Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.
File Path: C:\birt\plugins\com.ibm.icu_58.2.0.v20170418-1837.jar
MD5: dc83dd159fafba582632b2b794ceed19
SHA1: 64476e506372c6650984155f8ba768042a921a44
File Path: C:\birt\plugins\com.lowagie.text_2.1.7.v201004222200.jar
MD5: b909b403c215b9b173da3baccc3509ed
SHA1: 901bfb4fa0b2b4e6fb163a953070adb006335a54
File Path: C:\birt\plugins\javax.el_2.2.0.v201303151357.jar
MD5: dbc79afd49407c5598a411cfb3543cf2
SHA1: 0f59178deb403418dc3fb0c59e93a1769e409130
File Path: C:\birt\plugins\javax.inject_1.0.0.v20091030.jar
MD5: 508774113f4ecc361d7a7ec5dc93c737
SHA1: bf39840bc3bc7fa50a0d5ab4fea74bc00e89f952
File Path: C:\birt\plugins\javax.servlet.jsp_2.2.0.v201112011158.jar
MD5: cdaf37764ecda0ae846a16465ce34ffa
SHA1: 0d12ed9e52f9cb25e5e1f0c49dfa4dee2ff845ce
Description: %bundleDescription
File Path: C:\birt\plugins\javax.servlet_3.1.0.v201410161800.jar
MD5: f3472e3186b7f84cdc4996d42c727eab
SHA1: e0e698d1be57aaef38e54428f5c09c7fe0cf594e
Description: Provides open-source implementations of Sun specifications.
File Path: C:\birt\plugins\javax.transaction_1.1.1.v201105210645.jar
MD5: 658b3a59ec07d0a37890c6c06de118df
SHA1: 0fbf758105fcd3212cc8da35debb4dd4a0028752
File Path: C:\birt\plugins\javax.wsdl_1.6.2.v201012040545.jar
MD5: fb444d40fea978eb2bc53114037cefee
SHA1: f4cb5ae5b298e41a056c3d29c292a1128cc16b9a
File Path: C:\birt\plugins\javax.xml.rpc_1.1.0.v201209140446\lib\jaxrpc.jar
MD5: b4592e5eccfeeeae87cfadef0ca66c66
SHA1: b393f1f0c0d95b68c86d0b1ab2e687bb71f3c075
File Path: C:\birt\plugins\javax.xml.stream_1.0.1.v201004272200.jar
MD5: 8ec99d6a4b070c3e11d68ec218aa323b
SHA1: 80a28be3fa17b4c5a0dac56d53c31665765f2920
File Path: C:\birt\plugins\javax.xml_1.3.4.v201005080400.jar
MD5: 7f7c93e568d12d93268300aa85060dd1
SHA1: 2c04a38e2b05f5ee4ca2556906c10c162fcabd06
File Path: C:\birt\plugins\org.apache.axis_1.4.0.v201411182030\lib\axis.jar
MD5: 03dcfdd88502505cc5a805a128bfdd8d
SHA1: 94a9ce681a42d0352b3ad22659f67835e560d107
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 5.8
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 5.8
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation
Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.apache.batik.css_1.7.0.v201011041433.jar
MD5: 59805d01c5b30652b766971c2b8770aa
SHA1: e32386221b6a4bc7bd9ba3a73bafb56fc85ca373
Severity:
High
CVSS Score: 7.5
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data
In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.
Vulnerable Software & Versions: (show all)
Severity:
High
CVSS Score: 7.9
(AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')
In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.4
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.apache.batik.css_1.9.0.v20170908-1305.jar
MD5: 574212e5c4e3f113361122f8c74e1da9
SHA1: 96a2cb4b9ad9a8014695550e1df5efde015eb6a1
Severity:
High
CVSS Score: 7.5
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data
In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.apache.batik.dom_1.7.1.v201505191845.jar
MD5: 60277dbbc8078dfcf910d6aa41c080e5
SHA1: ca2a04a5be488d7d23a84e4b4aa0740047a4c37a
Severity:
High
CVSS Score: 7.5
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data
In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.
Vulnerable Software & Versions: (show all)
Severity:
High
CVSS Score: 7.9
(AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')
In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.apache.batik.ext.awt.extension_1.7.0.v201803131913.jar
MD5: ad6278859d1d514e7108e329d39bda61
SHA1: 74b500a7e47198195021d6ca828f0e063afc7201
Severity:
High
CVSS Score: 7.9
(AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')
In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.apache.batik.i18n_1.9.0.v20170906-1841.jar
MD5: 2f6325dc53e15f58029df416ae28f418
SHA1: 46561ecd67d73e229710fed2e2d38c2b3c6740a2
Severity:
High
CVSS Score: 7.5
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data
In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.apache.batik.util.gui_1.7.0.v200903091627.jar
MD5: 705e2e76b2d50953dfb0872d46cbd163
SHA1: 44eed20e2aee27a9b092457015c96c5ebf676bb9
Severity:
High
CVSS Score: 7.5
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data
In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.
