
streambuffer-1.0.jar com.sun.xml.stream.buffer:streambuffer:1.0   0 14
txw2-20090102.jar com.sun.xml.txw2:txw2:20090102   0 14
jaxws-rt-2.2.jar com.sun.xml.ws:jaxws-rt:2.2   0 20
jaxws-tools-2.2.jar com.sun.xml.ws:jaxws-tools:2.2   0 19
policy-2.0-b01.jar com.sun.xml.ws:policy:2.0-b01   0 17
commons-beanutils-1.8.0.jar cpe:/a:apache:commons_beanutils:1.8.0 commons-beanutils:commons-beanutils:1.8.0 High 1 LOW 23
commons-cli-1.3.1.jar commons-cli:commons-cli:1.3.1   0 25
commons-codec-1.10.jar commons-codec:commons-codec:1.10   0 25
commons-collections-3.2.jar cpe:/a:apache:commons_collections:3.2.1 commons-collections:commons-collections:3.2 High 1 LOW 19
commons-configuration-1.9.jar commons-configuration:commons-configuration:1.9   0 24
commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe   0 1
commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe   0 1
commons-daemon-1.0.15-bin-windows.zip: prunmgr.exe   0 1
commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe   0 1
commons-dbcp-1.2.2.jar commons-dbcp:commons-dbcp:1.2.2   0 19
commons-discovery-0.2.jar commons-discovery:commons-discovery:0.2   0 14
commons-lang-2.6.jar commons-lang:commons-lang:2.6   0 23
commons-logging-api-1.1.jar commons-logging:commons-logging-api:1.1   0 19
commons-logging-1.1.jar commons-logging:commons-logging:1.1   0 19
commons-pool-1.3.jar commons-pool:commons-pool:1.3   0 19
VectorGraphics2D-0.9.3.jar de.erichseifert.vectorgraphics2d:VectorGraphics2D:0.9.3   0 14
dnsjava-2.0.6.jar dnsjava:dnsjava:2.0.6   0 15
dom4j-1.6.1.jar dom4j:dom4j:1.6.1   0 18
geronimo-spec-j2ee-connector-1.5-rc4.jar cpe:/a:apache:geronimo:1.5.rc4 geronimo-spec:geronimo-spec-j2ee-connector:1.5-rc4 High 2 LOW 14
getopt-1.0.13.jar gnu-getopt:getopt:1.0.13   0 10
activation-1.1.jar javax.activation:activation:1.1   0 17
ejb-api-3.0.jar javax.ejb:ejb-api:3.0   0 15
jsr181-api-1.0-MR1.jar javax.jws:jsr181-api:1.0-MR1   0 10
mail-1.4.7.jar cpe:/a:sun:javamail:1.4.7 javax.mail:mail:1.4.7   0 LOW 26
javax.servlet-api-3.1.0.jar javax.servlet:javax.servlet-api:3.1.0   0 22
servlet-api-2.5.jar javax.servlet:servlet-api:2.5   0 11
javax.ws.rs-api-2.0-m10.jar javax.ws.rs:javax.ws.rs-api:2.0-m10   0 20
jaxb-api-2.2.3.jar javax.xml.bind:jaxb-api:2.2.3   0 17
stax-api-1.0-2.jar javax.xml.stream:stax-api:1.0-2   0 11
jboss-jaxb-intros-1.0.2.GA.jar jboss.jaxbintros:jboss-jaxb-intros:1.0.2.GA   0 12
joda-time-2.2.jar joda-time:joda-time:2.2   0 22
junit-4.12.jar junit:junit:4.12   0 16
log4j-1.2.17.jar log4j:log4j:1.2.17   0 18
logkit-1.0.1.jar logkit:logkit:1.0.1   0 11
oauth-provider-20100527.jar net.oauth.core:oauth-provider:20100527   0 12
oauth-20100527.jar net.oauth.core:oauth:20100527   0 12
ehcache-core-2.5.1.jar net.sf.ehcache:ehcache-core:2.5.1   0 12
ehcache-core-2.5.1.jar: sizeof-agent.jar net.sf.ehcache:sizeof-agent:1.0.1   0 14
axis-1.4.jar cpe:/a:apache:axis:1.4 axis:axis:1.4 Medium 2 HIGHEST 13
commons-lang3-3.5.jar org.apache.commons:commons-lang3:3.5   0 27
cxf-rt-core-2.7.11.jar cpe:/a:apache:cxf:2.7.11 org.apache.cxf:cxf-rt-core:2.7.11 Medium 3 HIGHEST 26
org.osgi.core-1.0.0.jar org.apache.felix:org.osgi.core:1.0.0   0 20
geronimo-javamail_1.4_mail-1.8.3.jar cpe:/a:apache:geronimo:1.8.3 org.apache.geronimo.javamail:geronimo-javamail_1.4_mail:1.8.3 High 2 LOW 18
geronimo-j2ee_1.4_spec-1.1.jar org.apache.geronimo.specs:geronimo-j2ee_1.4_spec:1.1   0 8
geronimo-javamail_1.4_spec-1.7.1.jar org.apache.geronimo.specs:geronimo-javamail_1.4_spec:1.7.1   0 21
geronimo-jaxws_2.2_spec-1.0.jar org.apache.geronimo.specs:geronimo-jaxws_2.2_spec:1.0   0 21
geronimo-jaxws_2.2_spec-1.1.jar org.apache.geronimo.specs:geronimo-jaxws_2.2_spec:1.1   0 21
geronimo-jms_1.1_spec-1.1.1.jar org.apache.geronimo.specs:geronimo-jms_1.1_spec:1.1.1   0 17
geronimo-servlet_3.0_spec-1.0.jar org.apache.geronimo.specs:geronimo-servlet_3.0_spec:1.0   0 19
httpasyncclient-4.0-beta3.jar cpe:/a:apache:httpasyncclient:4.0.beta org.apache.httpcomponents:httpasyncclient:4.0-beta3 Medium 1 LOW 21
httpclient-4.3.3.jar cpe:/a:apache:httpclient:4.3.3 org.apache.httpcomponents:httpclient:4.3.3 Medium 2 HIGHEST 22
httpcore-nio-4.2.4.jar org.apache.httpcomponents:httpcore-nio:4.2.4   0 22
httpcore-4.2.4.jar org.apache.httpcomponents:httpcore:4.2.4   0 22
httpcore-4.3.2.jar org.apache.httpcomponents:httpcore:4.3.2   0 22
juddi-client-3.3.3.jar org.apache.juddi:juddi-client:3.3.3   0 16
uddi-ws-3.3.3.jar org.apache.juddi:uddi-ws:3.3.3   0 16
mina-core-2.0.7.jar org.apache.mina:mina-core:2.0.7   0 16
neethi-3.0.3.jar cpe:/a:apache:apache_test:3.0.3 org.apache.neethi:neethi:3.0.3   0 LOW 25
qpid-client-6.0.0.jar cpe:/a:apache:qpid:6.0.0 org.apache.qpid:qpid-client:6.0.0   0 LOW 19
xmlsec-1.5.1.jar cpe:/a:apache:xml_security_for_java:1.5.1 org.apache.santuario:xmlsec:1.5.1 Medium 2 HIGHEST 23
xmlsec-1.5.6.jar cpe:/a:apache:xml_security_for_java:1.5.6 org.apache.santuario:xmlsec:1.5.6   0 LOW 25
tomcat-dbcp-7.0.73.jar cpe:/a:apache:tomcat:7.0.73 org.apache.tomcat:tomcat-dbcp:7.0.73 High 3 LOW 16
velocity-1.7.jar org.apache.velocity:velocity:1.7   0 23
wss4j-1.6.15.jar cpe:/a:apache:wss4j:1.6.15 org.apache.ws.security:wss4j:1.6.15 Medium 2 HIGHEST 25
xmlschema-core-2.1.0.jar org.apache.ws.xmlschema:xmlschema-core:2.1.0   0 17
xmlbeans-2.6.0.jar org.apache.xmlbeans:xmlbeans:2.6.0   0 15
jettison-1.3.4.jar org.codehaus.jettison:jettison:1.3.4   0 18
stax2-api-3.1.4.jar org.codehaus.woodstox:stax2-api:3.1.4   0 17
woodstox-core-asl-4.2.1.jar org.codehaus.woodstox:woodstox-core-asl:4.2.1   0 21
wstx-asl-3.2.3.jar org.codehaus.woodstox:wstx-asl:3.2.3   0 19
wstx-lgpl-3.2.6.jar org.codehaus.woodstox:wstx-lgpl:3.2.6   0 19
jetty-http-8.1.14.v20131031.jar cpe:/a:eclipse:jetty:8.1.14.v20131031
cpe:/a:jetty:jetty:8.1.14.v20131031
org.eclipse.jetty:jetty-http:8.1.14.v20131031   0 LOW 22
jetty-io-8.1.14.v20131031.jar cpe:/a:eclipse:jetty:8.1.14.v20131031 org.eclipse.jetty:jetty-io:8.1.14.v20131031   0 LOW 22
hamcrest-core-1.3.jar org.hamcrest:hamcrest-core:1.3   0 17
javassist-3.15.0-GA.jar org.javassist:javassist:3.15.0-GA   0 14
jboss-logging-3.1.0.GA.jar org.jboss.logging:jboss-logging:3.1.0.GA   0 25
netty-3.2.6.Final.jar cpe:/a:netty_project:netty:3.2.6 org.jboss.netty:netty:3.2.6.Final Medium 1 LOW 18
jboss-servlet-api_3.0_spec-1.0.0.Final.jar org.jboss.spec.javax.servlet:jboss-servlet-api_3.0_spec:1.0.0.Final   0 19
jboss-jaxb-api_2.2_spec-1.0.3.Final.jar org.jboss.spec.javax.xml.bind:jboss-jaxb-api_2.2_spec:1.0.3.Final   0 19
jboss-jaxrpc-api_1.1_spec-1.0.0.Final.jar org.jboss.spec.javax.xml.rpc:jboss-jaxrpc-api_1.1_spec:1.0.0.Final   0 19
jboss-saaj-api_1.3_spec-1.0.1.Final.jar org.jboss.spec.javax.xml.soap:jboss-saaj-api_1.3_spec:1.0.1.Final   0 19
jboss-jaxws-api_2.2_spec-2.0.2.Final.jar org.jboss.spec.javax.xml.ws:jboss-jaxws-api_2.2_spec:2.0.2.Final   0 27
jbossws-api-1.0.0.GA.jar org.jboss.ws:jbossws-api:1.0.0.GA   0 14
jbossws-common-tools-1.0.0.GA.jar org.jboss.ws:jbossws-common-tools:1.0.0.GA   0 14
jbossws-common-3.1.3.Final.jar org.jboss.ws:jbossws-common:3.1.3.Final   0 17
jbossws-spi-3.1.2.Final.jar org.jboss.ws:jbossws-spi:3.1.2.Final   0 17
jbossws-native-client-4.0.2.GA.jar org.jboss.ws.native:jbossws-native-client:4.0.2.GA   0 13
jbossws-native-core-4.0.2.GA.jar cpe:/a:redhat:jboss_web_server:4.0.2 org.jboss.ws.native:jbossws-native-core:4.0.2.GA   0 LOW 13
jbossws-native-factories-4.0.2.GA.jar org.jboss.ws.native:jbossws-native-factories:4.0.2.GA   0 13
jbossws-native-services-4.0.2.GA.jar org.jboss.ws.native:jbossws-native-services:4.0.2.GA   0 13
jcommon-1.0.23.jar org.jfree:jcommon:1.0.23   0 15
jfreechart-1.0.19.jar org.jfree:jfreechart:1.0.19   0 15
stax-ex-1.2.jar org.jvnet.staxex:stax-ex:1.2   0 14
xchart-3.0.0.jar org.knowm.xchart:xchart:3.0.0   0 16
apache-tomcat-7.0.0.zip: bootstrap.jar cpe:/a:apache:tomcat:7.0.75
cpe:/a:apache_software_foundation:tomcat:7.0.75
High 3 LOW 9
apache-tomcat-7.0.0.zip: commons-daemon.jar cpe:/a:apache:apache_commons_daemon:1.0.15 commons-daemon:commons-daemon:1.0.15   0 LOW 23
apache-tomcat-7.0.0.zip: tcnative-1.dll   0 2
apache-tomcat-7.0.0.zip: tomcat-juli.jar org.apache.tomcat:tomcat-juli:7.0.75   0 16
apache-tomcat-7.0.0.zip: tomcat7.exe   0 2
apache-tomcat-7.0.0.zip: tomcat7w.exe   0 2
apache-tomcat-7.0.0.zip: annotations-api.jar cpe:/a:apache:tomcat:3.0 org.apache.tomcat:tomcat-annotations-api:7.0.75 High 34 MEDIUM 15
apache-tomcat-7.0.0.zip: catalina.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-catalina:7.0.75 High 3 LOW 16
apache-tomcat-7.0.0.zip: ecj-4.4.2.jar org.eclipse.jdt.core.compiler:ecj:4.4.2   0 17
apache-tomcat-7.0.0.zip: el-api.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-el-api:7.0.75 High 3 LOW 15
apache-tomcat-7.0.0.zip: jasper.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-jasper:7.0.75 High 3 LOW 17
apache-tomcat-7.0.0.zip: jsp-api.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-jsp-api:7.0.75 High 3 LOW 16
apache-tomcat-7.0.0.zip: servlet-api.jar cpe:/a:apache:tomcat:3.0 org.apache.tomcat:tomcat-servlet-api:7.0.75 High 34 MEDIUM 15
apache-tomcat-7.0.0.zip: tomcat-api.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-api:7.0.75 High 3 LOW 16
apache-tomcat-7.0.0.zip: tomcat-jdbc.jar org.apache.tomcat:tomcat-jdbc:7.0.75   0 16
apache-tomcat-7.0.0.zip: tomcat7-websocket.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat7-websocket:7.0.75 High 3 LOW 17
apache-tomcat-7.0.0.zip: websocket-api.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-websocket-api:7.0.75 High 3 LOW 15
apache-tomcat-7.0.0.zip: sample.war   0 5
apache-tomcat-7.0.0.zip: taglibs-standard-impl-1.2.5.jar cpe:/a:apache:standard_taglibs:1.2.5 org.apache.taglibs:taglibs-standard-impl:1.2.5   0 LOW 18
opensaml-2.6.1.jar org.opensaml:opensaml:2.6.1   0 19
openws-1.5.1.jar org.opensaml:openws:1.5.1   0 21
xmltooling-1.4.1.jar org.opensaml:xmltooling:1.4.1   0 17
postgresql-9.4.1212.jre7.jar cpe:/a:postgresql:postgresql:9.4.1212.jre7 org.postgresql:postgresql:9.4.1212.jre7   0 LOW 25
quartz-1.8.6.jar org.quartz-scheduler:quartz:1.8.6   0 13
slf4j-api-1.7.7.jar org.slf4j:slf4j-api:1.7.7   0 20
slf4j-log4j12-1.7.7.jar org.slf4j:slf4j-log4j12:1.7.7   0 20
spring-aop-3.0.7.RELEASE.jar org.springframework:spring-aop:3.0.7.RELEASE   0 14
spring-asm-3.0.7.RELEASE.jar org.springframework:spring-asm:3.0.7.RELEASE   0 15
spring-beans-3.0.7.RELEASE.jar org.springframework:spring-beans:3.0.7.RELEASE   0 14
spring-core-3.0.7.RELEASE.jar cpe:/a:pivotal:spring_framework:3.0.7
cpe:/a:pivotal_software:spring_framework:3.0.7
cpe:/a:springsource:spring_framework:3.0.7
cpe:/a:vmware:springsource_spring_framework:3.0.7
org.springframework:spring-core:3.0.7.RELEASE Medium 8 HIGHEST 18
spring-core-3.2.8.RELEASE.jar cpe:/a:springsource:spring_framework:3.2.8 org.springframework:spring-core:3.2.8.RELEASE   0 LOW 18
spring-expression-3.0.7.RELEASE.jar org.springframework:spring-expression:3.0.7.RELEASE   0 14
spring-jms-3.0.7.RELEASE.jar org.springframework:spring-jms:3.0.7.RELEASE   0 14
spring-tx-3.0.7.RELEASE.jar org.springframework:spring-tx:3.0.7.RELEASE   0 14
js-1.7R2.jar rhino:js:1.7R2   0 13
stax-api-1.0.1.jar stax:stax-api:1.0.1   0 16
wstx-asl-3.2.1.jar org.codehaus.woodstox:wstx-asl:3.2.1   0 14
policy-1.0.jar ws-commons:policy:1.0   0 14
wsdl4j-1.6.2.jar wsdl4j:wsdl4j:1.6.2   0 15
wsdl4j-1.6.3.jar wsdl4j:wsdl4j:1.6.3   0 16
serializer-2.7.1.jar cpe:/a:apache:xalan-java:2.7.1 xalan:serializer:2.7.1 High 1 HIGHEST 18
xalan-2.7.1.jar cpe:/a:apache:xalan-java:2.7.1 xalan:xalan:2.7.1 High 1 HIGHEST 32
xercesImpl-2.11.0.jar xerces:xercesImpl:2.11.0   0 46
xml-apis-1.4.01.jar xml-apis:xml-apis:1.4.01   0 43
xml-resolver-1.2.jar xml-resolver:xml-resolver:1.2   0 15
jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.istack/istack-commons-runtime/pom.xml com.sun.istack:istack-commons-runtime:2.13   0 6
jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.codemodel/codemodel/pom.xml com.sun.codemodel:codemodel:2.5-SNAPSHOT   0 7
jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.istack/istack-commons-tools/pom.xml com.sun.istack:istack-commons-tools:2.4-SNAPSHOT   0 6
jaxb-impl-2.2.4.jar\META-INF/maven/com.sun.istack/istack-commons-runtime/pom.xml com.sun.istack:istack-commons-runtime:2.4-SNAPSHOT   0 6
jaxb-impl-2.2.4.jar\META-INF/maven/com.sun.xml.txw2/txw2/pom.xml com.sun.xml.txw2:txw2:201103-SNAPSHOT   0 6
jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.xml.dtd-parser/dtd-parser/pom.xml com.sun.xml.dtd-parser:dtd-parser:1.2-SNAPSHOT   0 7
jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.xml.txw2/txw2/pom.xml com.sun.xml.txw2:txw2:20110809   0 6
jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.xsom/xsom/pom.xml com.sun.xsom:xsom:20110101-SNAPSHOT   0 7
jaxb-xjc-2.2.4.jar\META-INF/maven/org.kohsuke.rngom/rngom/pom.xml org.kohsuke.rngom:rngom:201103-SNAPSHOT   0 6

