Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: google group | github issues

Project: fgsms Server

Scan Information (show all):

Display: Showing Vulnerable Dependencies (click to show all)

Dependency CPE GAV Highest Severity CVE Count CPE Confidence Evidence Count
aopalliance-1.0.jar aopalliance:aopalliance:1.0   0 13
asm-3.3.1.jar asm:asm:3.3.1   0 13
avalon-framework-4.1.3.jar avalon-framework:avalon-framework:4.1.3   0 12
batik-awt-util-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-awt-util:1.6 Medium 1 LOW 16
batik-dom-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-dom:1.6 Medium 1 LOW 15
batik-svggen-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-svggen:1.6 Medium 1 LOW 15
batik-util-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-util:1.6 Medium 1 LOW 15
batik-xml-1.6.jar cpe:/a:apache:batik:1.6 batik:batik-xml:1.6 Medium 1 LOW 15
cewolf-1.2.4-java7.jar cewolf:cewolf:1.2.4-java7   0 14
gson-2.2.4.jar com.google.code.gson:gson:2.2.4   0 18
jaxb-impl-2.2.6.jar com.sun.xml.bind:jaxb-impl:2.2.6   0 20
commons-cli-1.3.1.jar commons-cli:commons-cli:1.3.1   0 25
commons-codec-1.10.jar commons-codec:commons-codec:1.10   0 25
commons-collections-3.2.jar cpe:/a:apache:commons_collections:3.2.1 commons-collections:commons-collections:3.2 High 1 LOW 19
commons-configuration-1.9.jar commons-configuration:commons-configuration:1.9   0 24
commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe   0 1
commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe   0 1
commons-daemon-1.0.15-bin-windows.zip: prunmgr.exe   0 1
commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe   0 1
commons-dbcp-1.2.2.jar commons-dbcp:commons-dbcp:1.2.2   0 19
commons-discovery-0.2.jar commons-discovery:commons-discovery:0.2   0 14
commons-lang-2.6.jar commons-lang:commons-lang:2.6   0 23
commons-logging-api-1.1.jar commons-logging:commons-logging-api:1.1   0 19
commons-logging-1.1.jar commons-logging:commons-logging:1.1   0 19
commons-pool-1.3.jar commons-pool:commons-pool:1.3   0 19
VectorGraphics2D-0.9.3.jar de.erichseifert.vectorgraphics2d:VectorGraphics2D:0.9.3   0 14
dnsjava-2.0.6.jar dnsjava:dnsjava:2.0.6   0 15
dom4j-1.6.1.jar dom4j:dom4j:1.6.1   0 18
geronimo-spec-j2ee-connector-1.5-rc4.jar cpe:/a:apache:geronimo:1.5.rc4 geronimo-spec:geronimo-spec-j2ee-connector:1.5-rc4 High 2 LOW 14
activation-1.1.jar javax.activation:activation:1.1   0 17
ejb-api-3.0.jar javax.ejb:ejb-api:3.0   0 15
mail-1.4.7.jar cpe:/a:sun:javamail:1.4.7 javax.mail:mail:1.4.7   0 LOW 26
javax.servlet-api-3.1.0.jar javax.servlet:javax.servlet-api:3.1.0   0 22
servlet-api-2.5.jar javax.servlet:servlet-api:2.5   0 11
javax.ws.rs-api-2.0-m10.jar javax.ws.rs:javax.ws.rs-api:2.0-m10   0 20
junit-4.12.jar junit:junit:4.12   0 16
log4j-1.2.17.jar log4j:log4j:1.2.17   0 18
logkit-1.0.1.jar logkit:logkit:1.0.1   0 11
commons-lang3-3.5.jar org.apache.commons:commons-lang3:3.5   0 27
cxf-rt-core-2.7.11.jar cpe:/a:apache:cxf:2.7.11 org.apache.cxf:cxf-rt-core:2.7.11 Medium 3 HIGHEST 26
geronimo-javamail_1.4_mail-1.8.3.jar cpe:/a:apache:geronimo:1.8.3 org.apache.geronimo.javamail:geronimo-javamail_1.4_mail:1.8.3 High 2 LOW 18
geronimo-j2ee_1.4_spec-1.1.jar org.apache.geronimo.specs:geronimo-j2ee_1.4_spec:1.1   0 8
geronimo-javamail_1.4_spec-1.7.1.jar org.apache.geronimo.specs:geronimo-javamail_1.4_spec:1.7.1   0 21
geronimo-jaxws_2.2_spec-1.0.jar org.apache.geronimo.specs:geronimo-jaxws_2.2_spec:1.0   0 21
httpclient-4.3.3.jar cpe:/a:apache:httpclient:4.3.3 org.apache.httpcomponents:httpclient:4.3.3 Medium 2 HIGHEST 22
httpcore-4.3.2.jar org.apache.httpcomponents:httpcore:4.3.2   0 22
juddi-client-3.3.3.jar org.apache.juddi:juddi-client:3.3.3   0 16
uddi-ws-3.3.3.jar org.apache.juddi:uddi-ws:3.3.3   0 16
neethi-3.0.3.jar cpe:/a:apache:apache_test:3.0.3 org.apache.neethi:neethi:3.0.3   0 LOW 25
qpid-client-6.0.0.jar cpe:/a:apache:qpid:6.0.0 org.apache.qpid:qpid-client:6.0.0   0 LOW 19
tomcat-dbcp-7.0.73.jar cpe:/a:apache:tomcat:7.0.73 org.apache.tomcat:tomcat-dbcp:7.0.73 High 3 LOW 16
xmlschema-core-2.1.0.jar org.apache.ws.xmlschema:xmlschema-core:2.1.0   0 17
jettison-1.3.4.jar org.codehaus.jettison:jettison:1.3.4   0 18
stax2-api-3.1.4.jar org.codehaus.woodstox:stax2-api:3.1.4   0 17
woodstox-core-asl-4.2.1.jar org.codehaus.woodstox:woodstox-core-asl:4.2.1   0 21
hamcrest-core-1.3.jar org.hamcrest:hamcrest-core:1.3   0 17
jcommon-1.0.23.jar org.jfree:jcommon:1.0.23   0 15
jfreechart-1.0.19.jar org.jfree:jfreechart:1.0.19   0 15
xchart-3.0.0.jar org.knowm.xchart:xchart:3.0.0   0 16
apache-tomcat-7.0.0.zip: bootstrap.jar cpe:/a:apache:tomcat:7.0.75
cpe:/a:apache_software_foundation:tomcat:7.0.75
High 3 LOW 9
apache-tomcat-7.0.0.zip: commons-daemon.jar cpe:/a:apache:apache_commons_daemon:1.0.15 commons-daemon:commons-daemon:1.0.15   0 LOW 23
apache-tomcat-7.0.0.zip: tcnative-1.dll   0 2
apache-tomcat-7.0.0.zip: tomcat-juli.jar org.apache.tomcat:tomcat-juli:7.0.75   0 16
apache-tomcat-7.0.0.zip: tomcat7.exe   0 2
apache-tomcat-7.0.0.zip: tomcat7w.exe   0 2
apache-tomcat-7.0.0.zip: annotations-api.jar cpe:/a:apache:tomcat:3.0 org.apache.tomcat:tomcat-annotations-api:7.0.75 High 34 MEDIUM 15
apache-tomcat-7.0.0.zip: catalina.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-catalina:7.0.75 High 3 LOW 16
apache-tomcat-7.0.0.zip: ecj-4.4.2.jar org.eclipse.jdt.core.compiler:ecj:4.4.2   0 17
apache-tomcat-7.0.0.zip: el-api.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-el-api:7.0.75 High 3 LOW 15
apache-tomcat-7.0.0.zip: jasper.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-jasper:7.0.75 High 3 LOW 17
apache-tomcat-7.0.0.zip: jsp-api.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-jsp-api:7.0.75 High 3 LOW 16
apache-tomcat-7.0.0.zip: servlet-api.jar cpe:/a:apache:tomcat:3.0 org.apache.tomcat:tomcat-servlet-api:7.0.75 High 34 MEDIUM 15
apache-tomcat-7.0.0.zip: tomcat-api.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-api:7.0.75 High 3 LOW 16
apache-tomcat-7.0.0.zip: tomcat-jdbc.jar org.apache.tomcat:tomcat-jdbc:7.0.75   0 16
apache-tomcat-7.0.0.zip: tomcat7-websocket.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat7-websocket:7.0.75 High 3 LOW 17
apache-tomcat-7.0.0.zip: websocket-api.jar cpe:/a:apache:tomcat:7.0.75 org.apache.tomcat:tomcat-websocket-api:7.0.75 High 3 LOW 15
apache-tomcat-7.0.0.zip: sample.war   0 5
apache-tomcat-7.0.0.zip: taglibs-standard-impl-1.2.5.jar cpe:/a:apache:standard_taglibs:1.2.5 org.apache.taglibs:taglibs-standard-impl:1.2.5   0 LOW 18
postgresql-9.4.1212.jre7.jar cpe:/a:postgresql:postgresql:9.4.1212.jre7 org.postgresql:postgresql:9.4.1212.jre7   0 LOW 25
quartz-1.8.6.jar org.quartz-scheduler:quartz:1.8.6   0 13
slf4j-api-1.7.7.jar org.slf4j:slf4j-api:1.7.7   0 20
slf4j-log4j12-1.7.7.jar org.slf4j:slf4j-log4j12:1.7.7   0 20
spring-aop-3.2.8.RELEASE.jar cpe:/a:springsource:spring_framework:3.2.8 org.springframework:spring-aop:3.2.8.RELEASE   0 LOW 14
spring-core-3.2.8.RELEASE.jar cpe:/a:pivotal:spring_framework:3.2.8
cpe:/a:pivotal_software:spring_framework:3.2.8
cpe:/a:springsource:spring_framework:3.2.8
cpe:/a:vmware:springsource_spring_framework:3.2.8
org.springframework:spring-core:3.2.8.RELEASE Medium 4 HIGHEST 18
stax-api-1.0.1.jar stax:stax-api:1.0.1   0 16
wsdl4j-1.6.2.jar wsdl4j:wsdl4j:1.6.2   0 15
serializer-2.7.1.jar cpe:/a:apache:xalan-java:2.7.1 xalan:serializer:2.7.1 High 1 HIGHEST 18
xalan-2.7.1.jar cpe:/a:apache:xalan-java:2.7.1 xalan:xalan:2.7.1 High 1 HIGHEST 32
xercesImpl-2.11.0.jar xerces:xercesImpl:2.11.0   0 46
xml-apis-1.4.01.jar xml-apis:xml-apis:1.4.01   0 43
xml-resolver-1.2.jar xml-resolver:xml-resolver:1.2   0 15
jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.istack/istack-commons-runtime/pom.xml com.sun.istack:istack-commons-runtime:2.13   0 6
jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.xml.txw2/txw2/pom.xml com.sun.xml.txw2:txw2:20110809   0 6