Vulnerable Software & Versions: (show all)
Severity:
High
CVSS Score: 7.9
(AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')
In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.4
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.
Vulnerable Software & Versions: (show all)
Description: The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.
License:
http://www.apache.org/licenses/LICENSE-2.0.txtFile Path: C:\birt\plugins\org.apache.commons.codec_1.9.0.v20170208-1614.jar
File Path: C:\birt\plugins\org.apache.commons.discovery_0.2.0.v201004190315\lib\commons-discovery-0.2.jar
MD5: 9a2fb56e6a79169b2fb6c8a0dc79abb0
SHA1: 7773ac7a7248f08ed2b8d297c6e2ef28260640ea
File Path: C:\birt\plugins\org.apache.commons.jxpath_1.3.0.v200911051830.jar
MD5: d24c67043830efac0f7d4180310a279c
SHA1: f20b24af69f023a6247e624b0d06c206f694b3f4
File Path: C:\birt\plugins\org.apache.commons.logging_1.1.1.v201101211721.jar
MD5: 98247c946b389a6043a5852693a6a889
SHA1: 07c8ef9aac68753c9a6fb3a79431bbe8dc3d55d9
File Path: C:\birt\plugins\org.apache.derby_10.11.1.1_v201605202053.jar
MD5: 17166d0735e6557d4ad110de9e543d9a
SHA1: 2b60bf505a014edd8e3c7198f9c0b5761d2a1705
Description: Implementation of the Declarative Services specification 1.3
License:
http://www.apache.org/licenses/LICENSE-2.0.txtFile Path: C:\birt\plugins\org.apache.felix.scr_2.0.14.v20180117-1452.jar
Description: %Bundle-Description
License:
https://glassfish.dev.java.net/public/CDDLv1.0.htmlFile Path: C:\birt\plugins\org.apache.jasper.glassfish_2.2.2.v201501141630.jar
File Path: C:\birt\plugins\org.apache.lucene.analysis_3.5.0.v20120725-1805.jar
MD5: a6cc7984b1b9ee9da27e989e41499c96
SHA1: 38a90c846590c7f0c62ce8ab51d3ee6bd223b664
File Path: C:\birt\plugins\org.apache.lucene.analyzers-common_7.1.0.v20180122-2126.jar
MD5: 1816857fe43ba26f057616873a96bab2
SHA1: 5c84c24334cac3f3df228e0169c180769c404fc3
File Path: C:\birt\plugins\org.apache.lucene.analyzers-smartcn_7.1.0.v20180122-2126.jar
MD5: d4e37a04d62a8c606ceed9aed89b727e
SHA1: d62880b8bcbb6bb96ddc83ca159e8c6edb8de22e
File Path: C:\birt\plugins\org.apache.lucene.core_3.5.0.v20120725-1805.jar
MD5: e243459011e2ab415d9604b90c2b5180
SHA1: b692d43c07f32c43402dd8c02efac090990c99c1
File Path: C:\birt\plugins\org.apache.lucene.core_7.1.0.v20171214-1510.jar
MD5: ed69285dac52cef3b2af38051faa703f
SHA1: a671b86feb8c4f53367d6edbb0eea0e9e5b04204
File Path: C:\birt\plugins\org.apache.poi_3.9.0.v201405241750.jar
MD5: 9b608ddcec092816f992ca649b714d1b
SHA1: 27955afc1de66091c40c6c622c889931ffe69bc5
Severity:
High
CVSS Score: 7.1
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.apache.xerces_2.9.0.v201101211617.jar
MD5: 961554fbcc83ea650148e29bea723e6b
SHA1: 106d733bb925686a566de5920e9fa7ae373ae532
File Path: C:\birt\plugins\org.apache.xml.resolver_1.2.0.v201005080400.jar
MD5: b8ec3d34b82ae36d094e4ad3c3bd6231
SHA1: d17504c7928ebbf8959a1302d327973e878e666f
File Path: C:\birt\plugins\org.apache.xml.serializer_2.7.1.v201005080400.jar
MD5: 07932f4bcc1fc8e0e24a6d101ac50fd3
SHA1: d0bd0a3d8db9f330a803937c7283904fd4a5886a
File Path: C:\birt\plugins\org.eclipse.birt.chart.device.pdf_4.8.0.v201803131913.jar\lib\fop-2.1.jar
MD5: 4d337e3e7e867a498325cc48888c0092
SHA1: 0b30f89682116ae9054609cc59271502247e8bab
File Path: C:\birt\plugins\org.eclipse.birt.core_4.8.0.v201803131913.jar
MD5: 71f3b7f3b8af1acc823e6ad167c08b21
SHA1: f4d06828ecce0fe26efb5dd487601665dc163f5e
File Path: C:\birt\plugins\org.eclipse.birt.data.oda.mongodb_4.8.0.v201803131913.jar
MD5: dad4e8df7b9e73d153b6ededc86f016b
SHA1: d571f6206a5ae45a31b2c17a7dc2e7c8680d0c93
Severity:
Low
CVSS Score: 1.9
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-255 Credentials Management
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.