Dependencies

antlr-2.7.7.jar

File Path: C:\Users\Dad\.m2\repository\antlr\antlr\2.7.7\antlr-2.7.7.jar
MD5: f8f1352c52a4c6a500b597596501fc64
SHA1: 83cd2cd674a217ade95a4bb83a8a14f351f48bd0
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

aopalliance-1.0.jar

Description: AOP Alliance

License:

Public Domain
File Path: C:\Users\Dad\.m2\repository\aopalliance\aopalliance\1.0\aopalliance-1.0.jar
MD5: 04177054e180d09e3998808efa0401c7
SHA1: 0235ba8b489512805ac13a8f9ea77a1ca5ebe3e8
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

asm-3.3.1.jar

File Path: C:\Users\Dad\.m2\repository\asm\asm\3.3.1\asm-3.3.1.jar
MD5: 1ad1e8959324b0f680b8e62406955642
SHA1: 1d5f20b4ea675e6fab6ab79f1cd60ec268ddc015
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

avalon-framework-4.1.3.jar

File Path: C:\Users\Dad\.m2\repository\avalon-framework\avalon-framework\4.1.3\avalon-framework-4.1.3.jar
MD5: bef9f9be8ba066273fdef72b3503a307
SHA1: 92315ee1c4a4c90bee05055713811f28f8509075
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UI Common:compile
  • fgsms JbossWS Native JAXWS Agent:provided
  • fgsms Automated Reporting Service:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

batik-awt-util-1.6.jar

Description: Batik AWT Utilities

File Path: C:\Users\Dad\.m2\repository\batik\batik-awt-util\1.6\batik-awt-util-1.6.jar
MD5: 04013947d519c13fd4d82355cb496552
SHA1: 590750cc8d6a1ba0189b437172b6444578d79c99
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

batik-dom-1.6.jar

Description: Batik DOM

File Path: C:\Users\Dad\.m2\repository\batik\batik-dom\1.6\batik-dom-1.6.jar
MD5: ce481d746c345a3d3046dab157c8468f
SHA1: 27983405f0871f28d3b9ab35b44e62610a60564a
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

batik-svggen-1.6.jar

Description: Batik SVG Generator

File Path: C:\Users\Dad\.m2\repository\batik\batik-svggen\1.6\batik-svggen-1.6.jar
MD5: 918e775580eb37b9d57ea37c79fc8610
SHA1: 983914d5e27957145e34b55ad7f48df96eb6d280
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

batik-util-1.6.jar

Description: Batik Utilities

File Path: C:\Users\Dad\.m2\repository\batik\batik-util\1.6\batik-util-1.6.jar
MD5: 4a137ce0ce2f8eb24823b55ebb26cb24
SHA1: 7bea0185bb630bca235ffa904b1a03e8a4786a45
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

batik-xml-1.6.jar

Description: Batik XML

File Path: C:\Users\Dad\.m2\repository\batik\batik-xml\1.6\batik-xml-1.6.jar
MD5: d4d0b431411f67662618f9b87dbcddab
SHA1: 4f2c18a0d41b8804e6fd24f183a567b41c928ed0
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

cewolf-1.2.4-java7.jar

Description:  Cewolf is a tag library for JfreeChart. JFreeChart is a class library, written in Java, for generating charts. Utilising the Java2D APIs, it currently supports bar charts, pie charts, line charts, XY-plots and time series plots.

License:

GNU Lesser General Public License version 2.1 (LGPLv2.1): http://www.gnu.org/licenses/lgpl-2.1.txt
File Path: C:\Users\Dad\.m2\repository\cewolf\cewolf\1.2.4-java7\cewolf-1.2.4-java7.jar
MD5: 52336ab381cc46d082b893873707e011
SHA1: ceec652622da825768aa19f960021548fa6d0768
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

gson-2.2.4.jar

Description: Google Gson library

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\com\google\code\gson\gson\2.2.4\gson-2.2.4.jar
MD5: 2f54fc24807a4cad7297012dd8cebf3d
SHA1: a60a5e993c98c864010053cb901b7eab25306568
Referenced In Project/Scope: fgsms User Interface (Bootstrap):compile

Identifiers

resolver-20050927.jar

File Path: C:\Users\Dad\.m2\repository\com\sun\org\apache\xml\internal\resolver\20050927\resolver-20050927.jar
MD5: 96d75a90d89ff0cb6b96282171a212de
SHA1: ee4db4a5f15cbdb453808c2839f08240ac231e46
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jaxb-impl-2.1.13.jar

Description: JAXB (JSR 222) reference implementation

License:

CDDL 1.0: https://glassfish.dev.java.net/public/CDDL+GPL.html
GPL2 w/ CPE: https://glassfish.dev.java.net/public/CDDL+GPL.html
File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.1.13\jaxb-impl-2.1.13.jar
MD5: 97e9e91a0824277ca351063e1ee6d2de
SHA1: 7c1ea3e298d0a32fafcebcb734e77990598f7720
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

jaxb-impl-2.2.4.jar

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.2.4\jaxb-impl-2.2.4.jar
MD5: a530a338b0551b01e7ca1728b38b948d
SHA1: 14d785b91bafbd91c312efd73c5c4528a8adbdfb
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jaxb-impl-2.2.6.jar

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.2.6\jaxb-impl-2.2.6.jar
MD5: 236690559e7423d6e378ab737f6a7670
SHA1: 62bed5d6f40049a00c48a402c3511f02eedd1c11
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile

Identifiers

jaxb-xjc-2.1.13.jar

Description: The core functionality of the CodeModel java source code generation library

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-xjc\2.1.13\jaxb-xjc-2.1.13.jar
MD5: bd159bfd1ad36963f8f7bb05d7e8f644
SHA1: 0a953200fed20f683c09e8f419c2babb1d89d82a
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

jaxb-xjc-2.2.4.jar

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-xjc\2.2.4\jaxb-xjc-2.2.4.jar
MD5: d2b6fdb0003c2835d4a846da38ba7260
SHA1: be3ae2d6016b3e0902756bbdd800f44d40c7f9cd
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

FastInfoset-1.2.7.jar

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\fastinfoset\FastInfoset\1.2.7\FastInfoset-1.2.7.jar
MD5: 92f780ed9e034f24bdd73d4a8fecb00e
SHA1: ad5d03a88f48c00f9c50ad46874847cd833e223e
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

streambuffer-1.0.jar

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\stream\buffer\streambuffer\1.0\streambuffer-1.0.jar
MD5: f59e61ba55a75d3b4924097f36d2f4e9
SHA1: c5f2e0bca928f350356f379de68b9db9a12a230a
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

txw2-20090102.jar

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\txw2\txw2\20090102\txw2-20090102.jar
MD5: 6badd3a7414afc68a2bd465f94f83d44
SHA1: f27de1e6739865ec6525126655e1ed11d75f41f9
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jaxws-rt-2.2.jar

Description:  Open source Reference Implementation of JSR-224: Java API for XML Web Services

License:

            Dual license consisting of the CDDL v1.0 and GPL v2
        : https://glassfish.dev.java.net/public/CDDL+GPL.html
File Path: C:\Users\Dad\.m2\repository\com\sun\xml\ws\jaxws-rt\2.2\jaxws-rt-2.2.jar
MD5: 7c3b6a819621109f5efa02f6b5b56804
SHA1: a8818fa4e13d8bc2758643bda1860494026a1770
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jaxws-tools-2.2.jar

Description:  Open source Reference Implementation of JSR-224: Java API for XML Web Services

License:

            Dual license consisting of the CDDL v1.0 and GPL v2
        : https://glassfish.dev.java.net/public/CDDL+GPL.html
File Path: C:\Users\Dad\.m2\repository\com\sun\xml\ws\jaxws-tools\2.2\jaxws-tools-2.2.jar
MD5: a0729cfe7d4444606b10a30555d592a2
SHA1: 26df78a9218c4fb2f75fb676ccbac9def7e9ee64
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

policy-2.0-b01.jar

License:

Dual License: CDDL 1.0 and GPL V2 with Classpath Exception: https://glassfish.dev.java.net/public/CDDL+GPL.html
File Path: C:\Users\Dad\.m2\repository\com\sun\xml\ws\policy\2.0-b01\policy-2.0-b01.jar
MD5: 56595a9fad624d0d06b9b6d5e399d4b7
SHA1: 00dc30f945e61723fceb481659a440d9810d22f8
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

commons-beanutils-1.8.0.jar

Description: BeanUtils provides an easy-to-use but flexible wrapper around reflection and introspection.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\commons-beanutils\commons-beanutils\1.8.0\commons-beanutils-1.8.0.jar
MD5: d93127c2aa1815a25b13d971e974e9b1
SHA1: 0c651d5103c649c12b20d53731643e5fffceb536
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

CVE-2014-0114  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Vulnerable Software & Versions: (show all)

commons-cli-1.3.1.jar

Description:  Apache Commons CLI provides a simple API for presenting, processing and validating a command line interface.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\commons-cli\commons-cli\1.3.1\commons-cli-1.3.1.jar
MD5: 8d5fa2a42fef17d9034b35a9ac9cc750
SHA1: 1303efbc4b181e5a58bf2e967dc156a3132b97c0
Referenced In Projects/Scopes:
  • fgsms Database Export Tool:compile
  • fgsms Distribution:compile

Identifiers

commons-codec-1.10.jar

Description:  The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\commons-codec\commons-codec\1.10\commons-codec-1.10.jar
MD5: 353cf6a2bdba09595ccfa073b78c7fcb
SHA1: 4b95f4897fa13f2cd904aee711aeafc0c5295cd8
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Agent Core:provided
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

commons-collections-3.2.jar

Description: Types that extend and augment the Java Collections Framework.

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-collections\commons-collections\3.2\commons-collections-3.2.jar
MD5: 7b9216b608d550787bdf43a63d88bf3b
SHA1: f951934aa5ae5a88d7e6dfaa6d32307d834a88be
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Agent Core:provided
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile

Identifiers

CVE-2015-6420  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Vulnerable Software & Versions: (show all)

commons-configuration-1.9.jar

Description:  Tools to assist in the reading of configuration/preferences files in various formats

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\commons-configuration\commons-configuration\1.9\commons-configuration-1.9.jar
MD5: a433303bae1cd9ec6313fe7bbac8fbe9
SHA1: 5e8a4890284cf7eaa9241ace2cc07518d9519d22
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile

Identifiers

commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe

File Path: C:\Users\Dad\.m2\repository\commons-daemon\commons-daemon\1.0.15\commons-daemon-1.0.15-bin-windows.zip\amd64\prunsrv.exe
MD5: c8a57f4ca413effd5897d8a20e05fc80
SHA1: aac510a623eeb46aad1af2a91930535e4fe28f91
Referenced In Projects/Scopes:

  • fgsms Server Crash Alerter:provided
  • fgsms Agent Core:provided
  • fgsms Operating System Agent:provided

Identifiers

  • None

commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe

File Path: C:\Users\Dad\.m2\repository\commons-daemon\commons-daemon\1.0.15\commons-daemon-1.0.15-bin-windows.zip\ia64\prunsrv.exe
MD5: 3b06d0e5454e6812bba21b39ecfc83ba
SHA1: 0715fee00e5fcc4ce1c2b3dabbbddc4f3fa13e7e
Referenced In Projects/Scopes:

  • fgsms Server Crash Alerter:provided
  • fgsms Agent Core:provided
  • fgsms Operating System Agent:provided

Identifiers

  • None

commons-daemon-1.0.15-bin-windows.zip: prunmgr.exe

File Path: C:\Users\Dad\.m2\repository\commons-daemon\commons-daemon\1.0.15\commons-daemon-1.0.15-bin-windows.zip\prunmgr.exe
MD5: dcf47773e046ee212d937d5cabea5f4c
SHA1: 57483ea86f52ee8e529a9a53e2e18d7ddcd47e51
Referenced In Projects/Scopes:

  • fgsms Server Crash Alerter:provided
  • fgsms Agent Core:provided
  • fgsms Operating System Agent:provided

Identifiers

  • None

commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe

File Path: C:\Users\Dad\.m2\repository\commons-daemon\commons-daemon\1.0.15\commons-daemon-1.0.15-bin-windows.zip\prunsrv.exe
MD5: 0be207e358e5c198e7cb005c08e96e89
SHA1: 8c31d27449cee7bf326485987dc3145f17ffaa66
Referenced In Projects/Scopes:

  • fgsms Server Crash Alerter:provided
  • fgsms Agent Core:provided
  • fgsms Operating System Agent:provided

Identifiers

  • None

commons-dbcp-1.2.2.jar

Description: Commons Database Connection Pooling

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-dbcp\commons-dbcp\1.2.2\commons-dbcp-1.2.2.jar
MD5: 590f45b612433a50665bc4f369fc77d0
SHA1: 4fd4c6110e9bca3a655b717eb2e5920febb8403d
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile

Identifiers

commons-discovery-0.2.jar

Description: Commons Discovery

File Path: C:\Users\Dad\.m2\repository\commons-discovery\commons-discovery\0.2\commons-discovery-0.2.jar
MD5: 9a2fb56e6a79169b2fb6c8a0dc79abb0
SHA1: 7773ac7a7248f08ed2b8d297c6e2ef28260640ea
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

commons-lang-2.6.jar

Description:  Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\commons-lang\commons-lang\2.6\commons-lang-2.6.jar
MD5: 4d5c1693079575b362edf41500630bbd
SHA1: 0ce1edb914c94ebc388f086c6827e8bdeec71ac2
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Agent Core:provided
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile

Identifiers

commons-logging-api-1.1.jar

Description: Commons Logging is a thin adapter allowing configurable bridging to other, well known logging systems.

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-logging\commons-logging-api\1.1\commons-logging-api-1.1.jar
MD5: 4374238076ab08e60e0d296234480837
SHA1: 7d4cf5231d46c8524f9b9ed75bb2d1c69ab93322
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile

Identifiers

commons-logging-1.1.jar

Description: Commons Logging is a thin adapter allowing configurable bridging to other, well known logging systems.

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-logging\commons-logging\1.1\commons-logging-1.1.jar
MD5: 6b62417e77b000a87de66ee3935edbf5
SHA1: ba24d5de831911b684c92cd289ed5ff826271824
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Agent Core:provided
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms JbossWS Native JAXWS Agent:provided
  • fgsms Automated Reporting Service:compile
  • fgsms Reporting Service:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

commons-pool-1.3.jar

Description: Commons Object Pooling Library

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-pool\commons-pool\1.3\commons-pool-1.3.jar
MD5: 01f9bed60e2f88372132d34040ee81bb
SHA1: 03231230c1d7631b66a74d1c4653cfd65a6f9ea0
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile

Identifiers

VectorGraphics2D-0.9.3.jar

Description: A library for adding vector export to Java(R) Graphics2D.

License:

GNU Library or Lesser General Public License (LGPL): http://www.gnu.org/licenses/lgpl.txt
File Path: C:\Users\Dad\.m2\repository\de\erichseifert\vectorgraphics2d\VectorGraphics2D\0.9.3\VectorGraphics2D-0.9.3.jar
MD5: 71a405d7f54cc94df0711d516abeca52
SHA1: 221c9d68940b9ff48cd88cdc0c4943d3710d8af1
Referenced In Projects/Scopes:
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Service WAR:compile
  • fgsms Automated Reporting Service:compile

Identifiers

dnsjava-2.0.6.jar

Description: dnsjava is an implementation of DNS in Java

License:

BSD license: http://www.dnsjava.org/README
File Path: C:\Users\Dad\.m2\repository\dnsjava\dnsjava\2.0.6\dnsjava-2.0.6.jar
MD5: 3a783229899ea708d3a7c73624d305c4
SHA1: e367971f81d95e653552b5c8f3065d0fad724369
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms Service WAR:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Jboss ESB Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms DNS Discovery:compile
  • fgsms UDDI Publisher:compile

Identifiers

dom4j-1.6.1.jar

Description: dom4j: the flexible XML framework for Java

License:

dom4j: http://repository.jboss.org/licenses/dom4j.txt
File Path: C:\Users\Dad\.m2\repository\dom4j\dom4j\1.6.1\dom4j-1.6.1.jar
MD5: 4d8f51d3fe3900efc6e395be48030d6d
SHA1: 5d3ccc056b6f056dbf0dddfdf43894b9065a8f94
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms UI Common:compile

Identifiers

geronimo-spec-j2ee-connector-1.5-rc4.jar

File Path: C:\Users\Dad\.m2\repository\geronimo-spec\geronimo-spec-j2ee-connector\1.5-rc4\geronimo-spec-j2ee-connector-1.5-rc4.jar
MD5: 6a2ccbc1d0af6329c00b2089ae1a31d7
SHA1: 2f5310631817f11c5b170d3a0084a58766d49269
Referenced In Projects/Scopes:

  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile
  • fgsms Service Level Agreement Processor:compile

Identifiers

CVE-2011-5034  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.

Vulnerable Software & Versions: (show all)

CVE-2008-0732  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-59 Improper Link Resolution Before File Access ('Link Following')

The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.

Vulnerable Software & Versions:

getopt-1.0.13.jar

Description: JON enterprise server main JAR

License:

GNU Lesser General Public License (LGPL): http://www.gnu.org/licenses/lgpl.html
File Path: C:\Users\Dad\.m2\repository\gnu-getopt\getopt\1.0.13\getopt-1.0.13.jar
MD5: f8532fcaaf3245e90331edfc48a13aca
SHA1: 5ec838b4363d7d17c8bd133353affc87fdfde184
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

  • maven: gnu-getopt:getopt:1.0.13   Confidence:HIGH

activation-1.1.jar

Description:  JavaBeans Activation Framework (JAF) is a standard extension to the Java platform that lets you take advantage of standard services to: determine the type of an arbitrary piece of data; encapsulate access to it; discover the operations available on it; and instantiate the appropriate bean to perform the operation(s).

License:

Common Development and Distribution License (CDDL) v1.0: https://glassfish.dev.java.net/public/CDDLv1.0.html
File Path: C:\Users\Dad\.m2\repository\javax\activation\activation\1.1\activation-1.1.jar
MD5: 8ae38e87cd4f86059c0294a8fe3e0b18
SHA1: e6cb541461c2834bdea3eb920f1884d1eb508b50
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms JbossWS Native JAXWS Agent:provided
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

ejb-api-3.0.jar

File Path: C:\Users\Dad\.m2\repository\javax\ejb\ejb-api\3.0\ejb-api-3.0.jar
MD5: bf9716b5dd34838c272aa44dfbab5fbc
SHA1: d4855ba9a1ecd993b751880567ec06ffcbd6fe06
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Distribution:compile
  • fgsms Status Service:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Automated Reporting Service:compile

Identifiers

jsr181-api-1.0-MR1.jar

File Path: C:\Users\Dad\.m2\repository\javax\jws\jsr181-api\1.0-MR1\jsr181-api-1.0-MR1.jar
MD5: c302b9eeac623e7ba29a4e7f5d4dd258
SHA1: 401cc1d0e5f0d8f4d0532a54928ceaa27ec21258
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

mail-1.4.7.jar

Description: JavaMail API (compat)

License:

http://www.sun.com/cddl, https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: C:\Users\Dad\.m2\repository\javax\mail\mail\1.4.7\mail-1.4.7.jar
MD5: 77f53ff0c78ba43c4812ecc9f53e20f8
SHA1: 9add058589d5d85adeb625859bf2c5eeaaedf12d
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms JbossWS Native JAXWS Agent:provided
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

javax.servlet-api-3.1.0.jar

Description: Java(TM) Servlet 3.1 API Design Specification

License:

CDDL + GPLv2 with classpath exception: https://glassfish.dev.java.net/nonav/public/CDDL+GPL.html
File Path: C:\Users\Dad\.m2\repository\javax\servlet\javax.servlet-api\3.1.0\javax.servlet-api-3.1.0.jar
MD5: 79de69e9f5ed8c7fcb8342585732bbf7
SHA1: 3cd63d075497751784b2fa84be59432f4905bf7c
Referenced In Project/Scope: fgsms Common WS Test Utilities:compile

Identifiers

servlet-api-2.5.jar

File Path: C:\Users\Dad\.m2\repository\javax\servlet\servlet-api\2.5\servlet-api-2.5.jar
MD5: 116fc16f3f700d756a57a2b8ea7c1044
SHA1: e69999122202bb1c275a80ad3281c4f69f2ea0b2
Referenced In Projects/Scopes:

  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms Reporting Service:provided
  • fgsms User Interface (Bootstrap):provided
  • fgsms Server Crash Alerter:compile
  • fgsms Common:provided
  • fgsms JbossWS Native JAXWS Agent:provided
  • fgsms Automated Reporting Service:compile
  • fgsms UI Common:provided
  • fgsms Tomcat Packaging:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Status Service:provided
  • fgsms Data Access Service:provided
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Service WAR:provided
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile
  • fgsms Generic JAXWS Agent:provided
  • fgsms Data Collector Service:provided
  • fgsms Policy Configuration Service:provided
  • fgsms Status (Bueller) Agent:compile

Identifiers

  • maven: javax.servlet:servlet-api:2.5   Confidence:HIGH

javax.ws.rs-api-2.0-m10.jar

Description: Java.net - The Source for Java Technology Collaboration

License:

CDDL 1.1: http://glassfish.java.net/public/CDDL+GPL_1_1.html
GPL2 w/ CPE: http://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: C:\Users\Dad\.m2\repository\javax\ws\rs\javax.ws.rs-api\2.0-m10\javax.ws.rs-api-2.0-m10.jar
MD5: 86cdb9036c14a84efa2711e2791e9210
SHA1: 74705b1b0c448f88cff1a46f431b70b23588e8f4
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

jaxb-api-2.2.3.jar

Description: JAXB (JSR 222) API

License:

CDDL 1.1: https://glassfish.java.net/public/CDDL+GPL_1_1.html
GPL2 w/ CPE: https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: C:\Users\Dad\.m2\repository\javax\xml\bind\jaxb-api\2.2.3\jaxb-api-2.2.3.jar
MD5: 6a889a54e7729d7e7cf0f3487260d1b4
SHA1: 184d5f1060c41a8fa28e55b8b7d2c96bec99b079
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

stax-api-1.0-2.jar

File Path: C:\Users\Dad\.m2\repository\javax\xml\stream\stax-api\1.0-2\stax-api-1.0-2.jar
MD5: 7d18b63063580284c3f5734081fdc99f
SHA1: d6337b0de8b25e53e81b922352fbea9f9f57ba0b
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jboss-jaxb-intros-1.0.2.GA.jar

License:

lgpl: http://repository.jboss.com/licenses/lgpl.txt
File Path: C:\Users\Dad\.m2\repository\jboss\jaxbintros\jboss-jaxb-intros\1.0.2.GA\jboss-jaxb-intros-1.0.2.GA.jar
MD5: a9c7976831c538b95bb0a9f6132eb425
SHA1: 01c2cfbb1314ccfd041080c3f522f23ba194193c
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

joda-time-2.2.jar

Description: Date and time library to replace JDK date handling

License:

Apache 2: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\joda-time\joda-time\2.2\joda-time-2.2.jar
MD5: 226f5207543c490f10f234e82108b998
SHA1: a5f29a7acaddea3f4af307e8cf2d0cc82645fd7d
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

junit-4.12.jar

Description: JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck.

License:

Eclipse Public License 1.0: http://www.eclipse.org/legal/epl-v10.html
File Path: C:\Users\Dad\.m2\repository\junit\junit\4.12\junit-4.12.jar
MD5: 5b38c40c97fbd0adee29f91e60405584
SHA1: 2973d150c0dc1fefe998f834810d68f278ea58ec
Referenced In Project/Scope: fgsms Common WS Test Utilities:compile

Identifiers

log4j-1.2.17.jar

Description: Apache Log4j 1.2

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\log4j\log4j\1.2.17\log4j-1.2.17.jar
MD5: 04a41f0a068986f0f73485cf507c0f40
SHA1: 5af35056b4d257e4b64b9e8069c0746e8b08629f
Referenced In Projects/Scopes:
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms WS-Notification Client:compile
  • fgsms Server Crash Alerter:compile
  • fgsms Agent Core:compile
  • fgsms UI Common:compile
  • fgsms Data Pruner:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Database Export Tool:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms Interfaces WS Stubs and Schema Bindings Generated from WSDL:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Sample SLA Plugin:compile
  • fgsms Data Collector Service:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms Command Line Interface:compile
  • fgsms Recryptor:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Status Service:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Jboss ESB Agent:compile
  • fgsms WS-Notification Specification:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Qpid C++ Py Agent:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms Dependency Scanner:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Tomcat JDCP Encryption Connection:provided
  • fgsms JbossWS Native JAXWS Agent:compile
  • fgsms Sample - Export data via web service:compile
  • fgsms Data Access Service:compile
  • fgsms Sample - Export data from database direct:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Automated Reporting Service:compile
  • fgsms WS-Notification Broker (Jar):compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Operating System Agent:compile
  • fgsms Sample SLA Plugin Webservice:compile
  • fgsms UDDI Publisher:compile
  • fgsms Distribution:compile
  • fgsms Service WAR:compile
  • fgsms Common:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache CXF Agent:compile
  • fgsms DNS Discovery:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

logkit-1.0.1.jar

File Path: C:\Users\Dad\.m2\repository\logkit\logkit\1.0.1\logkit-1.0.1.jar
MD5: 32240100a5c15d53f00392fae4b0aab7
SHA1: aaf5649b523c5ffc925e746074979150bb74bfdc
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UI Common:compile
  • fgsms JbossWS Native JAXWS Agent:provided
  • fgsms Automated Reporting Service:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

oauth-provider-20100527.jar

File Path: C:\Users\Dad\.m2\repository\net\oauth\core\oauth-provider\20100527\oauth-provider-20100527.jar
MD5: afdc85d3f14481e4842c317c4f414f7e
SHA1: 165bfc97e63e5af8e052a47f4dee832ce06bf7d7
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

oauth-20100527.jar

File Path: C:\Users\Dad\.m2\repository\net\oauth\core\oauth\20100527\oauth-20100527.jar
MD5: 91c7c70579f95b7ddee95b2143a49b41
SHA1: a84c5331e225bc25a5a288db328048d6b1bb6fd5
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

ehcache-core-2.5.1.jar

Description: This is the ehcache core module. Pair it with other modules for added functionality.

License:

The Apache Software License, Version 2.0: src/assemble/EHCACHE-CORE-LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\net\sf\ehcache\ehcache-core\2.5.1\ehcache-core-2.5.1.jar
MD5: 143cfff4c10373af9e422eb9fe4ec561
SHA1: 574be2dda111c3c05d4684e279e9e973fbdc4967
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

ehcache-core-2.5.1.jar: sizeof-agent.jar

File Path: C:\Users\Dad\.m2\repository\net\sf\ehcache\ehcache-core\2.5.1\ehcache-core-2.5.1.jar\net\sf\ehcache\pool\sizeof\sizeof-agent.jar
MD5: 5ad919b3ac0516897bdca079c9a222a8
SHA1: e86399a80ae6a6c7a563717eaa0ce9ba4708571c
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

  • maven: net.sf.ehcache:sizeof-agent:1.0.1   Confidence:HIGH

axis-1.4.jar

Description: POM was created from deploy:deploy-file

File Path: C:\Users\Dad\.m2\repository\org\apache\axis\axis\1.4\axis-1.4.jar
MD5: 03dcfdd88502505cc5a805a128bfdd8d
SHA1: 94a9ce681a42d0352b3ad22659f67835e560d107
Referenced In Project/Scope: fgsms Apache Axis 1.x Agent:provided

Identifiers

CVE-2014-3596  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Vulnerable Software & Versions: (show all)

CVE-2012-5784  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Vulnerable Software & Versions: (show all)

commons-lang3-3.5.jar

Description:  Apache Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\commons\commons-lang3\3.5\commons-lang3-3.5.jar
MD5: 780b5a8b72eebe6d0dbff1c11b5658fa
SHA1: 6c6c702c89bfff3cd9e80b04d668c5e190d588c6
Referenced In Projects/Scopes:
  • fgsms JbossWS Native JAXWS Agent:compile
  • fgsms Sample - Export data via web service:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms Data Access Service:compile
  • fgsms Sample - Export data from database direct:compile
  • fgsms Server Crash Alerter:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Agent Core:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Database Export Tool:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Sample SLA Plugin:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Operating System Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Data Collector Service:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile
  • fgsms Command Line Interface:compile
  • fgsms Recryptor:compile
  • fgsms Distribution:compile
  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Jboss ESB Agent:compile
  • fgsms Common:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Qpid C++ Py Agent:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms Dependency Scanner:compile
  • fgsms DNS Discovery:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

cxf-rt-core-2.7.11.jar

Description: Apache CXF Runtime Core

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\cxf\cxf-rt-core\2.7.11\cxf-rt-core-2.7.11.jar
MD5: 6e9ff60dd475ba1c91d8c358e70b540f
SHA1: 928f3aaeea343f2b370527f21d9e8379e7d0d6b7
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

CVE-2015-5253  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The SAML Web SSO module in Apache CXF before 2.7.18, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote authenticated users to bypass authentication via a crafted SAML response with a valid signed assertion, related to a "wrapping attack."

Vulnerable Software & Versions: (show all)

CVE-2014-3623  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-287 Improper Authentication

Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.

Vulnerable Software & Versions: (show all)

CVE-2012-5786  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

The wsdl_first_https sample code in distribution/src/main/release/samples/wsdl_first_https/src/main/ in Apache CXF, possibly 2.6.0, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Vulnerable Software & Versions: (show all)

org.osgi.core-1.0.0.jar

Description: OSGi Service Platform Release 4 Core Interfaces and Classes.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\felix\org.osgi.core\1.0.0\org.osgi.core-1.0.0.jar
MD5: 2ea74604c9ab15a51e469fdc17758bd1
SHA1: 8a73e8fe4cf05c6b2565f89695ac2d676d76202f
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache CXF Agent OSGI:compile

Identifiers

geronimo-javamail_1.4_mail-1.8.3.jar

Description: Geronimmo JavaMail Bundle.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\javamail\geronimo-javamail_1.4_mail\1.8.3\geronimo-javamail_1.4_mail-1.8.3.jar
MD5: eea5be6c1c77dfa6193a77d5164e4706
SHA1: c43b8c1e0fc4fb83300d2b0c20ea5043b5d17268
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

CVE-2011-5034  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.

Vulnerable Software & Versions: (show all)

CVE-2008-0732  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-59 Improper Link Resolution Before File Access ('Link Following')

The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.

Vulnerable Software & Versions:

geronimo-j2ee_1.4_spec-1.1.jar

File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\specs\geronimo-j2ee_1.4_spec\1.1\geronimo-j2ee_1.4_spec-1.1.jar
MD5: e543bc5784a12d37bdac8eafa49164d6
SHA1: eca7ea0d0683f270bc7e67bb4d7714835962f16c
Referenced In Projects/Scopes:

  • fgsms Service WAR:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

geronimo-javamail_1.4_spec-1.7.1.jar

Description: Javamail 1.4 Specification

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\specs\geronimo-javamail_1.4_spec\1.7.1\geronimo-javamail_1.4_spec-1.7.1.jar
MD5: f3b9d8c9a79eefdc0ebe07c34612646d
SHA1: 43ad4090b1a07a11c82ac40c01fc4e2fbad20013
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

geronimo-jaxws_2.2_spec-1.0.jar

Description: Java API for XML Web Services 2.2

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\specs\geronimo-jaxws_2.2_spec\1.0\geronimo-jaxws_2.2_spec-1.0.jar
MD5: 9aebd4fe231f977a639910027bd75d7b
SHA1: 767918cc18994873c05f1109356c2178d03c8cc9
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Interfaces WS Stubs and Schema Bindings Generated from WSDL:provided

Identifiers

geronimo-jaxws_2.2_spec-1.1.jar

Description: Java API for XML Web Services 2.2

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\specs\geronimo-jaxws_2.2_spec\1.1\geronimo-jaxws_2.2_spec-1.1.jar
MD5: d5cbeee473208a649112127e3dc528d3
SHA1: 90745e1423874010d561588c944efeb9552a0091
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

geronimo-jms_1.1_spec-1.1.1.jar

Description: Provides open-source implementations of Sun specifications.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\specs\geronimo-jms_1.1_spec\1.1.1\geronimo-jms_1.1_spec-1.1.1.jar
MD5: d80ce71285696d36c1add1989b94f084
SHA1: c872b46c601d8dc03633288b81269f9e42762cea
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

geronimo-servlet_3.0_spec-1.0.jar

Description: Servlet 3.0 API

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\specs\geronimo-servlet_3.0_spec\1.0\geronimo-servlet_3.0_spec-1.0.jar
MD5: 10d92f2ddb23703f0f48d046016e3e9d
SHA1: 0d45e479fd200236c71182c5f6b6077a5fb53f89
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Servlet Filter Agent:provided
  • fgsms Apache CXF Agent:provided

Identifiers

httpasyncclient-4.0-beta3.jar

Description:  HttpComponents AsyncClient (base module)

File Path: C:\Users\Dad\.m2\repository\org\apache\httpcomponents\httpasyncclient\4.0-beta3\httpasyncclient-4.0-beta3.jar
MD5: 0d7de844d1e348bf2d01ea84da612edf
SHA1: c841ffe78b77d6ca1fd38f744e2b107b5f6f74d6
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

CVE-2014-3577  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

Vulnerable Software & Versions: (show all)

httpclient-4.3.3.jar

Description:  HttpComponents Client

File Path: C:\Users\Dad\.m2\repository\org\apache\httpcomponents\httpclient\4.3.3\httpclient-4.3.3.jar
MD5: 88cc3123fce88d61b7c2cdbfc33542c5
SHA1: 18f4247ff4572a074444572cee34647c43e7c9c7
Referenced In Projects/Scopes:

  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Agent Core:provided
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

CVE-2015-5262  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.