Dependencies

aopalliance-1.0.jar

Description: AOP Alliance

License:

Public Domain
File Path: C:\Users\Dad\.m2\repository\aopalliance\aopalliance\1.0\aopalliance-1.0.jar
MD5: 04177054e180d09e3998808efa0401c7
SHA1: 0235ba8b489512805ac13a8f9ea77a1ca5ebe3e8
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

asm-3.3.1.jar

File Path: C:\Users\Dad\.m2\repository\asm\asm\3.3.1\asm-3.3.1.jar
MD5: 1ad1e8959324b0f680b8e62406955642
SHA1: 1d5f20b4ea675e6fab6ab79f1cd60ec268ddc015
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

avalon-framework-4.1.3.jar

File Path: C:\Users\Dad\.m2\repository\avalon-framework\avalon-framework\4.1.3\avalon-framework-4.1.3.jar
MD5: bef9f9be8ba066273fdef72b3503a307
SHA1: 92315ee1c4a4c90bee05055713811f28f8509075
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

batik-awt-util-1.6.jar

Description: Batik AWT Utilities

File Path: C:\Users\Dad\.m2\repository\batik\batik-awt-util\1.6\batik-awt-util-1.6.jar
MD5: 04013947d519c13fd4d82355cb496552
SHA1: 590750cc8d6a1ba0189b437172b6444578d79c99
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

batik-dom-1.6.jar

Description: Batik DOM

File Path: C:\Users\Dad\.m2\repository\batik\batik-dom\1.6\batik-dom-1.6.jar
MD5: ce481d746c345a3d3046dab157c8468f
SHA1: 27983405f0871f28d3b9ab35b44e62610a60564a
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

batik-svggen-1.6.jar

Description: Batik SVG Generator

File Path: C:\Users\Dad\.m2\repository\batik\batik-svggen\1.6\batik-svggen-1.6.jar
MD5: 918e775580eb37b9d57ea37c79fc8610
SHA1: 983914d5e27957145e34b55ad7f48df96eb6d280
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

batik-util-1.6.jar

Description: Batik Utilities

File Path: C:\Users\Dad\.m2\repository\batik\batik-util\1.6\batik-util-1.6.jar
MD5: 4a137ce0ce2f8eb24823b55ebb26cb24
SHA1: 7bea0185bb630bca235ffa904b1a03e8a4786a45
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

batik-xml-1.6.jar

Description: Batik XML

File Path: C:\Users\Dad\.m2\repository\batik\batik-xml\1.6\batik-xml-1.6.jar
MD5: d4d0b431411f67662618f9b87dbcddab
SHA1: 4f2c18a0d41b8804e6fd24f183a567b41c928ed0
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

cewolf-1.2.4-java7.jar

Description:  Cewolf is a tag library for JfreeChart. JFreeChart is a class library, written in Java, for generating charts. Utilising the Java2D APIs, it currently supports bar charts, pie charts, line charts, XY-plots and time series plots.

License:

GNU Lesser General Public License version 2.1 (LGPLv2.1): http://www.gnu.org/licenses/lgpl-2.1.txt
File Path: C:\Users\Dad\.m2\repository\cewolf\cewolf\1.2.4-java7\cewolf-1.2.4-java7.jar
MD5: 52336ab381cc46d082b893873707e011
SHA1: ceec652622da825768aa19f960021548fa6d0768
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

gson-2.2.4.jar

Description: Google Gson library

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\com\google\code\gson\gson\2.2.4\gson-2.2.4.jar
MD5: 2f54fc24807a4cad7297012dd8cebf3d
SHA1: a60a5e993c98c864010053cb901b7eab25306568
Referenced In Project/Scope: fgsms User Interface (Bootstrap):compile

Identifiers

jaxb-impl-2.2.6.jar

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.2.6\jaxb-impl-2.2.6.jar
MD5: 236690559e7423d6e378ab737f6a7670
SHA1: 62bed5d6f40049a00c48a402c3511f02eedd1c11
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

commons-cli-1.3.1.jar

Description:  Apache Commons CLI provides a simple API for presenting, processing and validating a command line interface.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\commons-cli\commons-cli\1.3.1\commons-cli-1.3.1.jar
MD5: 8d5fa2a42fef17d9034b35a9ac9cc750
SHA1: 1303efbc4b181e5a58bf2e967dc156a3132b97c0
Referenced In Project/Scope: fgsms Database Export Tool:compile

Identifiers

commons-codec-1.10.jar

Description:  The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\commons-codec\commons-codec\1.10\commons-codec-1.10.jar
MD5: 353cf6a2bdba09595ccfa073b78c7fcb
SHA1: 4b95f4897fa13f2cd904aee711aeafc0c5295cd8
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

commons-collections-3.2.jar

Description: Types that extend and augment the Java Collections Framework.