Vulnerable Software & Versions: (show all)
Severity:
Low
CVSS Score: 2.1
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-287 Improper Authentication
MongoDB on Red Hat Satellite 6 allows local users to bypass authentication by logging in with an empty password and delete information which can cause a Denial of Service.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\cassandra-thrift-1.1.0.jar
MD5: 2f23c24741a758acc2d2cdc246392754
SHA1: a48767fc25d46cb80f17452482d7f12d42b59a28
Description:
Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.
License:
http://www.apache.org/licenses/LICENSE-2.0.txtFile Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\commons-lang-2.4.jar
Description:
Guava is a suite of core and expanded libraries that include
utility classes, google's collections, io classes, and much
much more.
This project is a complete packaging of all the Guava libraries
into a single jar. Individual portions of Guava can be used
by downloading the appropriate module and its dependencies.
Guava (complete) has only one code dependency - javax.annotation,
per the JSR-305 spec.
License:
The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txtFile Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\guava-r09.jar
Description: Cassandra Java Client Library
License:
https://github.com/hector/hector-client/wiki/LicenseFile Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\hector-core-1.1-2.jar
File Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\libthrift-0.7.0.jar
MD5: 960bca5be1ce4b1485646f22372919b6
SHA1: a86aaceaffc6ca81a960a2a92b59702fa3b594b5
Severity:
High
CVSS Score: 9.0
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
CWE: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.0
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation
The client libraries in Apache Thrift before 0.9.3 might allow remote authenticated users to cause a denial of service (infinite recursion) via vectors involving the skip function.
Vulnerable Software & Versions:
Description: The slf4j API
File Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\slf4j-api-1.6.1.jar
MD5: 286f7299d1fbce0ca7698f89b24ba60c
SHA1: 1c7a8ff75430181428a263e7b07a7cdf4bfabe1b
File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar\lib\poi-3.9\ooxml-lib\dom4j-1.6.1.jar
MD5: d7bf1b96a16130688ad3a578b6c98516
SHA1: c0d98b9815cfb5fd30dc44f2d47347d3fa786f28
Severity:
Medium
CVSS Score: 6.4
(AV:N/AC:L/Au:N/C:N/I:P/A:P)
CWE: CWE-91 XML Injection (aka Blind XPath Injection)
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar\lib\poi-3.9\ooxml-lib\xmlbeans-2.3.0.jar
MD5: 37958346e40a65552ac4387c0524a3e4
SHA1: 19fe17d8aaf928c0adacedebdb0aa02ebfb6673e
File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar\lib\poi-3.9\poi-ooxml-3.9-20121203.jar
MD5: 6f40fff664b8185252d8f55212b703b1
SHA1: 442172c691a526949d7567616e248a277752f3a1
Severity:
High
CVSS Score: 7.1
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.jdbc_4.8.0.v201803131913\oda-jdbc.jar
MD5: 76b98affdf7991ce8f731dadda084482
SHA1: 928e9fe054ff87c4ed3880ef093da20ad816de99
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in birt-viewer/run in Eclipse Business Intelligence and Reporting Tools (BIRT) before 2.5.0, as used in KonaKart and other products, allows remote attackers to inject arbitrary web script or HTML via the __report parameter.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.sampledb_4.8.0.v201803131913\db\BirtSample.jar
MD5: 23bb128ef8cfcb94ff220b8d857aa2ce
SHA1: 556b1550b173e5acba8c05de6eb0753322a6ff90
File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.sampledb_4.8.0.v201803131913\sampledb.jar
MD5: d328cc57deb92ae220277d0946884b97
SHA1: f6e0be4683e6fedb0d18a263d76e56ef11983b1e
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in birt-viewer/run in Eclipse Business Intelligence and Reporting Tools (BIRT) before 2.5.0, as used in KonaKart and other products, allows remote attackers to inject arbitrary web script or HTML via the __report parameter.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.eclipse.birt.report.designer.ui.views_4.8.0.v201803131913.jar
MD5: aa85ef3731d79e4900ae103928e1f111
SHA1: 77b755765d8058d9cc90ba85cba61d29e2800b24
File Path: C:\birt\plugins\org.eclipse.birt.report.engine_4.8.0.v201803131913.jar\lib\commons-cli-1.0.jar
MD5: f76ceb00f9440a2570d657e3f030ed1e
SHA1: 7f1557e36dd0c1c88523983ebcfff226460b44ea
Description:
JTidy is a Java port of HTML Tidy, a HTML syntax checker and pretty printer. Like its non-Java cousin, JTidy can be
used as a tool for cleaning up malformed and faulty HTML. In addition, JTidy provides a DOM interface to the
document that is being processed, which effectively makes you able to use JTidy as a DOM parser for real-world HTML.