Vulnerable Software & Versions:

CVE-2014-3577  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

Vulnerable Software & Versions: (show all)

httpcore-nio-4.2.4.jar

Description:  HttpComponents Core (non-blocking I/O)

File Path: C:\Users\Dad\.m2\repository\org\apache\httpcomponents\httpcore-nio\4.2.4\httpcore-nio-4.2.4.jar
MD5: db3f32abe8abad5b442e77d624db666f
SHA1: 78afeee7048b6f541f0b2290a926b2af5768410f
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

httpcore-4.2.4.jar

Description:  HttpComponents Core (blocking I/O)

File Path: C:\Users\Dad\.m2\repository\org\apache\httpcomponents\httpcore\4.2.4\httpcore-4.2.4.jar
MD5: 6ccb86231d8a8b99c551b4ddf926ddd1
SHA1: 3b7f38df6de5dd8b500e602ae8c2dd5ee446f883
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:compile

Identifiers

httpcore-4.3.2.jar

Description:  HttpComponents Core (blocking I/O)

File Path: C:\Users\Dad\.m2\repository\org\apache\httpcomponents\httpcore\4.3.2\httpcore-4.3.2.jar
MD5: ee3d34dce4a30c7d3002cadf8c9172c1
SHA1: 31fbbff1ddbf98f3aa7377c94d33b0447c646b6e
Referenced In Projects/Scopes:

  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

juddi-client-3.3.3.jar

Description: jUDDI (pronounced "Judy") is an open source Java implementation of the Universal Description, Discovery, and Integration (UDDI) specification for Web Services.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\juddi\juddi-client\3.3.3\juddi-client-3.3.3.jar
MD5: 97c5bdf27e8b2b177d0621f8476942fd
SHA1: 02956c0e30405af75c9866ccf1dba30697d19781
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile

Identifiers

uddi-ws-3.3.3.jar

Description: jUDDI (pronounced "Judy") is an open source Java implementation of the Universal Description, Discovery, and Integration (UDDI) specification for Web Services.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\juddi\uddi-ws\3.3.3\uddi-ws-3.3.3.jar
MD5: bb20c0b7902db12bc44154a7883ba79a
SHA1: ba7abcb195c7fe6048e734925fd29622b1959447
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile

Identifiers

mina-core-2.0.7.jar

Description: Apache MINA is a network application framework which helps users develop high performance and highly scalable network applications easily. It provides an abstract event-driven asynchronous API over various transports such as TCP/IP and UDP/IP via Java NIO.

License:

http://www.apache.org/licenses/LICENSE-2.0
File Path: C:\Users\Dad\.m2\repository\org\apache\mina\mina-core\2.0.7\mina-core-2.0.7.jar
MD5: f4e43e7fa0514a9bc88968d64a6322d8
SHA1: c878e2aa82de748474a624ec3933e4604e446dec
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

neethi-3.0.3.jar

Description: Apache Neethi provides general framework for the programmers to use WS Policy. It is compliant with latest WS Policy specification which was published in March 2006. This framework is specifically written to enable the Apache Web services stack to use WS Policy as a way of expressing it's requirements and capabilities.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\neethi\neethi\3.0.3\neethi-3.0.3.jar
MD5: 8a81813a03e2899ccd31f0e92f6cc691
SHA1: ee37a38bbf9f355ee88ba554a85c9220b75ba500
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

qpid-client-6.0.0.jar

Description: JMS client supporting AMQP 0-8, 0-9, 0-9-1 and 0-10.

File Path: C:\Users\Dad\.m2\repository\org\apache\qpid\qpid-client\6.0.0\qpid-client-6.0.0.jar
MD5: 244a004182de831f2ff3774dbac2741f
SHA1: 0a4c3e81e2c4777bf3d50c293391831a5dd1acf9
Referenced In Projects/Scopes:

  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile
  • fgsms Service Level Agreement Processor:compile

Identifiers

xmlsec-1.5.1.jar

Description:  Apache XML Security for Java supports XML-Signature Syntax and Processing, W3C Recommendation 12 February 2002, and XML Encryption Syntax and Processing, W3C Recommendation 10 December 2002. As of version 1.4, the library supports the standard Java API JSR-105: XML Digital Signature APIs.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\santuario\xmlsec\1.5.1\xmlsec-1.5.1.jar
MD5: ecf0046cfea8b48a12a6063396b2ca67
SHA1: bbf5d96a49a2b58b8988202a3c8728461639090e
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

CVE-2013-4517  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

Apache Santuario XML Security for Java before 1.5.6, when applying Transforms, allows remote attackers to cause a denial of service (memory consumption) via crafted Document Type Definitions (DTDs), related to signatures.

Vulnerable Software & Versions: (show all)

CVE-2013-2172  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-310 Cryptographic Issues

jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature."

Vulnerable Software & Versions: (show all)

xmlsec-1.5.6.jar

Description:  Apache XML Security for Java supports XML-Signature Syntax and Processing, W3C Recommendation 12 February 2002, and XML Encryption Syntax and Processing, W3C Recommendation 10 December 2002. As of version 1.4, the library supports the standard Java API JSR-105: XML Digital Signature APIs.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\santuario\xmlsec\1.5.6\xmlsec-1.5.6.jar
MD5: 592e0d74b5d62663ff1eb0ca95b410cc
SHA1: 0586cd437eaf166640b632eb6cfcfec2ebf52474
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

tomcat-dbcp-7.0.73.jar

Description: Tomcat Database Connection Pooling package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\tomcat\tomcat-dbcp\7.0.73\tomcat-dbcp-7.0.73.jar
MD5: a2231c98f224656c25baabb31009ff34
SHA1: 9edb65b034932a18594ceadd5bfeed1482f7e159
Referenced In Project/Scope: fgsms Tomcat JDCP Encryption Connection:provided

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

velocity-1.7.jar

Description: Apache Velocity is a general purpose template engine.

File Path: C:\Users\Dad\.m2\repository\org\apache\velocity\velocity\1.7\velocity-1.7.jar
MD5: 3692dd72f8367cb35fb6280dc2916725
SHA1: 2ceb567b8f3f21118ecdec129fe1271dbc09aa7a
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

wss4j-1.6.15.jar

Description:  The Apache WSS4J project provides a Java implementation of the primary security standards for Web Services, namely the OASIS Web Services Security (WS-Security) specifications from the OASIS Web Services Security TC.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\ws\security\wss4j\1.6.15\wss4j-1.6.15.jar
MD5: 33fb88ebda6899f82a0a1a9b6279d8f8
SHA1: aa3313807a4cdd2dcc4c984643619d9f8df4a267
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

CVE-2015-0227  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Apache WSS4J before 1.6.17 and 2.x before 2.0.2 allows remote attackers to bypass the requireSignedEncryptedDataElements configuration via a vectors related to "wrapping attacks."

Vulnerable Software & Versions: (show all)

CVE-2014-3623  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-287 Improper Authentication

Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.

Vulnerable Software & Versions: (show all)

xmlschema-core-2.1.0.jar

Description: Commons XMLSchema is a light weight schema object model that can be used to manipulate or generate XML schema.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\ws\xmlschema\xmlschema-core\2.1.0\xmlschema-core-2.1.0.jar
MD5: 0856f69b09dcb6e0f47f1aee13c9b74d
SHA1: 93415557e2867469c33be98ab330655dd714297d
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

xmlbeans-2.6.0.jar

Description: XmlBeans main jar

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\xmlbeans\xmlbeans\2.6.0\xmlbeans-2.6.0.jar
MD5: 6591c08682d613194dacb01e95c78c2c
SHA1: 29e80d2dd51f9dcdef8f9ffaee0d4dc1c9bbfc87
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

jettison-1.3.4.jar

Description: A StAX implementation for JSON.

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: C:\Users\Dad\.m2\repository\org\codehaus\jettison\jettison\1.3.4\jettison-1.3.4.jar
MD5: 511ae111646da8c9044710dca1cb58fc
SHA1: 3c08d8f699432e23023080cdc8b4073132473dc8
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms JbossWS Native JAXWS Agent:provided

Identifiers

stax2-api-3.1.4.jar

Description: tax2 API is an extension to basic Stax 1.0 API that adds significant new functionality, such as full-featured bi-direction validation interface and high-performance Typed Access API.

License:

The BSD License: http://www.opensource.org/licenses/bsd-license.php
File Path: C:\Users\Dad\.m2\repository\org\codehaus\woodstox\stax2-api\3.1.4\stax2-api-3.1.4.jar
MD5: c08e89de601b0a78f941b2c29db565c3
SHA1: ac19014b1e6a7c08aad07fe114af792676b685b7
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

woodstox-core-asl-4.2.1.jar

Description: Woodstox is a high-performance XML processor that implements Stax (JSR-173) and SAX2 APIs

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\codehaus\woodstox\woodstox-core-asl\4.2.1\woodstox-core-asl-4.2.1.jar
MD5: 767eb8001863dd8bf101c6756e7feed2
SHA1: 0ce8115adb515bc740dbe726a918983c48c9752d
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

wstx-asl-3.2.3.jar

Description: Woodstox is a high-performance XML processor that implements Stax (JSR-173) API

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\codehaus\woodstox\wstx-asl\3.2.3\wstx-asl-3.2.3.jar
MD5: f38076f35178eeff694ad1d9f3da8149
SHA1: cd702d934c0dc3c83c4842cc0711f402eba5c0ee
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

wstx-lgpl-3.2.6.jar

Description: Woodstox is a high-performance XML processor that implements Stax (JSR-173) API

License:

GNU Lesser General Public License (LGPL), Version 2.1: http://www.fsf.org/licensing/licenses/lgpl.txt
File Path: C:\Users\Dad\.m2\repository\org\codehaus\woodstox\wstx-lgpl\3.2.6\wstx-lgpl-3.2.6.jar
MD5: 299c95cc0e877d3744e8d797c75984e8
SHA1: 39e31be0de0f1a4c5755a336fb5fb5599afd7274
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jetty-http-8.1.14.v20131031.jar

Description: Administrative parent pom for Jetty modules

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.php
File Path: C:\Users\Dad\.m2\repository\org\eclipse\jetty\jetty-http\8.1.14.v20131031\jetty-http-8.1.14.v20131031.jar
MD5: b8fe3573099f356c3d4af675e05f1790
SHA1: 8dd4e01b374e16cf0335b7975a7aa0a57396d5da
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

  • cpe: cpe:/a:eclipse:jetty:8.1.14.v20131031   Confidence:LOW   
  • cpe: cpe:/a:jetty:jetty:8.1.14.v20131031   Confidence:LOW   
  • maven: org.eclipse.jetty:jetty-http:8.1.14.v20131031   Confidence:HIGHEST

jetty-io-8.1.14.v20131031.jar

Description: Administrative parent pom for Jetty modules

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.php
File Path: C:\Users\Dad\.m2\repository\org\eclipse\jetty\jetty-io\8.1.14.v20131031\jetty-io-8.1.14.v20131031.jar
MD5: e62180200f8e3cf6be6aebc4b5988723
SHA1: 12f6f92d7e58349501f2cfc0716b8f1c6a2962eb
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

hamcrest-core-1.3.jar

Description:  This is the core API of hamcrest matcher framework to be used by third-party framework providers. This includes the a foundation set of matcher implementations for common operations.

File Path: C:\Users\Dad\.m2\repository\org\hamcrest\hamcrest-core\1.3\hamcrest-core-1.3.jar
MD5: 6393363b47ddcbba82321110c3e07519
SHA1: 42a25dc3219429f0e5d060061f71acb49bf010a0
Referenced In Project/Scope: fgsms Common WS Test Utilities:compile

Identifiers

javassist-3.15.0-GA.jar

Description: Javassist (JAVA programming ASSISTant) makes Java bytecode manipulation simple. It is a class library for editing bytecodes in Java.