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-collections\commons-collections\3.2\commons-collections-3.2.jar
MD5: 7b9216b608d550787bdf43a63d88bf3b
SHA1: f951934aa5ae5a88d7e6dfaa6d32307d834a88be
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile

Identifiers

CVE-2015-6420  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Vulnerable Software & Versions: (show all)

commons-configuration-1.9.jar

Description:  Tools to assist in the reading of configuration/preferences files in various formats

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\commons-configuration\commons-configuration\1.9\commons-configuration-1.9.jar
MD5: a433303bae1cd9ec6313fe7bbac8fbe9
SHA1: 5e8a4890284cf7eaa9241ace2cc07518d9519d22
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile

Identifiers

commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe

File Path: C:\Users\Dad\.m2\repository\commons-daemon\commons-daemon\1.0.15\commons-daemon-1.0.15-bin-windows.zip\amd64\prunsrv.exe
MD5: c8a57f4ca413effd5897d8a20e05fc80
SHA1: aac510a623eeb46aad1af2a91930535e4fe28f91
Referenced In Project/Scope: fgsms Server Crash Alerter:provided

Identifiers

  • None

commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe

File Path: C:\Users\Dad\.m2\repository\commons-daemon\commons-daemon\1.0.15\commons-daemon-1.0.15-bin-windows.zip\ia64\prunsrv.exe
MD5: 3b06d0e5454e6812bba21b39ecfc83ba
SHA1: 0715fee00e5fcc4ce1c2b3dabbbddc4f3fa13e7e
Referenced In Project/Scope: fgsms Server Crash Alerter:provided

Identifiers

  • None

commons-daemon-1.0.15-bin-windows.zip: prunmgr.exe

File Path: C:\Users\Dad\.m2\repository\commons-daemon\commons-daemon\1.0.15\commons-daemon-1.0.15-bin-windows.zip\prunmgr.exe
MD5: dcf47773e046ee212d937d5cabea5f4c
SHA1: 57483ea86f52ee8e529a9a53e2e18d7ddcd47e51
Referenced In Project/Scope: fgsms Server Crash Alerter:provided

Identifiers

  • None

commons-daemon-1.0.15-bin-windows.zip: prunsrv.exe

File Path: C:\Users\Dad\.m2\repository\commons-daemon\commons-daemon\1.0.15\commons-daemon-1.0.15-bin-windows.zip\prunsrv.exe
MD5: 0be207e358e5c198e7cb005c08e96e89
SHA1: 8c31d27449cee7bf326485987dc3145f17ffaa66
Referenced In Project/Scope: fgsms Server Crash Alerter:provided

Identifiers

  • None

commons-dbcp-1.2.2.jar

Description: Commons Database Connection Pooling

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-dbcp\commons-dbcp\1.2.2\commons-dbcp-1.2.2.jar
MD5: 590f45b612433a50665bc4f369fc77d0
SHA1: 4fd4c6110e9bca3a655b717eb2e5920febb8403d
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

commons-discovery-0.2.jar

Description: Commons Discovery

File Path: C:\Users\Dad\.m2\repository\commons-discovery\commons-discovery\0.2\commons-discovery-0.2.jar
MD5: 9a2fb56e6a79169b2fb6c8a0dc79abb0
SHA1: 7773ac7a7248f08ed2b8d297c6e2ef28260640ea
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

commons-lang-2.6.jar

Description:  Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\commons-lang\commons-lang\2.6\commons-lang-2.6.jar
MD5: 4d5c1693079575b362edf41500630bbd
SHA1: 0ce1edb914c94ebc388f086c6827e8bdeec71ac2
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile

Identifiers

commons-logging-api-1.1.jar

Description: Commons Logging is a thin adapter allowing configurable bridging to other, well known logging systems.

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-logging\commons-logging-api\1.1\commons-logging-api-1.1.jar
MD5: 4374238076ab08e60e0d296234480837
SHA1: 7d4cf5231d46c8524f9b9ed75bb2d1c69ab93322
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile

Identifiers

commons-logging-1.1.jar

Description: Commons Logging is a thin adapter allowing configurable bridging to other, well known logging systems.

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-logging\commons-logging\1.1\commons-logging-1.1.jar
MD5: 6b62417e77b000a87de66ee3935edbf5
SHA1: ba24d5de831911b684c92cd289ed5ff826271824
Referenced In Projects/Scopes:
  • fgsms Reporting Service:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

commons-pool-1.3.jar

Description: Commons Object Pooling Library

License:

The Apache Software License, Version 2.0: /LICENSE.txt
File Path: C:\Users\Dad\.m2\repository\commons-pool\commons-pool\1.3\commons-pool-1.3.jar
MD5: 01f9bed60e2f88372132d34040ee81bb
SHA1: 03231230c1d7631b66a74d1c4653cfd65a6f9ea0
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

VectorGraphics2D-0.9.3.jar

Description: A library for adding vector export to Java(R) Graphics2D.

License:

GNU Library or Lesser General Public License (LGPL): http://www.gnu.org/licenses/lgpl.txt
File Path: C:\Users\Dad\.m2\repository\de\erichseifert\vectorgraphics2d\VectorGraphics2D\0.9.3\VectorGraphics2D-0.9.3.jar
MD5: 71a405d7f54cc94df0711d516abeca52
SHA1: 221c9d68940b9ff48cd88cdc0c4943d3710d8af1
Referenced In Projects/Scopes:
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Service WAR:compile
  • fgsms Automated Reporting Service:compile

Identifiers

dnsjava-2.0.6.jar

Description: dnsjava is an implementation of DNS in Java

License:

BSD license: http://www.dnsjava.org/README
File Path: C:\Users\Dad\.m2\repository\dnsjava\dnsjava\2.0.6\dnsjava-2.0.6.jar
MD5: 3a783229899ea708d3a7c73624d305c4
SHA1: e367971f81d95e653552b5c8f3065d0fad724369
Referenced In Projects/Scopes:
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UDDI Publisher:compile

Identifiers

dom4j-1.6.1.jar

Description: dom4j: the flexible XML framework for Java

License:

dom4j: http://repository.jboss.org/licenses/dom4j.txt
File Path: C:\Users\Dad\.m2\repository\dom4j\dom4j\1.6.1\dom4j-1.6.1.jar
MD5: 4d8f51d3fe3900efc6e395be48030d6d
SHA1: 5d3ccc056b6f056dbf0dddfdf43894b9065a8f94
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms UI Common:compile

Identifiers

geronimo-spec-j2ee-connector-1.5-rc4.jar

File Path: C:\Users\Dad\.m2\repository\geronimo-spec\geronimo-spec-j2ee-connector\1.5-rc4\geronimo-spec-j2ee-connector-1.5-rc4.jar
MD5: 6a2ccbc1d0af6329c00b2089ae1a31d7
SHA1: 2f5310631817f11c5b170d3a0084a58766d49269
Referenced In Projects/Scopes:

  • fgsms Statistics Aggregator:compile
  • fgsms Status Service:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

CVE-2011-5034  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.