License:
Java HTML Tidy License: http://jtidy.svn.sourceforge.net/viewvc/jtidy/trunk/jtidy/LICENSE.txt?revision=95File Path: C:\birt\plugins\org.eclipse.birt.report.engine_4.8.0.v201803131913.jar\lib\Tidy.jar
File Path: C:\birt\plugins\org.eclipse.birt.report.viewer_4.8.0.v201803131913\birt\WEB-INF\lib\jsp.jar
MD5: 5a9d18c9f5952e72753ed2528bec5e0e
SHA1: b2974c9ca7aeed128135b7b36925ec52eae44c24
File Path: C:\birt\plugins\org.eclipse.birt.report.viewer_4.8.0.v201803131913\birt\WEB-INF\lib\viewservlets.jar
MD5: 850302bc4d10807fa40825e5d587d519
SHA1: 5dfa70cf99059dfd4f780d4805afef60bcd616e4
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in birt-viewer/run in Eclipse Business Intelligence and Reporting Tools (BIRT) before 2.5.0, as used in KonaKart and other products, allows remote attackers to inject arbitrary web script or HTML via the __report parameter.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.eclipse.birt.report.viewer_4.8.0.v201803131913\viewer.jar
MD5: 0fe98dc3c01ba10f5aff65ad2131786b
SHA1: 688fa88d609f4be0c954c3caddbad52d8ddd3ec6
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in birt-viewer/run in Eclipse Business Intelligence and Reporting Tools (BIRT) before 2.5.0, as used in KonaKart and other products, allows remote attackers to inject arbitrary web script or HTML via the __report parameter.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.eclipse.compare.core_3.6.200.v20171212-0901.jar
MD5: ee20a137e633798ecbe6834be49c0c5c
SHA1: 954bab93b9fdd488abf95f6c3c1bf4d8aa1e4629
File Path: C:\birt\plugins\org.eclipse.core.commands_3.9.100.v20180219-1020.jar
MD5: af90f38ca717cbe046c71a269d8649b4
SHA1: 5b5c5ada88289286b3830070c3cb15144d595672
File Path: C:\birt\plugins\org.eclipse.core.contenttype_3.7.0.v20171130-1004.jar
MD5: a2ccb589cc92ddf8b94c5223786fa90a
SHA1: b242cf47df6567f875a0779a2f8ea5bba9404e58
File Path: C:\birt\plugins\org.eclipse.core.databinding.observable_1.6.200.v20171212-1736.jar
MD5: d6e7eb666070e7d26e3d77e30223a2d9
SHA1: 824584bf70a418c667a6ed1439d6685960f487de
File Path: C:\birt\plugins\org.eclipse.core.databinding.property_1.6.200.v20171212-1736.jar
MD5: 0a22c0bda127dd790c9477352330bbd0
SHA1: e64b1bb21e0ddc06287fe0fa39081e4019e6524a
File Path: C:\birt\plugins\org.eclipse.core.databinding_1.6.200.v20180207-1113.jar
MD5: 78b9f34a0c07eca3fe462279c21a812e
SHA1: 640240e08b8e2def838c9ed2d640cff9626fae03
File Path: C:\birt\plugins\org.eclipse.core.expressions_3.6.100.v20171130-1004.jar
MD5: 10bc1ee4729743cb3b4a6dc4c031db96
SHA1: 9be1e8f2b1c99c2d4a7a3e05cccab33753dee7f6
File Path: C:\birt\plugins\org.eclipse.core.filebuffers_3.6.200.v20171212-0901.jar
MD5: 05f4b51e8a509df89d5563be7413cfbe
SHA1: d0eb714f294d4317badfcc4ae66420321dcdba17
File Path: C:\birt\plugins\org.eclipse.core.filesystem_1.7.100.v20180304-1102.jar
MD5: c738a8c61fca56374ec8f242436361be
SHA1: b3ad92ecd4bc57e4c4e6fd8184f2f79ab5bb7aa1
File Path: C:\birt\plugins\org.eclipse.core.jobs_3.10.0.v20180221-0910.jar
MD5: 2fad584b7ace1a504ee6b45bbafdb795
SHA1: 2bdfc3798de15e98f0398d8c2e840b4010631167
File Path: C:\birt\plugins\org.eclipse.core.net_1.3.200.v20180207-1711.jar
MD5: 8d90004bdd92985ded099e3b39b93d8f
SHA1: e25fe2dc537a58e95be8e6c50a3bbe88e7fec4a4
File Path: C:\birt\plugins\org.eclipse.core.resources_3.13.0.v20180304-1800.jar
MD5: adc24a75835e3661fb592a5e48eb2614
SHA1: 9f91ced7a3eaf87f27b533af12d8336611a7c878
File Path: C:\birt\plugins\org.eclipse.core.resources_3.13.0.v20180304-1800.jar\ant_tasks\resources-ant.jar
MD5: b48a53bb93d12a202e7747b1e8b228d3
SHA1: 2542d39dfc2fb17b29ee170bf38347fdcaf14b79
File Path: C:\birt\plugins\org.eclipse.core.runtime_3.14.0.v20180220-2036.jar
MD5: ae74be4fac8a8d87764bf38058161678
SHA1: 68ffadc5880cbcf7919b876a197a7de2003cf001
File Path: C:\birt\plugins\org.eclipse.core.variables_3.4.100.v20171201-0724.jar
MD5: 73b7c1172baa327441078019526809bd
SHA1: 1ffbfc74a00a03cc975f25ac80e3cdf92437a156
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.db.generic_1.1.0.201603142002.jar