License:

MPL 1.1: http://www.mozilla.org/MPL/MPL-1.1.html
LGPL 2.1: http://www.gnu.org/licenses/lgpl-2.1.html
Apache License 2.0: http://www.apache.org/licenses/
File Path: C:\Users\Dad\.m2\repository\org\javassist\javassist\3.15.0-GA\javassist-3.15.0-GA.jar
MD5: 2fcae06eedcddd3e5b0fe32416f99c1c
SHA1: 79907309ca4bb4e5e51d4086cc4179b2611358d7
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jboss-logging-3.1.0.GA.jar

Description: The JBoss Logging Framework

License:

GNU Lesser General Public License, version 2.1: http://www.gnu.org/licenses/lgpl-2.1.txt
File Path: C:\Users\Dad\.m2\repository\org\jboss\logging\jboss-logging\3.1.0.GA\jboss-logging-3.1.0.GA.jar
MD5: 735bcea3e47fd715900cfb95ec68b50f
SHA1: c71f2856e7b60efe485db39b37a31811e6c84365
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

netty-3.2.6.Final.jar

Description:  The Netty project is an effort to provide an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: C:\Users\Dad\.m2\repository\org\jboss\netty\netty\3.2.6.Final\netty-3.2.6.Final.jar
MD5: 1de6215db3a110a3e23889678c62abe2
SHA1: 7b0364d483095f912c860a641bd0748d4a386274
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jboss-servlet-api_3.0_spec-1.0.0.Final.jar

Description: The Java Servlet 3.0 API classes

File Path: C:\Users\Dad\.m2\repository\org\jboss\spec\javax\servlet\jboss-servlet-api_3.0_spec\1.0.0.Final\jboss-servlet-api_3.0_spec-1.0.0.Final.jar
MD5: b4066d8cc5d2980a4811ef781b1eb8ef
SHA1: 44fb8e9dff4a0ec4081bb5492b9a3a9ab9c3466b
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jboss-jaxb-api_2.2_spec-1.0.3.Final.jar

Description: Java Architecture for XML Binding Version 2.2 classes

File Path: C:\Users\Dad\.m2\repository\org\jboss\spec\javax\xml\bind\jboss-jaxb-api_2.2_spec\1.0.3.Final\jboss-jaxb-api_2.2_spec-1.0.3.Final.jar
MD5: e64bc49dcc94f287c07e8e017d63f21b
SHA1: cc005681297fb411fba21ddbef43eee48304fde1
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jboss-jaxrpc-api_1.1_spec-1.0.0.Final.jar

Description: The JAX-RPC 1.1 API classes

File Path: C:\Users\Dad\.m2\repository\org\jboss\spec\javax\xml\rpc\jboss-jaxrpc-api_1.1_spec\1.0.0.Final\jboss-jaxrpc-api_1.1_spec-1.0.0.Final.jar
MD5: 94fc2b8394867286fc0f90c64c8e3e78
SHA1: 1a10a2215a433d5102aef193692557709ae49573
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jboss-saaj-api_1.3_spec-1.0.1.Final.jar

Description: The SOAP with Attachments API for Java Version 1.3 classes

File Path: C:\Users\Dad\.m2\repository\org\jboss\spec\javax\xml\soap\jboss-saaj-api_1.3_spec\1.0.1.Final\jboss-saaj-api_1.3_spec-1.0.1.Final.jar
MD5: 8eca9cd2c277eb04f3efc31e2102a3d1
SHA1: 6889e071d48a16056df01a1bae38f17157413d64
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jboss-jaxws-api_2.2_spec-2.0.2.Final.jar

Description: JSR-000224: Java(TM) API for XML-Based Web Services 2.2

License:

Common Development and Distribution License: http://repository.jboss.org/licenses/cddl.txt
GNU General Public License, Version 2 with the Classpath Exception: http://repository.jboss.org/licenses/gpl-2.0-ce.txt
File Path: C:\Users\Dad\.m2\repository\org\jboss\spec\javax\xml\ws\jboss-jaxws-api_2.2_spec\2.0.2.Final\jboss-jaxws-api_2.2_spec-2.0.2.Final.jar
MD5: c7aad7459433b86a73d56ab86cf69560
SHA1: 1d72b9108f4d93a168b8e3d377c874ee35cd28d2
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jbossws-api-1.0.0.GA.jar

Description: JBossWS API

File Path: C:\Users\Dad\.m2\repository\org\jboss\ws\jbossws-api\1.0.0.GA\jbossws-api-1.0.0.GA.jar
MD5: caf48a05f7eb99b20cb7e11f82db19c8
SHA1: c55f95e5992cb4631617d1d3334b93e2d0f86530
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

  • maven: org.jboss.ws:jbossws-api:1.0.0.GA   Confidence:HIGH

jbossws-common-tools-1.0.0.GA.jar

Description: JBossWS Common Tools

File Path: C:\Users\Dad\.m2\repository\org\jboss\ws\jbossws-common-tools\1.0.0.GA\jbossws-common-tools-1.0.0.GA.jar
MD5: 87c7ce1f6b4852434c5d26cf33d457d8
SHA1: 92de6d2c77b9832d5b3ebb04aab3901f24875d07
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

  • maven: org.jboss.ws:jbossws-common-tools:1.0.0.GA   Confidence:HIGH

jbossws-common-3.1.3.Final.jar

Description: JBossWS Common

File Path: C:\Users\Dad\.m2\repository\org\jboss\ws\jbossws-common\3.1.3.Final\jbossws-common-3.1.3.Final.jar
MD5: d6d3dc433ab396a4f5d588cf55c67128
SHA1: f5f349abde594c726d6034eaa2f01a5606300b54
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jbossws-spi-3.1.2.Final.jar

Description: JBossWS SPI

File Path: C:\Users\Dad\.m2\repository\org\jboss\ws\jbossws-spi\3.1.2.Final\jbossws-spi-3.1.2.Final.jar
MD5: 6b1dbb8f6030745279eda3cd8b1cdd51
SHA1: 4772c33f92417fc3d007b5c0d9a9e92c0111fa94
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

jbossws-native-client-4.0.2.GA.jar

File Path: C:\Users\Dad\.m2\repository\org\jboss\ws\native\jbossws-native-client\4.0.2.GA\jbossws-native-client-4.0.2.GA.jar
MD5: b9b25d9db591efa3f53edf4cf88400e4
SHA1: 24d3fd7e2cf22c5f6877b7009e83979d7ae0ed8d
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

  • maven: org.jboss.ws.native:jbossws-native-client:4.0.2.GA   Confidence:HIGH

jbossws-native-core-4.0.2.GA.jar

File Path: C:\Users\Dad\.m2\repository\org\jboss\ws\native\jbossws-native-core\4.0.2.GA\jbossws-native-core-4.0.2.GA.jar
MD5: e1cba91b6727688dbdcd772e711ff031
SHA1: 800a9b139bb273cbd767a57389c7a22a8174abae
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

  • cpe: cpe:/a:redhat:jboss_web_server:4.0.2   Confidence:LOW   
  • maven: org.jboss.ws.native:jbossws-native-core:4.0.2.GA   Confidence:HIGH

jbossws-native-factories-4.0.2.GA.jar

File Path: C:\Users\Dad\.m2\repository\org\jboss\ws\native\jbossws-native-factories\4.0.2.GA\jbossws-native-factories-4.0.2.GA.jar
MD5: 03797155ae34a0f19e303166565f11b9
SHA1: ecc0ad36e21b167a8d8e6155a32ee67bd3f0c4ee
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

  • maven: org.jboss.ws.native:jbossws-native-factories:4.0.2.GA   Confidence:HIGH

jbossws-native-services-4.0.2.GA.jar

File Path: C:\Users\Dad\.m2\repository\org\jboss\ws\native\jbossws-native-services\4.0.2.GA\jbossws-native-services-4.0.2.GA.jar
MD5: 6d92e327831fb03b6dfb81fef371ad1e
SHA1: 174a193954697f89bb466285b4bd8a4c29c3dfc3
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

  • maven: org.jboss.ws.native:jbossws-native-services:4.0.2.GA   Confidence:HIGH

jcommon-1.0.23.jar

Description:  JCommon is a free general purpose Java class library that is used in several projects at www.jfree.org, including JFreeChart and JFreeReport.

License:

GNU Lesser General Public Licence: http://www.gnu.org/licenses/lgpl.txt
File Path: C:\Users\Dad\.m2\repository\org\jfree\jcommon\1.0.23\jcommon-1.0.23.jar
MD5: 1b059adc60fef2da40b7130f9a67f977
SHA1: a316f336ca996e0c6bec4e4fbd49be8f5e1c3968
Referenced In Projects/Scopes:
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

jfreechart-1.0.19.jar

Description:  JFreeChart is a class library, written in Java, for generating charts. Utilising the Java2D APIs, it currently supports bar charts, pie charts, line charts, XY-plots and time series plots.

License:

GNU Lesser General Public Licence: http://www.gnu.org/licenses/lgpl.txt
File Path: C:\Users\Dad\.m2\repository\org\jfree\jfreechart\1.0.19\jfreechart-1.0.19.jar
MD5: 4ff3762bd04a7239cfb98de542134bec
SHA1: ba9ee7dbb2e4c57a6901c79f614ed2dea9cc0e20
Referenced In Projects/Scopes:
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

stax-ex-1.2.jar

Description: Extensions to JSR-173 StAX API.

License:

Common Development And Distribution License (CDDL) Version 1.0: http://www.sun.com/cddl/cddl.html
File Path: C:\Users\Dad\.m2\repository\org\jvnet\staxex\stax-ex\1.2\stax-ex-1.2.jar
MD5: e5b8a72a34f085b92ef54d8cd7a24a1c
SHA1: a0ad9319e140a1e5ddcc77f870ca67722bab8ff7
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

xchart-3.0.0.jar

Description: The core XChart library

File Path: C:\Users\Dad\.m2\repository\org\knowm\xchart\xchart\3.0.0\xchart-3.0.0.jar
MD5: a0fa77ed0eeb3e8c7c5801b2d0b9c545
SHA1: 83f605b9d59f9e860e85c8c53cb6ed736eb99e85
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Service WAR:compile
  • fgsms Automated Reporting Service:compile

Identifiers

apache-tomcat-7.0.0.zip: bootstrap.jar

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\bootstrap.jar
MD5: cac2293dd18e80d21ac30a8d74fcf9a9
SHA1: 612e52b45f2435bcde5234eb3a5d7c8ead7ac7f4
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • cpe: cpe:/a:apache:tomcat:7.0.75   Confidence:LOW   
  • cpe: cpe:/a:apache_software_foundation:tomcat:7.0.75   Confidence:LOW   

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: commons-daemon.jar

Description:  Apache Commons Daemon software provides an alternative invocation mechanism for unix-daemon-like Java code.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\commons-daemon.jar
MD5: 631bfc43cf5f601d34f1f5ea16751061
SHA1: 275b3f1efc36c6a5c276440a96a489f4ff90fa8a
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

apache-tomcat-7.0.0.zip: tcnative-1.dll

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\tcnative-1.dll
MD5: c3d31bc0aaf44e51d3625e6ce3e45b14
SHA1: de6d92def1c2aa7faedbac1dafc323a29fb87163
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • None

apache-tomcat-7.0.0.zip: tomcat-juli.jar

Description: Tomcat Core Logging Package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\tomcat-juli.jar
MD5: 447efa554024a83cc16d0a8a14ead419
SHA1: 5186c4cf4c5861f74ba945ab1328ed53100597c0
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

apache-tomcat-7.0.0.zip: tomcat7.exe

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\tomcat7.exe
MD5: f0ec67a5280737765805614db4b72355
SHA1: 414a32186456dfa23222ca38cfa26d4e6587aef2
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • None

apache-tomcat-7.0.0.zip: tomcat7w.exe

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\tomcat7w.exe
MD5: 7ba316ca9e5ff204ef9e30f881573c77
SHA1: 0b48fd55c03fe6abda44f35cf61d2da8bb7e8171
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • None

apache-tomcat-7.0.0.zip: annotations-api.jar

Description: Annotations Package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\annotations-api.jar
MD5: a322dc688932071393c8bf6ccb95fb0b
SHA1: c634ca04e5b988d8283d14f9c8812bc9ca59d8c8
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

CVE-2014-0119  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

Vulnerable Software & Versions: (show all)

CVE-2014-0099  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-189 Numeric Errors

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

Vulnerable Software & Versions: (show all)

CVE-2014-0096  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2014-0075  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

Vulnerable Software & Versions: (show all)

CVE-2013-6357  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-352

** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator."

Vulnerable Software & Versions: (show all)

CVE-2013-4590  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2013-4444  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')

Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.

Vulnerable Software & Versions: (show all)

CVE-2013-4322  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.

Vulnerable Software & Versions: (show all)

CVE-2013-4286  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

Vulnerable Software & Versions: (show all)

CVE-2013-2185  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

** DISPUTED ** The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue.

Vulnerable Software & Versions: (show all)

CVE-2012-5568  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-16 Configuration

Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.

Vulnerable Software & Versions: (show all)

CVE-2009-3548  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-255 Credentials Management

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

Vulnerable Software & Versions: (show all)

CVE-2009-2696  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

Vulnerable Software & Versions:

CVE-2008-0128  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-16 Configuration

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Vulnerable Software & Versions:

CVE-2007-2449  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.

Vulnerable Software & Versions: (show all)

CVE-2007-1358  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".

Vulnerable Software & Versions: (show all)

CVE-2007-0450  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.

Vulnerable Software & Versions: (show all)

CVE-2006-7196  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1.

Vulnerable Software & Versions: (show all)

CVE-2005-4838  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp. NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.

Vulnerable Software & Versions:

CVE-2005-0808  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.

Vulnerable Software & Versions: (show all)

CVE-2003-0045  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp.

Vulnerable Software & Versions: (show all)

CVE-2003-0044  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.