Vulnerable Software & Versions: (show all)

CVE-2008-0732  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-59 Improper Link Resolution Before File Access ('Link Following')

The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.

Vulnerable Software & Versions:

activation-1.1.jar

Description:  JavaBeans Activation Framework (JAF) is a standard extension to the Java platform that lets you take advantage of standard services to: determine the type of an arbitrary piece of data; encapsulate access to it; discover the operations available on it; and instantiate the appropriate bean to perform the operation(s).

License:

Common Development and Distribution License (CDDL) v1.0: https://glassfish.dev.java.net/public/CDDLv1.0.html
File Path: C:\Users\Dad\.m2\repository\javax\activation\activation\1.1\activation-1.1.jar
MD5: 8ae38e87cd4f86059c0294a8fe3e0b18
SHA1: e6cb541461c2834bdea3eb920f1884d1eb508b50
Referenced In Projects/Scopes:
  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

ejb-api-3.0.jar

File Path: C:\Users\Dad\.m2\repository\javax\ejb\ejb-api\3.0\ejb-api-3.0.jar
MD5: bf9716b5dd34838c272aa44dfbab5fbc
SHA1: d4855ba9a1ecd993b751880567ec06ffcbd6fe06
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Status Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Automated Reporting Service:compile

Identifiers

mail-1.4.7.jar

Description: JavaMail API (compat)

License:

http://www.sun.com/cddl, https://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: C:\Users\Dad\.m2\repository\javax\mail\mail\1.4.7\mail-1.4.7.jar
MD5: 77f53ff0c78ba43c4812ecc9f53e20f8
SHA1: 9add058589d5d85adeb625859bf2c5eeaaedf12d
Referenced In Projects/Scopes:
  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

javax.servlet-api-3.1.0.jar

Description: Java(TM) Servlet 3.1 API Design Specification

License:

CDDL + GPLv2 with classpath exception: https://glassfish.dev.java.net/nonav/public/CDDL+GPL.html
File Path: C:\Users\Dad\.m2\repository\javax\servlet\javax.servlet-api\3.1.0\javax.servlet-api-3.1.0.jar
MD5: 79de69e9f5ed8c7fcb8342585732bbf7
SHA1: 3cd63d075497751784b2fa84be59432f4905bf7c
Referenced In Project/Scope: fgsms Common WS Test Utilities:compile

Identifiers

servlet-api-2.5.jar

File Path: C:\Users\Dad\.m2\repository\javax\servlet\servlet-api\2.5\servlet-api-2.5.jar
MD5: 116fc16f3f700d756a57a2b8ea7c1044
SHA1: e69999122202bb1c275a80ad3281c4f69f2ea0b2
Referenced In Projects/Scopes:

  • fgsms Reporting Service:provided
  • fgsms User Interface (Bootstrap):provided
  • fgsms Server Crash Alerter:compile
  • fgsms Automated Reporting Service:compile
  • fgsms UI Common:provided
  • fgsms Tomcat Packaging:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Data Access Service:provided
  • fgsms Status Service:provided
  • fgsms Service WAR:provided
  • fgsms UDDI Publisher:compile
  • fgsms Data Collector Service:provided
  • fgsms Policy Configuration Service:provided
  • fgsms Status (Bueller) Agent:compile

Identifiers

  • maven: javax.servlet:servlet-api:2.5   Confidence:HIGH

javax.ws.rs-api-2.0-m10.jar

Description: Java.net - The Source for Java Technology Collaboration

License:

CDDL 1.1: http://glassfish.java.net/public/CDDL+GPL_1_1.html
GPL2 w/ CPE: http://glassfish.java.net/public/CDDL+GPL_1_1.html
File Path: C:\Users\Dad\.m2\repository\javax\ws\rs\javax.ws.rs-api\2.0-m10\javax.ws.rs-api-2.0-m10.jar
MD5: 86cdb9036c14a84efa2711e2791e9210
SHA1: 74705b1b0c448f88cff1a46f431b70b23588e8f4
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

junit-4.12.jar

Description: JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck.

License:

Eclipse Public License 1.0: http://www.eclipse.org/legal/epl-v10.html
File Path: C:\Users\Dad\.m2\repository\junit\junit\4.12\junit-4.12.jar
MD5: 5b38c40c97fbd0adee29f91e60405584
SHA1: 2973d150c0dc1fefe998f834810d68f278ea58ec
Referenced In Project/Scope: fgsms Common WS Test Utilities:compile

Identifiers

log4j-1.2.17.jar

Description: Apache Log4j 1.2

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\log4j\log4j\1.2.17\log4j-1.2.17.jar
MD5: 04a41f0a068986f0f73485cf507c0f40
SHA1: 5af35056b4d257e4b64b9e8069c0746e8b08629f
Referenced In Projects/Scopes:
  • fgsms Data Access Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Database Export Tool:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms UDDI Publisher:compile
  • fgsms Recryptor:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Status Service:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Dependency Scanner:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile
  • fgsms Tomcat JDCP Encryption Connection:provided

Identifiers

logkit-1.0.1.jar

File Path: C:\Users\Dad\.m2\repository\logkit\logkit\1.0.1\logkit-1.0.1.jar
MD5: 32240100a5c15d53f00392fae4b0aab7
SHA1: aaf5649b523c5ffc925e746074979150bb74bfdc
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

commons-lang3-3.5.jar

Description:  Apache Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\commons\commons-lang3\3.5\commons-lang3-3.5.jar
MD5: 780b5a8b72eebe6d0dbff1c11b5658fa
SHA1: 6c6c702c89bfff3cd9e80b04d668c5e190d588c6
Referenced In Projects/Scopes:
  • fgsms Recryptor:compile
  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Data Access Service:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Server Crash Alerter:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Database Export Tool:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile
  • fgsms Service Level Agreement Processor:compile

Identifiers

cxf-rt-core-2.7.11.jar

Description: Apache CXF Runtime Core

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\cxf\cxf-rt-core\2.7.11\cxf-rt-core-2.7.11.jar
MD5: 6e9ff60dd475ba1c91d8c358e70b540f
SHA1: 928f3aaeea343f2b370527f21d9e8379e7d0d6b7
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

CVE-2015-5253  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The SAML Web SSO module in Apache CXF before 2.7.18, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote authenticated users to bypass authentication via a crafted SAML response with a valid signed assertion, related to a "wrapping attack."

Vulnerable Software & Versions: (show all)

CVE-2014-3623  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-287 Improper Authentication

Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.

Vulnerable Software & Versions: (show all)

CVE-2012-5786  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

The wsdl_first_https sample code in distribution/src/main/release/samples/wsdl_first_https/src/main/ in Apache CXF, possibly 2.6.0, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Vulnerable Software & Versions: (show all)

geronimo-javamail_1.4_mail-1.8.3.jar

Description: Geronimmo JavaMail Bundle.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\javamail\geronimo-javamail_1.4_mail\1.8.3\geronimo-javamail_1.4_mail-1.8.3.jar
MD5: eea5be6c1c77dfa6193a77d5164e4706
SHA1: c43b8c1e0fc4fb83300d2b0c20ea5043b5d17268
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

CVE-2011-5034  

Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation

Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.

Vulnerable Software & Versions: (show all)

CVE-2008-0732  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-59 Improper Link Resolution Before File Access ('Link Following')

The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.