MD5: 1333f4ec33dcbd9f36672538fd73add8
SHA1: 6463155c98d188a710c78889d1edee8be699fea0
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.consumer_3.3.0.201603142002.jar
MD5: 105361057f828ff2b360517bb1af9034
SHA1: 1754b65b77accc04ecc8d23f410058f9fba2a4cd
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.design.ui_3.3.0.201603142002.jar
MD5: ca55f80b6df27df973b518ae631933da
SHA1: bf764bdcae8dc844b65e4d23769fb11fee59223f
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.design_3.4.0.201603142002.jar
MD5: 1bb55defd9d65066d570079dd9b088a8
SHA1: cd9396a66ac6b6b91a2f973589abd855e61456f7
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.flatfile.ui_3.2.0.201603142002.jar
MD5: bfa9f39b753871a53841d22036bc4fa7
SHA1: f852a7671d8d5fc89720c8188c857230802191d3
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.flatfile_3.2.0.201603142002.jar
MD5: 5f016361e036c6e8986cb0f70f2d54a7
SHA1: 1b82d731576d8de50e18845febfc2d24b929d915
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.profile_3.3.0.201603142002.jar
MD5: 8dd84f05391410a30f0a480ace0adba1
SHA1: cf44968fcaa6a6e80b65bae66532e2618c4c3f2c
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda_3.5.0.201603142002.jar
MD5: 454ebcab3770747bfc31190e095130f7
SHA1: 44819825c5bc709854e4de9d3aee3b060dddd84e
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.sqm.core_1.3.0.201603142002.jar
MD5: 0e4148583ed1e77beef5f3b3a4600530
SHA1: 298b37d83bbcdbbf7aae01f213225f684bb22380
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.ui_1.3.0.201603142002.jar
MD5: 5cd8f8f8e410e9e4257b99ec865f2beb
SHA1: 14ea77f206c62e5bf877518fa3468c0cf7c1913b
File Path: C:\birt\plugins\org.eclipse.datatools.connectivity_1.13.0.201603142002.jar
MD5: 4dc98b3be5edcd93f66774c11d77cbe3
SHA1: bfe0b7f13d270af2069b2431a8a7a596fdf53352
File Path: C:\birt\plugins\org.eclipse.datatools.enablement.oda.ws_1.3.0.201603142002.jar
MD5: 0d7d66a1fa624e50ec4acb885cd08054
SHA1: 7c08c4a5c25ffc2eb5d4330accd91219061136f3
File Path: C:\birt\plugins\org.eclipse.datatools.enablement.oda.xml.ui_1.3.0.201603142002.jar
MD5: d2786383b6721930d567a2f343e0b333
SHA1: 2a84bfe19e21ddb0dc14c9c169be23e4e0c7e27f
File Path: C:\birt\plugins\org.eclipse.datatools.enablement.oda.xml_1.3.0.201603142002.jar
MD5: 2249322144358b39ed098fd37b3cb079
SHA1: dc985e73b95ec4d0dba3b75deb2d923ce8e17890
File Path: C:\birt\plugins\org.eclipse.datatools.help_1.6.0.201603142002.jar
MD5: 25ab902a88ef09fe4348102c1ffbf0e1
SHA1: 1f0a05d895478d2ed9769e8fee51800bb0e28b5a
File Path: C:\birt\plugins\org.eclipse.datatools.modelbase.dbdefinition_1.1.0.201603142002.jar
MD5: c06650cd6312fddd96f74719a30f8a05
SHA1: 74b503eaaa42a1f6d76dec0afc8fcfdce7fd67e1
File Path: C:\birt\plugins\org.eclipse.datatools.modelbase.sql_1.1.0.201603142002.jar
MD5: 623a2d50fc329720430d599a4ec01120
SHA1: a8dc0b4a7d959f118dc7a3fde70bf9076637a2e8
File Path: C:\birt\plugins\org.eclipse.datatools.oda.cshelp_1.2.0.201603142002.jar
MD5: bf63bcc3432348e0f9a48c843a735e0e
SHA1: bd8fc3f9b3b9a109fab7c9f434b4951e8b436699
File Path: C:\birt\plugins\org.eclipse.draw2d_3.10.100.201606061308.jar
MD5: bb071071a6642cf0416eb66673af7686
SHA1: a61731ecb76b724689895f1c39ed2016672b5509
File Path: C:\birt\plugins\org.eclipse.e4.core.commands_0.12.200.v20171212-1736.jar
MD5: d367cdb6aae8ee93d3623541bc2b2d2f
SHA1: 59da28ff901be2dc78ae3ff6b9c155285277421d
File Path: C:\birt\plugins\org.eclipse.e4.core.contexts_1.7.0.v20171213-1706.jar
MD5: 8f2c1de56eaaa63fe81ae2f558192590
SHA1: b2beecd2816ab2c061651eba4a62bf4598d00e0e
File Path: C:\birt\plugins\org.eclipse.e4.core.di.annotations_1.6.100.v20171130-1004.jar
MD5: 0e09708b4d31908149089bc75cfc65eb
SHA1: f19f5e7eae6c3519b0c1ff5c29ab86bca9472171
File Path: C:\birt\plugins\org.eclipse.e4.core.di.extensions.supplier_0.15.100.v20171130-1004.jar
MD5: 40ac1964735c8c61fd81c928d7245f97
SHA1: ab7541986b8e395e4fd7c8f4d1071715fbd98b32
File Path: C:\birt\plugins\org.eclipse.e4.core.di.extensions_0.15.100.v20171130-1004.jar