Vulnerable Software & Versions: (show all)

CVE-2003-0043  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, uses trusted privileges when processing the web.xml file, which could allow remote attackers to read portions of some files through the web.xml file.

Vulnerable Software & Versions: (show all)

CVE-2003-0042  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.

Vulnerable Software & Versions: (show all)

CVE-2002-2006  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.

Vulnerable Software & Versions: (show all)

CVE-2002-1148  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.

Vulnerable Software & Versions: (show all)

CVE-2002-0493  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-254 Security Features

Apache Tomcat may be started without proper security settings if errors are encountered while reading the web.xml file, which could allow attackers to bypass intended restrictions.

Vulnerable Software & Versions:

CVE-2001-0590  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).

Vulnerable Software & Versions:

CVE-2000-1210  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.

Vulnerable Software & Versions:

CVE-2000-0760  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.

Vulnerable Software & Versions: (show all)

CVE-2000-0672  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: catalina.jar

Description: Tomcat Servlet Engine Core Classes and Standard implementations

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\catalina.jar
MD5: 689fa27acde913a45dea53eec555adac
SHA1: 05b715998704de3fa5c9be23892113517f692ba4
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: ecj-4.4.2.jar

Description: Eclipse JDT Core Batch Compiler

License:

Eclipse Public License v1.0: http://www.eclipse.org/org/documents/epl-v10.php
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\ecj-4.4.2.jar
MD5: ee97ab38f390547839b950bb51bf5cb5
SHA1: 71d67f5bab9465ec844596ef844f40902ae25392
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

apache-tomcat-7.0.0.zip: el-api.jar

Description: Expression language package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\el-api.jar
MD5: e05958941a2e587663ae00419787e2ec
SHA1: e72aacfb9ec1e3b3e883909f064a3db5d8c1efc7
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: jasper.jar

Description: Tomcats JSP Parser

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\jasper.jar
MD5: 75b32bfd24275d303db338521cd411cc
SHA1: fd8af82bd301d00aafa267ce479be112b16f96b2
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: jsp-api.jar

Description: JSP package

License:

        Apache License, Version 2.0 and
        Common Development And Distribution License (CDDL) Version 1.0
      : 
        http://www.apache.org/licenses/LICENSE-2.0.txt and
        http://www.opensource.org/licenses/cddl1.txt
      
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\jsp-api.jar
MD5: 60f3daec8dc59f3969bfb413e9b9b2f9
SHA1: 44ed6c8dae1c3300c0b71f0ec7660a16d2502904
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: servlet-api.jar

Description: javax.servlet package

License:

        Apache License, Version 2.0 and
        Common Development And Distribution License (CDDL) Version 1.0
      : 
        http://www.apache.org/licenses/LICENSE-2.0.txt and
        http://www.opensource.org/licenses/cddl1.txt
      
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\servlet-api.jar
MD5: f34ae94d638382c6d61dd8bcdcf9c173
SHA1: a3fda076c3eefd660e1894b3420545a8cd42e57c
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

CVE-2014-0119  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

Vulnerable Software & Versions: (show all)

CVE-2014-0099  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-189 Numeric Errors

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

Vulnerable Software & Versions: (show all)

CVE-2014-0096  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2014-0075  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

Vulnerable Software & Versions: (show all)

CVE-2013-6357  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-352

** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator."

Vulnerable Software & Versions: (show all)

CVE-2013-4590  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2013-4444  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')

Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.

Vulnerable Software & Versions: (show all)

CVE-2013-4322  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.

Vulnerable Software & Versions: (show all)

CVE-2013-4286  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

Vulnerable Software & Versions: (show all)

CVE-2013-2185  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

** DISPUTED ** The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue.

Vulnerable Software & Versions: (show all)

CVE-2012-5568  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-16 Configuration

Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.

Vulnerable Software & Versions: (show all)

CVE-2009-3548  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-255 Credentials Management

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

Vulnerable Software & Versions: (show all)

CVE-2009-2696  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

Vulnerable Software & Versions:

CVE-2008-0128  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-16 Configuration

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Vulnerable Software & Versions:

CVE-2007-2449  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.

Vulnerable Software & Versions: (show all)

CVE-2007-1358  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".

Vulnerable Software & Versions: (show all)

CVE-2007-0450  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.

Vulnerable Software & Versions: (show all)

CVE-2006-7196  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1.

Vulnerable Software & Versions: (show all)

CVE-2005-4838  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp. NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.

Vulnerable Software & Versions:

CVE-2005-0808  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.

Vulnerable Software & Versions: (show all)

CVE-2003-0045  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp.

Vulnerable Software & Versions: (show all)

CVE-2003-0044  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.

Vulnerable Software & Versions: (show all)

CVE-2003-0043  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, uses trusted privileges when processing the web.xml file, which could allow remote attackers to read portions of some files through the web.xml file.

Vulnerable Software & Versions: (show all)

CVE-2003-0042  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.

Vulnerable Software & Versions: (show all)

CVE-2002-2006  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.

Vulnerable Software & Versions: (show all)

CVE-2002-1148  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.

Vulnerable Software & Versions: (show all)

CVE-2002-0493  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-254 Security Features

Apache Tomcat may be started without proper security settings if errors are encountered while reading the web.xml file, which could allow attackers to bypass intended restrictions.

Vulnerable Software & Versions:

CVE-2001-0590  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).

Vulnerable Software & Versions:

CVE-2000-1210  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.

Vulnerable Software & Versions:

CVE-2000-0760  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.

Vulnerable Software & Versions: (show all)

CVE-2000-0672  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: tomcat-api.jar

Description: Definition of interfaces shared by Catalina and Jasper

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\tomcat-api.jar
MD5: 232dcd1a0413b6bd17afb34a4202f051
SHA1: 4a3de75146d1e75de72f0e16a7eca674e1d163d2
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: tomcat-jdbc.jar

Description: Tomcat JDBC Pool Package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\tomcat-jdbc.jar
MD5: c664ae49eaee7dca82011913322efd97
SHA1: 3a0ad874759868ad99ca98a12d6d603b0d057fc2
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

apache-tomcat-7.0.0.zip: tomcat7-websocket.jar

Description: Tomcat WebSocket (JSR356) implementation

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\tomcat7-websocket.jar
MD5: 6277e62800974a8c85a6d42ca6a34bb4
SHA1: 9eec4f3edcb5e81804e2207d7413287ebe630b94
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: websocket-api.jar

Description: WebSocket (JSR356) API

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\websocket-api.jar
MD5: f6f63164f56ac8f09854f05b901cbadd
SHA1: 71faf243ffd2d4484551c227db562d04792a7749
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: sample.war

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\webapps\docs\appdev\sample\sample.war
MD5: 570f196c4a1025a717269d16d11d6f37
SHA1: 80f5053b166c69d81697ba21113c673f8372aca0
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • None

apache-tomcat-7.0.0.zip: taglibs-standard-impl-1.2.5.jar

Description:  An implementation of the JSP Standard Tag Library (JSTL).

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\webapps\examples\WEB-INF\lib\taglibs-standard-impl-1.2.5.jar
MD5: 8e5c8db242fbef3db1acfcbb3bc8ec8b
SHA1: 9b9783ccb2a323383e6e20e36d368f8997b71967
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

opensaml-2.6.1.jar

Description:  The OpenSAML-J library provides tools to support developers working with the Security Assertion Markup Language (SAML).

File Path: C:\Users\Dad\.m2\repository\org\opensaml\opensaml\2.6.1\opensaml-2.6.1.jar
MD5: ba52e68b7522c3804fc196f56e31ca64
SHA1: 66992ce167f18e4552b79bc38d412f53ad2d80a1
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

openws-1.5.1.jar

Description:  The OpenWS library provides a growing set of tools to work with web services at a low level. These tools include classes for creating and reading SOAP messages, transport-independent clients for connecting to web services, and various transports for use with those clients.

File Path: C:\Users\Dad\.m2\repository\org\opensaml\openws\1.5.1\openws-1.5.1.jar
MD5: 4a6340e00990a21cc822e9430c70e022
SHA1: 5e9b1075c477871f78983d1c24eb3dacf6b2aa65
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

xmltooling-1.4.1.jar

Description: XMLTooling-J is a low-level library that may be used to construct libraries that allow developers to work with XML in a Java beans manner.

File Path: C:\Users\Dad\.m2\repository\org\opensaml\xmltooling\1.4.1\xmltooling-1.4.1.jar
MD5: 5f29a776cece576a6bf8a2529d3b8419
SHA1: aa39174a71035bdd28b3a3c890cac86b705c4980
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

postgresql-9.4.1212.jre7.jar

Description: Java JDBC 4.1 (JRE 7+) driver for PostgreSQL database

License:

http://www.postgresql.org/about/licence/
File Path: C:\Users\Dad\.m2\repository\org\postgresql\postgresql\9.4.1212.jre7\postgresql-9.4.1212.jre7.jar
MD5: 8681ad73ea0de09c3d8a6dfb0470412f
SHA1: 7101612950488be0ff6882bcc27aa0f0a4c202dd
Referenced In Projects/Scopes:
  • fgsms Database Export Tool:compile
  • fgsms Recryptor:compile
  • fgsms Distribution:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms Service WAR:compile
  • fgsms Sample - Export data from database direct:compile

Identifiers

quartz-1.8.6.jar

File Path: C:\Users\Dad\.m2\repository\org\quartz-scheduler\quartz\1.8.6\quartz-1.8.6.jar
MD5: fff6d47071fce5e1b36cc943aa118b65
SHA1: 552019e55385a5fdbc6b594fabc4c03ea45a99bc
Referenced In Project/Scope: fgsms Service WAR:compile

Identifiers

slf4j-api-1.7.7.jar

Description: The slf4j API

File Path: C:\Users\Dad\.m2\repository\org\slf4j\slf4j-api\1.7.7\slf4j-api-1.7.7.jar
MD5: ca4280bf93d64367723ae5c8d42dd0b9
SHA1: 2b8019b6249bb05d81d3a3094e468753e2b21311
Referenced In Projects/Scopes:

  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Data Access Service:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Agent Core:provided
  • fgsms Service WAR:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Apache CXF Agent:provided
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

slf4j-log4j12-1.7.7.jar

Description: SLF4J LOG4J-12 Binding

File Path: C:\Users\Dad\.m2\repository\org\slf4j\slf4j-log4j12\1.7.7\slf4j-log4j12-1.7.7.jar
MD5: 4d2be9dc9aa3d08dba9daa09ed917526
SHA1: 58f588119ffd1702c77ccab6acb54bfb41bed8bd
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile

Identifiers

spring-aop-3.0.7.RELEASE.jar

File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-aop\3.0.7.RELEASE\spring-aop-3.0.7.RELEASE.jar
MD5: 833e6c239fa50bada08e5cb82582c82b
SHA1: e52176ba360e47d132bbc80dc144a916dd75eee7
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

spring-asm-3.0.7.RELEASE.jar

File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-asm\3.0.7.RELEASE\spring-asm-3.0.7.RELEASE.jar
MD5: 5d479c7bf32d4bb3cb3b81dfdf3080f7
SHA1: cadd0ed7b1aeea0c2858ada0d6397e8423aad6a3
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

spring-beans-3.0.7.RELEASE.jar

File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-beans\3.0.7.RELEASE\spring-beans-3.0.7.RELEASE.jar
MD5: 0b9954842f12133fcff91bd90235182d
SHA1: 5915c3eee8dc193b19b648719d653439c57fc0d8
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

spring-core-3.0.7.RELEASE.jar

File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-core\3.0.7.RELEASE\spring-core-3.0.7.RELEASE.jar
MD5: feeca5dd71af07bda262b0ed14dc1951
SHA1: 2c90825834a037aab6f6a71bbd05d81680832c49
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

CVE-2016-9878  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks.

Vulnerable Software & Versions: (show all)

CVE-2014-3625  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Directory traversal vulnerability in Pivotal Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling.

Vulnerable Software & Versions: (show all)

CVE-2014-3578  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Directory traversal vulnerability in Pivotal Spring Framework 3.x before 3.2.9 and 4.0 before 4.0.5 allows remote attackers to read arbitrary files via a crafted URL.

Vulnerable Software & Versions: (show all)

CVE-2014-1904  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in web/servlet/tags/form/FormTag.java in Spring MVC in Spring Framework 3.0.0 before 3.2.8 and 4.0.0 before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the requested URI in a default action.

Vulnerable Software & Versions: (show all)

CVE-2014-0054  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-352

The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4152, CVE-2013-7315, and CVE-2013-6429.

Vulnerable Software & Versions: (show all)

CVE-2013-7315  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Spring MVC in Spring Framework before 3.2.4 and 4.0.0.M1 through 4.0.0.M2 does not disable external entity resolution for the StAX XMLInputFactory, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML with JAXB, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152. NOTE: this issue was SPLIT from CVE-2013-4152 due to different affected versions.

Vulnerable Software & Versions: (show all)

CVE-2013-6429  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The SourceHttpMessageConverter in Spring MVC in Spring Framework before 3.2.5 and 4.0.0.M1 through 4.0.0.RC1 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152 and CVE-2013-7315.