Vulnerable Software & Versions:

geronimo-j2ee_1.4_spec-1.1.jar

File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\specs\geronimo-j2ee_1.4_spec\1.1\geronimo-j2ee_1.4_spec-1.1.jar
MD5: e543bc5784a12d37bdac8eafa49164d6
SHA1: eca7ea0d0683f270bc7e67bb4d7714835962f16c
Referenced In Projects/Scopes:

  • fgsms Service WAR:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

geronimo-javamail_1.4_spec-1.7.1.jar

Description: Javamail 1.4 Specification

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\specs\geronimo-javamail_1.4_spec\1.7.1\geronimo-javamail_1.4_spec-1.7.1.jar
MD5: f3b9d8c9a79eefdc0ebe07c34612646d
SHA1: 43ad4090b1a07a11c82ac40c01fc4e2fbad20013
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

geronimo-jaxws_2.2_spec-1.0.jar

Description: Java API for XML Web Services 2.2

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\geronimo\specs\geronimo-jaxws_2.2_spec\1.0\geronimo-jaxws_2.2_spec-1.0.jar
MD5: 9aebd4fe231f977a639910027bd75d7b
SHA1: 767918cc18994873c05f1109356c2178d03c8cc9
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

httpclient-4.3.3.jar

Description:  HttpComponents Client

File Path: C:\Users\Dad\.m2\repository\org\apache\httpcomponents\httpclient\4.3.3\httpclient-4.3.3.jar
MD5: 88cc3123fce88d61b7c2cdbfc33542c5
SHA1: 18f4247ff4572a074444572cee34647c43e7c9c7
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

CVE-2015-5262  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.

Vulnerable Software & Versions:

CVE-2014-3577  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

Vulnerable Software & Versions: (show all)

httpcore-4.3.2.jar

Description:  HttpComponents Core (blocking I/O)

File Path: C:\Users\Dad\.m2\repository\org\apache\httpcomponents\httpcore\4.3.2\httpcore-4.3.2.jar
MD5: ee3d34dce4a30c7d3002cadf8c9172c1
SHA1: 31fbbff1ddbf98f3aa7377c94d33b0447c646b6e
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

juddi-client-3.3.3.jar

Description: jUDDI (pronounced "Judy") is an open source Java implementation of the Universal Description, Discovery, and Integration (UDDI) specification for Web Services.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\juddi\juddi-client\3.3.3\juddi-client-3.3.3.jar
MD5: 97c5bdf27e8b2b177d0621f8476942fd
SHA1: 02956c0e30405af75c9866ccf1dba30697d19781
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile

Identifiers

uddi-ws-3.3.3.jar

Description: jUDDI (pronounced "Judy") is an open source Java implementation of the Universal Description, Discovery, and Integration (UDDI) specification for Web Services.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\juddi\uddi-ws\3.3.3\uddi-ws-3.3.3.jar
MD5: bb20c0b7902db12bc44154a7883ba79a
SHA1: ba7abcb195c7fe6048e734925fd29622b1959447
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile

Identifiers

neethi-3.0.3.jar

Description: Apache Neethi provides general framework for the programmers to use WS Policy. It is compliant with latest WS Policy specification which was published in March 2006. This framework is specifically written to enable the Apache Web services stack to use WS Policy as a way of expressing it's requirements and capabilities.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\neethi\neethi\3.0.3\neethi-3.0.3.jar
MD5: 8a81813a03e2899ccd31f0e92f6cc691
SHA1: ee37a38bbf9f355ee88ba554a85c9220b75ba500
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

qpid-client-6.0.0.jar

Description: JMS client supporting AMQP 0-8, 0-9, 0-9-1 and 0-10.

File Path: C:\Users\Dad\.m2\repository\org\apache\qpid\qpid-client\6.0.0\qpid-client-6.0.0.jar
MD5: 244a004182de831f2ff3774dbac2741f
SHA1: 0a4c3e81e2c4777bf3d50c293391831a5dd1acf9
Referenced In Projects/Scopes:

  • fgsms Statistics Aggregator:compile
  • fgsms Status Service:compile
  • fgsms Data Access Service:compile
  • fgsms Service WAR:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

tomcat-dbcp-7.0.73.jar

Description: Tomcat Database Connection Pooling package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\tomcat\tomcat-dbcp\7.0.73\tomcat-dbcp-7.0.73.jar
MD5: a2231c98f224656c25baabb31009ff34
SHA1: 9edb65b034932a18594ceadd5bfeed1482f7e159
Referenced In Project/Scope: fgsms Tomcat JDCP Encryption Connection:provided

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

xmlschema-core-2.1.0.jar

Description: Commons XMLSchema is a light weight schema object model that can be used to manipulate or generate XML schema.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\apache\ws\xmlschema\xmlschema-core\2.1.0\xmlschema-core-2.1.0.jar
MD5: 0856f69b09dcb6e0f47f1aee13c9b74d
SHA1: 93415557e2867469c33be98ab330655dd714297d
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

jettison-1.3.4.jar

Description: A StAX implementation for JSON.

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0
File Path: C:\Users\Dad\.m2\repository\org\codehaus\jettison\jettison\1.3.4\jettison-1.3.4.jar
MD5: 511ae111646da8c9044710dca1cb58fc
SHA1: 3c08d8f699432e23023080cdc8b4073132473dc8
Referenced In Project/Scope: fgsms User Interface (Bootstrap):compile

Identifiers

stax2-api-3.1.4.jar

Description: tax2 API is an extension to basic Stax 1.0 API that adds significant new functionality, such as full-featured bi-direction validation interface and high-performance Typed Access API.

License:

The BSD License: http://www.opensource.org/licenses/bsd-license.php
File Path: C:\Users\Dad\.m2\repository\org\codehaus\woodstox\stax2-api\3.1.4\stax2-api-3.1.4.jar
MD5: c08e89de601b0a78f941b2c29db565c3
SHA1: ac19014b1e6a7c08aad07fe114af792676b685b7
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

woodstox-core-asl-4.2.1.jar

Description: Woodstox is a high-performance XML processor that implements Stax (JSR-173) and SAX2 APIs

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\codehaus\woodstox\woodstox-core-asl\4.2.1\woodstox-core-asl-4.2.1.jar
MD5: 767eb8001863dd8bf101c6756e7feed2
SHA1: 0ce8115adb515bc740dbe726a918983c48c9752d
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

hamcrest-core-1.3.jar

Description:  This is the core API of hamcrest matcher framework to be used by third-party framework providers. This includes the a foundation set of matcher implementations for common operations.

File Path: C:\Users\Dad\.m2\repository\org\hamcrest\hamcrest-core\1.3\hamcrest-core-1.3.jar
MD5: 6393363b47ddcbba82321110c3e07519
SHA1: 42a25dc3219429f0e5d060061f71acb49bf010a0
Referenced In Project/Scope: fgsms Common WS Test Utilities:compile

Identifiers

jcommon-1.0.23.jar

Description:  JCommon is a free general purpose Java class library that is used in several projects at www.jfree.org, including JFreeChart and JFreeReport.

License:

GNU Lesser General Public Licence: http://www.gnu.org/licenses/lgpl.txt
File Path: C:\Users\Dad\.m2\repository\org\jfree\jcommon\1.0.23\jcommon-1.0.23.jar
MD5: 1b059adc60fef2da40b7130f9a67f977
SHA1: a316f336ca996e0c6bec4e4fbd49be8f5e1c3968
Referenced In Projects/Scopes:
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

jfreechart-1.0.19.jar

Description:  JFreeChart is a class library, written in Java, for generating charts. Utilising the Java2D APIs, it currently supports bar charts, pie charts, line charts, XY-plots and time series plots.