MD5: 3128a4db360f36b4b9cc4cd1a9f4ebea
SHA1: 1ea77407fad5136bb5aa55b033e93a79847d483a
File Path: C:\birt\plugins\org.eclipse.e4.core.di_1.7.0.v20180208-1451.jar
MD5: 31c4f25505f4b58b6f1c570962bb2755
SHA1: 27bfb79b200fbccd61fd337b79e8c3ba0fc9e353
File Path: C:\birt\plugins\org.eclipse.e4.core.services_2.1.100.v20171130-1004.jar
MD5: b7f070228445d5c6ea410ad8ac273421
SHA1: 884b4b9386f664954b5d1436c6d0cb985008c4f4
File Path: C:\birt\plugins\org.eclipse.e4.emf.xpath_0.2.100.v20171212-1736.jar
MD5: 00e6356bc05a2af2228a13db338694cf
SHA1: 928c78fead767797f8506f84cb3b283e4c873728
File Path: C:\birt\plugins\org.eclipse.e4.ui.bindings_0.12.100.v20171212-1736.jar
MD5: 034393dce70b963b1f69d99f43ec473b
SHA1: 173428aa6330c1f4dc29b84d29f25f786611c570
File Path: C:\birt\plugins\org.eclipse.e4.ui.css.core_0.12.200.v20180209-0329.jar
MD5: 95c9b6ddf2ec0e19b1392665b2990dd6
SHA1: c3a227ffc85930a6ccac2c7104ea88caa5c9c8cb
File Path: C:\birt\plugins\org.eclipse.e4.ui.css.swt.theme_0.12.0.v20180224-1102.jar
MD5: c3fe9ae2c7b76f948a947a464ac7ed29
SHA1: 252761fde6bf55d0161b53526fd2cb2427420dcb
File Path: C:\birt\plugins\org.eclipse.e4.ui.css.swt_0.13.100.v20180228-2008.jar
MD5: 9970af5cd4bdd795dec78f4fc06dc409
SHA1: 15379c2ba784bcb5c97c41a9ece374ff0cb1e3b7
File Path: C:\birt\plugins\org.eclipse.e4.ui.di_1.2.200.v20171212-1736.jar
MD5: 9c05a4ca5d8d42ad6896c6203e3e9194
SHA1: 2416efc06eccbd01a794887b893ee96b5502f44f
File Path: C:\birt\plugins\org.eclipse.e4.ui.model.workbench_2.1.0.v20180214-1653.jar
MD5: 72eaf06f42fc9d0ab5239d5c1a2a098a
SHA1: 6b1bb905cd12dc87790238333c707899210c703f
File Path: C:\birt\plugins\org.eclipse.e4.ui.services_1.3.100.v20171212-1736.jar
MD5: 6e88bfd0e19c57a9cc55bef5dbdd7845
SHA1: 67535a2bfd22a1611e8fa1d11ee24b025582620f
File Path: C:\birt\plugins\org.eclipse.e4.ui.widgets_1.2.100.v20171212-1736.jar
MD5: 0aab8ca3784752ba1afad3f13a021a69
SHA1: a0ce42a67377e8bc571b1100336f91a3e2118742
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in the Widgets extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via vectors involving base64 encoded content.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench.addons.swt_1.3.100.v20180201-1323.jar
MD5: 916c54801489c1e287a59f1d978f45b4
SHA1: c8b759d7baaeb23a5d1eb4e44acdb5f5e9807b38
File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench.renderers.swt_0.14.200.v20180219-0652.jar
MD5: 9764787ddfeb0bd67a3043376f68c643
SHA1: bdc07f443a3fd887f9c19f694dc452c9d6ad9344
File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench.swt_0.14.200.v20180129-1004.jar
MD5: f31562fab804b22f5954eb265f37bf1e
SHA1: 580240b54a448671113986a9e5a49536313acc6e
File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench3_0.14.100.v20171212-1736.jar
MD5: 531d2a681e115ae7b68483e7aea11e73
SHA1: d0543f8dd5fe5baa14e16d030b082686937d9423
File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench_1.6.0.v20180301-1316.jar
MD5: acf2aaf3645343ef15458cde57eeb140
SHA1: 57e6253a7d38a854a1b66f79ce843ee849311d11
File Path: C:\birt\plugins\org.eclipse.ecf.filetransfer_5.0.0.v20160817-1024.jar
MD5: 65da4c93b482db12dc72b4644008eec7
SHA1: dc9ae632d162dd92e62fffb00066d7e59951c201
File Path: C:\birt\plugins\org.eclipse.ecf.identity_3.8.0.v20161203-2153.jar
MD5: af40f444edef16e548755038cd2edb95
SHA1: a8902b8358cf142befd55a3514fded558f5bb6b1
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.ecf.provider.filetransfer.ssl_1.0.0.v20160817-1024.jar
MD5: 2465f3f27ae6627ffb23f8d8401cbeb4
SHA1: 9b2893ffb6a513065b5daaa9d920557550e3988f
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.ecf.provider.filetransfer_3.2.300.v20161203-1840.jar
MD5: 490e5775ebe93f1e361d00aefd00cd04
SHA1: 1cc4a67985fd23c43d9dff3cf9c3f30e8f86bb14
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.ecf.ssl_1.2.0.v20160817-1024.jar
MD5: 2b98e9a2d9a13a7018c10cb2a6399891
SHA1: c9ab7820796f458e6d0b6fca6cf85161175208b8
File Path: C:\birt\plugins\org.eclipse.ecf_3.8.0.v20170104-0657.jar
MD5: 1321b38ec21ebefa5f85b5d9ced6875d