Vulnerable Software & Versions: (show all)

CVE-2013-4152  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

spring-core-3.2.8.RELEASE.jar

Description: Spring Core

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-core\3.2.8.RELEASE\spring-core-3.2.8.RELEASE.jar
MD5: f127292a67579e3d455a5773ad9af49d
SHA1: 64b9b731decc74403eb85163278659d91c300584
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile

Identifiers

spring-expression-3.0.7.RELEASE.jar

File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-expression\3.0.7.RELEASE\spring-expression-3.0.7.RELEASE.jar
MD5: 7880f6d36ee0352560700517d59e80a1
SHA1: 61999bb2e1e5f7a1c13e91a58761c48dc1d71cf9
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

spring-jms-3.0.7.RELEASE.jar

File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-jms\3.0.7.RELEASE\spring-jms-3.0.7.RELEASE.jar
MD5: bb872e0744176677ae65705317efa46f
SHA1: 1647b17010e96c713f589ec1b0265556443db00e
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

spring-tx-3.0.7.RELEASE.jar

File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-tx\3.0.7.RELEASE\spring-tx-3.0.7.RELEASE.jar
MD5: 9d8af113502df57b03734164654df6a3
SHA1: c340bf8606f6bf235bc1277d25315df1abe51c31
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

js-1.7R2.jar

Description: Rhino is an open-source implementation of JavaScript written entirely in Java. It is typically embedded into Java applications to provide scripting to end users.

License:

Mozilla Public License: http://www.mozilla.org/MPL/MPL-1.1.html
File Path: C:\Users\Dad\.m2\repository\rhino\js\1.7R2\js-1.7R2.jar
MD5: a4166cafe6e5d37c363b6795ee92c92c
SHA1: b95d5212ff4cea92cee1c3c6fa50aa82c9d4905b
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:provided

Identifiers

stax-api-1.0.1.jar

Description: StAX API is the standard java XML processing API defined by JSR-173

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\stax\stax-api\1.0.1\stax-api-1.0.1.jar
MD5: 7d436a53c64490bee564c576babb36b4
SHA1: 49c100caf72d658aca8e58bd74a4ba90fa2b0d70
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms JbossWS Native JAXWS Agent:provided

Identifiers

wstx-asl-3.2.1.jar

File Path: C:\Users\Dad\.m2\repository\woodstox\wstx-asl\3.2.1\wstx-asl-3.2.1.jar
MD5: 94b4be97c785b3f4a6dada4d80a9779a
SHA1: bf92f1c71612d4aed212f9bc39c69716978aef5a
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

policy-1.0.jar

File Path: C:\Users\Dad\.m2\repository\ws-commons\policy\1.0\policy-1.0.jar
MD5: 9a1124152201aa6551f0aa8e302c3847
SHA1: eb4039347c7192511cb256492712d46d784e15c7
Referenced In Project/Scope: fgsms JbossWS Native JAXWS Agent:provided

Identifiers

wsdl4j-1.6.2.jar

Description: Java stub generator for WSDL

License:

CPL: http://www.opensource.org/licenses/cpl1.0.txt
File Path: C:\Users\Dad\.m2\repository\wsdl4j\wsdl4j\1.6.2\wsdl4j-1.6.2.jar
MD5: 2608a8ea3f07b0c08de8a7d3d0d3fc09
SHA1: dec1669fb6801b7328e01ad72fc9e10b69ea06c1
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Apache Axis 1.x Agent:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms JbossWS Native JAXWS Agent:provided
  • fgsms Generic JAXWS Agent:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Servlet Filter Agent:compile
  • fgsms UDDI Discovery:compile
  • fgsms UDDI Publisher:compile

Identifiers

wsdl4j-1.6.3.jar

Description: Java stub generator for WSDL

License:

CPL: http://www.opensource.org/licenses/cpl1.0.txt
File Path: C:\Users\Dad\.m2\repository\wsdl4j\wsdl4j\1.6.3\wsdl4j-1.6.3.jar
MD5: cfc28d89625c5e88589aec7a9aee0208
SHA1: 6d106a6845a3d3477a1560008479312888e94f2f
Referenced In Projects/Scopes:
  • fgsms Agent Core:provided
  • fgsms Apache CXF Agent:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile

Identifiers

serializer-2.7.1.jar

Description:  Serializer to write out XML, HTML etc. as a stream of characters from an input DOM or from input SAX events.

File Path: C:\Users\Dad\.m2\repository\xalan\serializer\2.7.1\serializer-2.7.1.jar
MD5: a6b64dfe58229bdd810263fa0cc54cff
SHA1: 4b4b18df434451249bb65a63f2fb69e215a6a020
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

xalan-2.7.1.jar

Description:  Xalan-Java is an XSLT processor for transforming XML documents into HTML, text, or other XML document types. It implements XSL Transformations (XSLT) Version 1.0 and XML Path Language (XPath) Version 1.0 and can be used from the command line, in an applet or a servlet, or as a module in other program.

File Path: C:\Users\Dad\.m2\repository\xalan\xalan\2.7.1\xalan-2.7.1.jar
MD5: d43aad24f2c143b675292ccfef487f9c
SHA1: 75f1d83ce27bab5f29fff034fc74aa9f7266f22a
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms WS-Notification Broker WAR:compile

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

xercesImpl-2.11.0.jar

Description:  Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program. The Apache Xerces2 parser is the reference implementation of XNI but other parser components, configurations, and parsers can be written using the Xerces Native Interface. For complete design and implementation documents, refer to the XNI Manual. Xerces2 is a fully conforming XML Schema 1.0 processor. A partial experimental implementation of the XML Schema 1.1 Structures and Datatypes Working Drafts (December 2009) and an experimental implementation of the XML Schema Definition Language (XSD): Component Designators (SCD) Candidate Recommendation (January 2010) are provided for evaluation. For more information, refer to the XML Schema page. Xerces2 also provides a complete implementation of the Document Object Model Level 3 Core and Load/Save W3C Recommendations and provides a complete implementation of the XML Inclusions (XInclude) W3C Recommendation. It also provides support for OASIS XML Catalogs v1.1. Xerces2 is able to parse documents written according to the XML 1.1 Recommendation, except that it does not yet provide an option to enable normalization checking as described in section 2.13 of this specification. It also handles namespaces according to the XML Namespaces 1.1 Recommendation, and will correctly serialize XML 1.1 documents if the DOM level 3 load/save APIs are in use.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\xerces\xercesImpl\2.11.0\xercesImpl-2.11.0.jar
MD5: 43584adc1f895628055bad0aa98a1007
SHA1: 9bb329db1cfc4e22462c9d6b43a8432f5850e92c
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms Service WAR:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms User Interface (Bootstrap):provided
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile

Identifiers

xml-apis-1.4.01.jar

Description: xml-commons provides an Apache-hosted set of DOM, SAX, and JAXP interfaces for use in other xml-based projects. Our hope is that we can standardize on both a common version and packaging scheme for these critical XML standards interfaces to make the lives of both our developers and users easier. The External Components portion of xml-commons contains interfaces that are defined by external standards organizations. For DOM, that's the W3C; for SAX it's David Megginson and sax.sourceforge.net; for JAXP it's Sun.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
The SAX License: http://www.saxproject.org/copying.html
The W3C License: http://www.w3.org/TR/2004/REC-DOM-Level-3-Core-20040407/java-binding.zip
File Path: C:\Users\Dad\.m2\repository\xml-apis\xml-apis\1.4.01\xml-apis-1.4.01.jar
MD5: 7eaad6fea5925cca6c36ee8b3e02ac9d
SHA1: 3789d9fada2d3d458c4ba2de349d48780f381ee3
Referenced In Projects/Scopes:
  • fgsms Distribution:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Apache CXF Agent OSGI:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile
  • fgsms UI Common:compile

Identifiers

xml-resolver-1.2.jar

Description: xml-commons provides an Apache-hosted set of DOM, SAX, and JAXP interfaces for use in other xml-based projects. Our hope is that we can standardize on both a common version and packaging scheme for these critical XML standards interfaces to make the lives of both our developers and users easier.

File Path: C:\Users\Dad\.m2\repository\xml-resolver\xml-resolver\1.2\xml-resolver-1.2.jar
MD5: 706c533146c1f4ee46b66659ea14583a
SHA1: 3d0f97750b3a03e0971831566067754ba4bfd68c
Referenced In Projects/Scopes:

  • fgsms Agent Core:provided
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Common:provided
  • fgsms WS-Notification Broker WAR:compile
  • fgsms Apache CXF Agent:provided

Identifiers

jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.istack/istack-commons-runtime/pom.xml

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.2.6\jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.istack/istack-commons-runtime/pom.xml
MD5: 11bb96afb693ddcd702cfc74ce2ff69c
SHA1: 35f36b3c480e9b407bc6d828adfc7c8b1d7d6688

Identifiers

  • maven: com.sun.istack:istack-commons-runtime:2.13   Confidence:HIGH

jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.codemodel/codemodel/pom.xml

Description: The core functionality of the CodeModel java source code generation library

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-xjc\2.2.4\jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.codemodel/codemodel/pom.xml
MD5: 9495ef15cdb0deab7667dff4ce0f20ea
SHA1: ae6a933c80cda1d24c71b8d6e9ad592bace3f49c

Identifiers

  • maven: com.sun.codemodel:codemodel:2.5-SNAPSHOT   Confidence:HIGH

jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.istack/istack-commons-tools/pom.xml

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-xjc\2.2.4\jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.istack/istack-commons-tools/pom.xml
MD5: 0c26e1b7c5bbd02ec2af9851929d9c10
SHA1: 1ca6d67fb4f671058fe823f358fe8d91ee78e533

Identifiers

  • maven: com.sun.istack:istack-commons-tools:2.4-SNAPSHOT   Confidence:HIGH

jaxb-impl-2.2.4.jar\META-INF/maven/com.sun.istack/istack-commons-runtime/pom.xml

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.2.4\jaxb-impl-2.2.4.jar\META-INF/maven/com.sun.istack/istack-commons-runtime/pom.xml
MD5: 0513db028888d063debffae15fa93bef
SHA1: ada4f12799e180fadbe5a5695a7f048904c70877

Identifiers

  • maven: com.sun.istack:istack-commons-runtime:2.4-SNAPSHOT   Confidence:HIGH

jaxb-impl-2.2.4.jar\META-INF/maven/com.sun.xml.txw2/txw2/pom.xml

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.2.4\jaxb-impl-2.2.4.jar\META-INF/maven/com.sun.xml.txw2/txw2/pom.xml
MD5: 6c05cadb7bf3dd648207868976943312
SHA1: 794bf6ca832e21187b15e8737ec1e6a3e3dc758a

Identifiers

  • maven: com.sun.xml.txw2:txw2:201103-SNAPSHOT   Confidence:HIGH

jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.xml.dtd-parser/dtd-parser/pom.xml

Description: SAX-like API for parsing XML DTDs.

License:

CDDL v1.1 / GPL v2 dual license: http://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-xjc\2.2.4\jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.xml.dtd-parser/dtd-parser/pom.xml
MD5: 9f9d4028fcdf2317f36754dc5f07d266
SHA1: 9fbfbbb92d69781183abb5f59ba68193619917d3

Identifiers

  • maven: com.sun.xml.dtd-parser:dtd-parser:1.2-SNAPSHOT   Confidence:HIGH

jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.xml.txw2/txw2/pom.xml

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.2.6\jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.xml.txw2/txw2/pom.xml
MD5: cf4b1041a961856b9c0a5c3846c602fe
SHA1: 145b0c8dc9d0205ea46c44a3be6c1911d4e30e81

Identifiers

  • maven: com.sun.xml.txw2:txw2:20110809   Confidence:HIGH

jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.xsom/xsom/pom.xml

Description: XML Schema Object Model (XSOM) is a Java library that allows applications to easily parse XML Schema documents and inspect information in them. It is expected to be useful for applications that need to take XML Schema as an input.

License:

CDDL v1.1 / GPL v2 dual license: http://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-xjc\2.2.4\jaxb-xjc-2.2.4.jar\META-INF/maven/com.sun.xsom/xsom/pom.xml
MD5: 005644c5218bcaa801dddcbca695bce4
SHA1: 8ac483d3c7211ad2d32caac3e6957c3776e04d4c

Identifiers

  • maven: com.sun.xsom:xsom:20110101-SNAPSHOT   Confidence:HIGH

jaxb-xjc-2.2.4.jar\META-INF/maven/org.kohsuke.rngom/rngom/pom.xml

Description: RNGOM is an open-source Java library for parsing RELAX NG grammars.

License:

The MIT License: http://www.opensource.org/licenses/mit-license.php
File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-xjc\2.2.4\jaxb-xjc-2.2.4.jar\META-INF/maven/org.kohsuke.rngom/rngom/pom.xml
MD5: a384e4166825dc6aea901acc5be90a4c
SHA1: 5cf801bf40bfdd2925eaf6e40e6b167fd2967eb7

Identifiers

  • maven: org.kohsuke.rngom:rngom:201103-SNAPSHOT   Confidence:HIGH


This report contains data retrieved from the National Vulnerability Database.