License:

GNU Lesser General Public Licence: http://www.gnu.org/licenses/lgpl.txt
File Path: C:\Users\Dad\.m2\repository\org\jfree\jfreechart\1.0.19\jfreechart-1.0.19.jar
MD5: 4ff3762bd04a7239cfb98de542134bec
SHA1: ba9ee7dbb2e4c57a6901c79f614ed2dea9cc0e20
Referenced In Projects/Scopes:
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile
  • fgsms Automated Reporting Service:compile

Identifiers

xchart-3.0.0.jar

Description: The core XChart library

File Path: C:\Users\Dad\.m2\repository\org\knowm\xchart\xchart\3.0.0\xchart-3.0.0.jar
MD5: a0fa77ed0eeb3e8c7c5801b2d0b9c545
SHA1: 83f605b9d59f9e860e85c8c53cb6ed736eb99e85
Referenced In Projects/Scopes:

  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Service WAR:compile
  • fgsms Automated Reporting Service:compile

Identifiers

apache-tomcat-7.0.0.zip: bootstrap.jar

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\bootstrap.jar
MD5: cac2293dd18e80d21ac30a8d74fcf9a9
SHA1: 612e52b45f2435bcde5234eb3a5d7c8ead7ac7f4
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • cpe: cpe:/a:apache:tomcat:7.0.75   Confidence:LOW   
  • cpe: cpe:/a:apache_software_foundation:tomcat:7.0.75   Confidence:LOW   

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: commons-daemon.jar

Description:  Apache Commons Daemon software provides an alternative invocation mechanism for unix-daemon-like Java code.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\commons-daemon.jar
MD5: 631bfc43cf5f601d34f1f5ea16751061
SHA1: 275b3f1efc36c6a5c276440a96a489f4ff90fa8a
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

apache-tomcat-7.0.0.zip: tcnative-1.dll

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\tcnative-1.dll
MD5: c3d31bc0aaf44e51d3625e6ce3e45b14
SHA1: de6d92def1c2aa7faedbac1dafc323a29fb87163
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • None

apache-tomcat-7.0.0.zip: tomcat-juli.jar

Description: Tomcat Core Logging Package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\tomcat-juli.jar
MD5: 447efa554024a83cc16d0a8a14ead419
SHA1: 5186c4cf4c5861f74ba945ab1328ed53100597c0
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

apache-tomcat-7.0.0.zip: tomcat7.exe

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\tomcat7.exe
MD5: f0ec67a5280737765805614db4b72355
SHA1: 414a32186456dfa23222ca38cfa26d4e6587aef2
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • None

apache-tomcat-7.0.0.zip: tomcat7w.exe

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\bin\tomcat7w.exe
MD5: 7ba316ca9e5ff204ef9e30f881573c77
SHA1: 0b48fd55c03fe6abda44f35cf61d2da8bb7e8171
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • None

apache-tomcat-7.0.0.zip: annotations-api.jar

Description: Annotations Package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\annotations-api.jar
MD5: a322dc688932071393c8bf6ccb95fb0b
SHA1: c634ca04e5b988d8283d14f9c8812bc9ca59d8c8
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

CVE-2014-0119  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

Vulnerable Software & Versions: (show all)

CVE-2014-0099  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-189 Numeric Errors

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

Vulnerable Software & Versions: (show all)

CVE-2014-0096  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2014-0075  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

Vulnerable Software & Versions: (show all)

CVE-2013-6357  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-352

** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator."

Vulnerable Software & Versions: (show all)

CVE-2013-4590  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2013-4444  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')

Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.

Vulnerable Software & Versions: (show all)

CVE-2013-4322  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.

Vulnerable Software & Versions: (show all)

CVE-2013-4286  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

Vulnerable Software & Versions: (show all)

CVE-2013-2185  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

** DISPUTED ** The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue.

Vulnerable Software & Versions: (show all)

CVE-2012-5568  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-16 Configuration

Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.

Vulnerable Software & Versions: (show all)

CVE-2009-3548  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-255 Credentials Management

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

Vulnerable Software & Versions: (show all)

CVE-2009-2696  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

Vulnerable Software & Versions:

CVE-2008-0128  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-16 Configuration

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Vulnerable Software & Versions:

CVE-2007-2449  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.

Vulnerable Software & Versions: (show all)

CVE-2007-1358  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".

Vulnerable Software & Versions: (show all)

CVE-2007-0450  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.

Vulnerable Software & Versions: (show all)

CVE-2006-7196  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1.

Vulnerable Software & Versions: (show all)

CVE-2005-4838  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp. NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.

Vulnerable Software & Versions:

CVE-2005-0808  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.

Vulnerable Software & Versions: (show all)

CVE-2003-0045  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp.

Vulnerable Software & Versions: (show all)

CVE-2003-0044  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.

Vulnerable Software & Versions: (show all)

CVE-2003-0043  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, uses trusted privileges when processing the web.xml file, which could allow remote attackers to read portions of some files through the web.xml file.

Vulnerable Software & Versions: (show all)

CVE-2003-0042  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.

Vulnerable Software & Versions: (show all)

CVE-2002-2006  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.

Vulnerable Software & Versions: (show all)

CVE-2002-1148  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.

Vulnerable Software & Versions: (show all)

CVE-2002-0493  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-254 Security Features

Apache Tomcat may be started without proper security settings if errors are encountered while reading the web.xml file, which could allow attackers to bypass intended restrictions.

Vulnerable Software & Versions:

CVE-2001-0590  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).

Vulnerable Software & Versions:

CVE-2000-1210  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.

Vulnerable Software & Versions:

CVE-2000-0760  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.

Vulnerable Software & Versions: (show all)

CVE-2000-0672  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: catalina.jar

Description: Tomcat Servlet Engine Core Classes and Standard implementations

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\catalina.jar
MD5: 689fa27acde913a45dea53eec555adac
SHA1: 05b715998704de3fa5c9be23892113517f692ba4
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: ecj-4.4.2.jar

Description: Eclipse JDT Core Batch Compiler

License:

Eclipse Public License v1.0: http://www.eclipse.org/org/documents/epl-v10.php
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\ecj-4.4.2.jar
MD5: ee97ab38f390547839b950bb51bf5cb5
SHA1: 71d67f5bab9465ec844596ef844f40902ae25392
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

apache-tomcat-7.0.0.zip: el-api.jar

Description: Expression language package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\el-api.jar
MD5: e05958941a2e587663ae00419787e2ec
SHA1: e72aacfb9ec1e3b3e883909f064a3db5d8c1efc7
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: jasper.jar

Description: Tomcats JSP Parser

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\jasper.jar
MD5: 75b32bfd24275d303db338521cd411cc
SHA1: fd8af82bd301d00aafa267ce479be112b16f96b2
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: jsp-api.jar

Description: JSP package

License:

        Apache License, Version 2.0 and
        Common Development And Distribution License (CDDL) Version 1.0
      : 
        http://www.apache.org/licenses/LICENSE-2.0.txt and
        http://www.opensource.org/licenses/cddl1.txt
      
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\jsp-api.jar
MD5: 60f3daec8dc59f3969bfb413e9b9b2f9
SHA1: 44ed6c8dae1c3300c0b71f0ec7660a16d2502904
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: servlet-api.jar

Description: javax.servlet package

License:

        Apache License, Version 2.0 and
        Common Development And Distribution License (CDDL) Version 1.0
      : 
        http://www.apache.org/licenses/LICENSE-2.0.txt and
        http://www.opensource.org/licenses/cddl1.txt
      
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\servlet-api.jar
MD5: f34ae94d638382c6d61dd8bcdcf9c173
SHA1: a3fda076c3eefd660e1894b3420545a8cd42e57c
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

CVE-2014-0119  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

Vulnerable Software & Versions: (show all)

CVE-2014-0099  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-189 Numeric Errors

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

Vulnerable Software & Versions: (show all)

CVE-2014-0096  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-264 Permissions, Privileges, and Access Controls

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2014-0075  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-189 Numeric Errors

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

Vulnerable Software & Versions: (show all)

CVE-2013-6357  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-352

** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator."

Vulnerable Software & Versions: (show all)

CVE-2013-4590  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

CVE-2013-4444  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')

Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.