SHA1: 6f32c14176fb208696afd7f276d6e22f22300052
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.emf.common_2.14.0.v20180308-1144.jar
MD5: 5816402c71c85b0882cd51594a2dafca
SHA1: 5def7e2caced794ce9baf99f1cbde8500a485bee
File Path: C:\birt\plugins\org.eclipse.emf.ecore.change_2.12.0.v20180125-1130.jar
MD5: 92c980706a53f163b5d7ccd1255c6023
SHA1: 985bd3522e4e6a07fe645ba4798136d5fdf8c6a1
File Path: C:\birt\plugins\org.eclipse.emf.ecore.xmi_2.14.0.v20180129-1548.jar
MD5: 3c00538d5a39f975977699f0b7ff0ce4
SHA1: 73a4542c504de770e8795d44197d8e0c63cd790a
File Path: C:\birt\plugins\org.eclipse.emf.ecore_2.14.0.v20180213-0937.jar
MD5: a84fd85fae44d4f6ae363093a710e094
SHA1: b5c0de39f9c619aa3b1379ce939a2066e701f956
File Path: C:\birt\plugins\org.eclipse.equinox.app_1.3.500.v20171221-2204.jar
MD5: 7dbd2734ffdd369a11a9582f019bb218
SHA1: 00b2dc328b287382ffe07391b7324e4682e2cff0
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-190 Integer Overflow or Wraparound
The mintToken function of a smart contract implementation for APP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.eclipse.equinox.common_3.10.0.v20180226-1734.jar
MD5: 67c311bcbef3d29c67532b9423119a12
SHA1: a376349ab831f9e6f47b0a8a223d28880dd637f1
File Path: C:\birt\plugins\org.eclipse.equinox.concurrent_1.1.100.v20171221-2204.jar
MD5: 965741c21b31bc6c97547405b90f021a
SHA1: a44696a8537f39a639df16fdc27895eaf21a834f
Description: This bundle provides support for OSGi Declarative Services
File Path: C:\birt\plugins\org.eclipse.equinox.ds_1.5.100.v20171221-2204.jar
MD5: f102d48b2e72d9c876f5b764753ee4e2
SHA1: 13df1340de7939b7f405dbc99b7b8b637c8d4529
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.equinox.event_1.4.200.v20180219-1443.jar
MD5: 34fa3a15cd6596d57bf0807b3ebff54a
SHA1: 5506cd4b59d940e31e6c3ca636a81d46e1ea703b
File Path: C:\birt\plugins\org.eclipse.equinox.frameworkadmin.equinox_1.1.0.v20180131-0638.jar
MD5: 403dc839ebeba2a3434aa3b76cf223d6
SHA1: 31529a2e3b4c345a138fcc74ad0ea2013518f5a6
File Path: C:\birt\plugins\org.eclipse.equinox.frameworkadmin_2.1.0.v20180131-0638.jar
MD5: 452fd779ab8f960c828a5502d6cdfed7
SHA1: f4a775fbb0987173b2892342136575608509f17e
File Path: C:\birt\plugins\org.eclipse.equinox.http.jetty_3.5.0.v20171221-2204.jar
MD5: d9c933839c8481ae4efba3697ad5f890
SHA1: 25edda071e2496e2cef491e0670e0ddb1585d1af
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure
Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
Vulnerable Software & Versions:
Severity:
High
CVSS Score: 7.5
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-19 Data Handling
In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
Vulnerable Software & Versions: (show all)
Severity:
High
CVSS Score: 7.5
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-284 Improper Access Control
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.equinox.http.registry_1.1.500.v20171221-2204.jar
MD5: 02758e41254aaae72b46e01b5e340cf0
SHA1: 6390604a37e3344548f6fcc8bc09332a3af613f1
File Path: C:\birt\plugins\org.eclipse.equinox.http.servlet_1.5.0.v20180122-1726.jar
MD5: 8f88a0d69cbb0673d99625b06e28c5ec
SHA1: 4656463b482b0951bb1ff64ebe03c5e38d40a5a2
File Path: C:\birt\plugins\org.eclipse.equinox.jsp.jasper_1.1.0.v20171221-2204.jar
MD5: 2f2d797a5fa624ddd674ba1b2349fb93
SHA1: 87004712fc5243e8332297fd0a10cb8f15fac422
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Heap-based buffer overflow in the jpc_dec_decodepkt function in jpc_t2dec.c in JasPer 2.0.10 allows remote attackers to have unspecified impact via a crafted image.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-125 Out-of-bounds Read
The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows remote attackers to cause a denial of service (invalid read) via a crafted image.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference
The jp2_cdef_destroy function in jp2_cod.c in JasPer before 2.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-190 Integer Overflow or Wraparound