Vulnerable Software & Versions: (show all)

CVE-2013-4322  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.

Vulnerable Software & Versions: (show all)

CVE-2013-4286  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

Vulnerable Software & Versions: (show all)

CVE-2013-2185  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

** DISPUTED ** The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue.

Vulnerable Software & Versions: (show all)

CVE-2012-5568  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-16 Configuration

Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.

Vulnerable Software & Versions: (show all)

CVE-2009-3548  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-255 Credentials Management

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

Vulnerable Software & Versions: (show all)

CVE-2009-2696  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

Vulnerable Software & Versions:

CVE-2008-0128  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-16 Configuration

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Vulnerable Software & Versions:

CVE-2007-2449  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.

Vulnerable Software & Versions: (show all)

CVE-2007-1358  

Severity: Low
CVSS Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".

Vulnerable Software & Versions: (show all)

CVE-2007-0450  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.

Vulnerable Software & Versions: (show all)

CVE-2006-7196  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1.

Vulnerable Software & Versions: (show all)

CVE-2005-4838  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp. NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.

Vulnerable Software & Versions:

CVE-2005-0808  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.

Vulnerable Software & Versions: (show all)

CVE-2003-0045  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp.

Vulnerable Software & Versions: (show all)

CVE-2003-0044  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.

Vulnerable Software & Versions: (show all)

CVE-2003-0043  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, uses trusted privileges when processing the web.xml file, which could allow remote attackers to read portions of some files through the web.xml file.

Vulnerable Software & Versions: (show all)

CVE-2003-0042  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.

Vulnerable Software & Versions: (show all)

CVE-2002-2006  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.

Vulnerable Software & Versions: (show all)

CVE-2002-1148  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.

Vulnerable Software & Versions: (show all)

CVE-2002-0493  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-254 Security Features

Apache Tomcat may be started without proper security settings if errors are encountered while reading the web.xml file, which could allow attackers to bypass intended restrictions.

Vulnerable Software & Versions:

CVE-2001-0590  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).

Vulnerable Software & Versions:

CVE-2000-1210  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.

Vulnerable Software & Versions:

CVE-2000-0760  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.

Vulnerable Software & Versions: (show all)

CVE-2000-0672  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: tomcat-api.jar

Description: Definition of interfaces shared by Catalina and Jasper

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\tomcat-api.jar
MD5: 232dcd1a0413b6bd17afb34a4202f051
SHA1: 4a3de75146d1e75de72f0e16a7eca674e1d163d2
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: tomcat-jdbc.jar

Description: Tomcat JDBC Pool Package

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\tomcat-jdbc.jar
MD5: c664ae49eaee7dca82011913322efd97
SHA1: 3a0ad874759868ad99ca98a12d6d603b0d057fc2
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

apache-tomcat-7.0.0.zip: tomcat7-websocket.jar

Description: Tomcat WebSocket (JSR356) implementation

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\tomcat7-websocket.jar
MD5: 6277e62800974a8c85a6d42ca6a34bb4
SHA1: 9eec4f3edcb5e81804e2207d7413287ebe630b94
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: websocket-api.jar

Description: WebSocket (JSR356) API

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\lib\websocket-api.jar
MD5: f6f63164f56ac8f09854f05b901cbadd
SHA1: 71faf243ffd2d4484551c227db562d04792a7749
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

CVE-2016-6325  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5425  

Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

Vulnerable Software & Versions:

CVE-2016-5388  

Severity: Medium
CVSS Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CWE: CWE-284 Improper Access Control

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Vulnerable Software & Versions: (show all)

apache-tomcat-7.0.0.zip: sample.war

File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\webapps\docs\appdev\sample\sample.war
MD5: 570f196c4a1025a717269d16d11d6f37
SHA1: 80f5053b166c69d81697ba21113c673f8372aca0
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

  • None

apache-tomcat-7.0.0.zip: taglibs-standard-impl-1.2.5.jar

Description:  An implementation of the JSP Standard Tag Library (JSTL).

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\mil-oss\apache-tomcat\7.0.0\apache-tomcat-7.0.0.zip\apache-tomcat-7.0.75\webapps\examples\WEB-INF\lib\taglibs-standard-impl-1.2.5.jar
MD5: 8e5c8db242fbef3db1acfcbb3bc8ec8b
SHA1: 9b9783ccb2a323383e6e20e36d368f8997b71967
Referenced In Project/Scope: fgsms Tomcat Packaging:compile

Identifiers

postgresql-9.4.1212.jre7.jar

Description: Java JDBC 4.1 (JRE 7+) driver for PostgreSQL database

License:

http://www.postgresql.org/about/licence/
File Path: C:\Users\Dad\.m2\repository\org\postgresql\postgresql\9.4.1212.jre7\postgresql-9.4.1212.jre7.jar
MD5: 8681ad73ea0de09c3d8a6dfb0470412f
SHA1: 7101612950488be0ff6882bcc27aa0f0a4c202dd
Referenced In Projects/Scopes:
  • fgsms Database Export Tool:compile
  • fgsms Recryptor:compile
  • fgsms Tomcat Packaging:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms Service WAR:compile

Identifiers

quartz-1.8.6.jar

File Path: C:\Users\Dad\.m2\repository\org\quartz-scheduler\quartz\1.8.6\quartz-1.8.6.jar
MD5: fff6d47071fce5e1b36cc943aa118b65
SHA1: 552019e55385a5fdbc6b594fabc4c03ea45a99bc
Referenced In Project/Scope: fgsms Service WAR:compile

Identifiers

slf4j-api-1.7.7.jar

Description: The slf4j API

File Path: C:\Users\Dad\.m2\repository\org\slf4j\slf4j-api\1.7.7\slf4j-api-1.7.7.jar
MD5: ca4280bf93d64367723ae5c8d42dd0b9
SHA1: 2b8019b6249bb05d81d3a3094e468753e2b21311
Referenced In Projects/Scopes:

  • fgsms Status Service:compile
  • fgsms Statistics Aggregator:compile
  • fgsms Data Access Service:compile
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Qpid JMX Agent:compile
  • fgsms Automated Reporting Service:compile
  • fgsms Data Pruner:compile
  • fgsms Reporting Service:compile
  • fgsms Asynchronous Report Generator:compile
  • fgsms Apache ServiceMix/ActiveMQ JMX Agent:compile
  • fgsms Common WS Test Utilities:compile
  • fgsms HornetQ JMS Agent:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Data Collector Service:compile
  • fgsms Dependency Scanner:compile
  • fgsms UDDI Publisher:compile
  • fgsms Service Level Agreement Processor:compile
  • fgsms Status (Bueller) Agent:compile

Identifiers

slf4j-log4j12-1.7.7.jar

Description: SLF4J LOG4J-12 Binding

File Path: C:\Users\Dad\.m2\repository\org\slf4j\slf4j-log4j12\1.7.7\slf4j-log4j12-1.7.7.jar
MD5: 4d2be9dc9aa3d08dba9daa09ed917526
SHA1: 58f588119ffd1702c77ccab6acb54bfb41bed8bd
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

spring-aop-3.2.8.RELEASE.jar

Description: Spring AOP

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-aop\3.2.8.RELEASE\spring-aop-3.2.8.RELEASE.jar
MD5: 72d52ace5d2545edf632944eaeeed333
SHA1: 90e7924ef58621a4c07c81279e013d9a11d41789
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

spring-core-3.2.8.RELEASE.jar

Description: Spring Core

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\org\springframework\spring-core\3.2.8.RELEASE\spring-core-3.2.8.RELEASE.jar
MD5: f127292a67579e3d455a5773ad9af49d
SHA1: 64b9b731decc74403eb85163278659d91c300584
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

CVE-2016-9878  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks.

Vulnerable Software & Versions: (show all)

CVE-2015-3192  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.

Vulnerable Software & Versions: (show all)

CVE-2014-3625  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Directory traversal vulnerability in Pivotal Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling.

Vulnerable Software & Versions: (show all)

CVE-2014-3578  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Directory traversal vulnerability in Pivotal Spring Framework 3.x before 3.2.9 and 4.0 before 4.0.5 allows remote attackers to read arbitrary files via a crafted URL.

Vulnerable Software & Versions: (show all)

stax-api-1.0.1.jar

Description: StAX API is the standard java XML processing API defined by JSR-173

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\stax\stax-api\1.0.1\stax-api-1.0.1.jar
MD5: 7d436a53c64490bee564c576babb36b4
SHA1: 49c100caf72d658aca8e58bd74a4ba90fa2b0d70
Referenced In Project/Scope: fgsms User Interface (Bootstrap):compile

Identifiers

wsdl4j-1.6.2.jar

Description: Java stub generator for WSDL

License:

CPL: http://www.opensource.org/licenses/cpl1.0.txt
File Path: C:\Users\Dad\.m2\repository\wsdl4j\wsdl4j\1.6.2\wsdl4j-1.6.2.jar
MD5: 2608a8ea3f07b0c08de8a7d3d0d3fc09
SHA1: dec1669fb6801b7328e01ad72fc9e10b69ea06c1
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms Policy Configuration Service:compile
  • fgsms Server Crash Alerter:compile
  • fgsms UI Common:compile
  • fgsms UDDI Publisher:compile

Identifiers

serializer-2.7.1.jar

Description:  Serializer to write out XML, HTML etc. as a stream of characters from an input DOM or from input SAX events.

File Path: C:\Users\Dad\.m2\repository\xalan\serializer\2.7.1\serializer-2.7.1.jar
MD5: a6b64dfe58229bdd810263fa0cc54cff
SHA1: 4b4b18df434451249bb65a63f2fb69e215a6a020
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

xalan-2.7.1.jar

Description:  Xalan-Java is an XSLT processor for transforming XML documents into HTML, text, or other XML document types. It implements XSL Transformations (XSLT) Version 1.0 and XML Path Language (XPath) Version 1.0 and can be used from the command line, in an applet or a servlet, or as a module in other program.

File Path: C:\Users\Dad\.m2\repository\xalan\xalan\2.7.1\xalan-2.7.1.jar
MD5: d43aad24f2c143b675292ccfef487f9c
SHA1: 75f1d83ce27bab5f29fff034fc74aa9f7266f22a
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

CVE-2014-0107  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls

The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.

Vulnerable Software & Versions: (show all)

xercesImpl-2.11.0.jar

Description:  Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program. The Apache Xerces2 parser is the reference implementation of XNI but other parser components, configurations, and parsers can be written using the Xerces Native Interface. For complete design and implementation documents, refer to the XNI Manual. Xerces2 is a fully conforming XML Schema 1.0 processor. A partial experimental implementation of the XML Schema 1.1 Structures and Datatypes Working Drafts (December 2009) and an experimental implementation of the XML Schema Definition Language (XSD): Component Designators (SCD) Candidate Recommendation (January 2010) are provided for evaluation. For more information, refer to the XML Schema page. Xerces2 also provides a complete implementation of the Document Object Model Level 3 Core and Load/Save W3C Recommendations and provides a complete implementation of the XML Inclusions (XInclude) W3C Recommendation. It also provides support for OASIS XML Catalogs v1.1. Xerces2 is able to parse documents written according to the XML 1.1 Recommendation, except that it does not yet provide an option to enable normalization checking as described in section 2.13 of this specification. It also handles namespaces according to the XML Namespaces 1.1 Recommendation, and will correctly serialize XML 1.1 documents if the DOM level 3 load/save APIs are in use.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Dad\.m2\repository\xerces\xercesImpl\2.11.0\xercesImpl-2.11.0.jar
MD5: 43584adc1f895628055bad0aa98a1007
SHA1: 9bb329db1cfc4e22462c9d6b43a8432f5850e92c
Referenced In Projects/Scopes:
  • fgsms Service WAR:compile
  • fgsms User Interface (Bootstrap):provided

Identifiers

xml-apis-1.4.01.jar

Description: xml-commons provides an Apache-hosted set of DOM, SAX, and JAXP interfaces for use in other xml-based projects. Our hope is that we can standardize on both a common version and packaging scheme for these critical XML standards interfaces to make the lives of both our developers and users easier. The External Components portion of xml-commons contains interfaces that are defined by external standards organizations. For DOM, that's the W3C; for SAX it's David Megginson and sax.sourceforge.net; for JAXP it's Sun.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
The SAX License: http://www.saxproject.org/copying.html
The W3C License: http://www.w3.org/TR/2004/REC-DOM-Level-3-Core-20040407/java-binding.zip
File Path: C:\Users\Dad\.m2\repository\xml-apis\xml-apis\1.4.01\xml-apis-1.4.01.jar
MD5: 7eaad6fea5925cca6c36ee8b3e02ac9d
SHA1: 3789d9fada2d3d458c4ba2de349d48780f381ee3
Referenced In Projects/Scopes:
  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile
  • fgsms UI Common:compile

Identifiers

xml-resolver-1.2.jar

Description: xml-commons provides an Apache-hosted set of DOM, SAX, and JAXP interfaces for use in other xml-based projects. Our hope is that we can standardize on both a common version and packaging scheme for these critical XML standards interfaces to make the lives of both our developers and users easier.

File Path: C:\Users\Dad\.m2\repository\xml-resolver\xml-resolver\1.2\xml-resolver-1.2.jar
MD5: 706c533146c1f4ee46b66659ea14583a
SHA1: 3d0f97750b3a03e0971831566067754ba4bfd68c
Referenced In Projects/Scopes:

  • fgsms User Interface (Bootstrap):compile
  • fgsms Service WAR:compile

Identifiers

jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.istack/istack-commons-runtime/pom.xml

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.2.6\jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.istack/istack-commons-runtime/pom.xml
MD5: 11bb96afb693ddcd702cfc74ce2ff69c
SHA1: 35f36b3c480e9b407bc6d828adfc7c8b1d7d6688

Identifiers

  • maven: com.sun.istack:istack-commons-runtime:2.13   Confidence:HIGH

jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.xml.txw2/txw2/pom.xml

File Path: C:\Users\Dad\.m2\repository\com\sun\xml\bind\jaxb-impl\2.2.6\jaxb-impl-2.2.6.jar\META-INF/maven/com.sun.xml.txw2/txw2/pom.xml
MD5: cf4b1041a961856b9c0a5c3846c602fe
SHA1: 145b0c8dc9d0205ea46c44a3be6c1911d4e30e81

Identifiers

  • maven: com.sun.xml.txw2:txw2:20110809   Confidence:HIGH


This report contains data retrieved from the National Vulnerability Database.