Integer overflow in jas_image.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (application crash) via a crafted file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
The JPC_NOMINALGAIN function in jpc/jpc_t1cod.c in JasPer through 2.0.12 allows remote attackers to cause a denial of service (JPC_COX_RFT assertion failure) via unspecified vectors.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation
The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation
The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
The calcstepsizes function in jpc_dec.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation
The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound
Integer overflow in the jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.13 allows remote attackers to have unspecified impact via a crafted file, which triggers an assertion failure.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-190 Integer Overflow or Wraparound
Multiple integer overflows in the (1) jas_realloc function in base/jas_malloc.c and (2) mem_resize function in base/jas_stream.c in JasPer before 1.900.22 allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference
The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference
The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors
The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference
The jpc_dec_tilefini function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-415 Double Free
Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-369 Divide By Zero
The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-369 Divide By Zero
The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference
The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors
Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound
Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference
The jp2_colr_destroy function in jp2_cod.c in JasPer before 1.900.13 allows remote attackers to cause a denial of service (NULL pointer dereference) by leveraging incorrect cleanup of JP2 box data on error. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8887.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound
Integer overflow in the jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.12 allows remote attackers to have unspecified impact via a crafted image file, which triggers a heap-based buffer overflow.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference
The jpc_tsfb_synthesize function in jpc_tsfb.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) via vectors involving an empty sequence.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-416 Use After Free
Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
Vulnerable Software & Versions:
Severity:
High
CVSS Score: 7.5
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-189 Numeric Errors
Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
Vulnerable Software & Versions:
Severity:
High
CVSS Score: 7.5
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-189 Numeric Errors
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.700.v20180124-1426\eclipse_1702.dll
MD5: a99ee92b912b9cbcae989eeefcc1f34c
SHA1: 5b4d7f985d93784eb37da565d33fdd472a45da26
File Path: C:\birt\plugins\org.eclipse.equinox.launcher_1.5.0.v20180207-1446.jar
MD5: 3ee9bb77073b8adc05a5fa9387e1670a
SHA1: 4dda9168a69e3d5cfa9c45c286e973a1cb30b9d3
File Path: C:\birt\plugins\org.eclipse.equinox.p2.artifact.repository_1.2.0.v20180305-0540.jar
MD5: 323298f8ed9214779e149c780a2fa047
SHA1: 2b395942eeea66a0fb1bbb632ac6e9fa07009792
File Path: C:\birt\plugins\org.eclipse.equinox.p2.core_2.5.0.v20180302-1057.jar
MD5: add84661e9f88275be441e4de348d0fb
SHA1: 9d1c95875d2e5cc24fc894a23f9b5a19858cd57d
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.equinox.p2.director_2.4.0.v20180302-1057.jar
MD5: 36d4989adc82985f27b829a511cb2f4a
SHA1: f9ebd17854e362cc2dd30788bfe290acaa4c6a84
File Path: C:\birt\plugins\org.eclipse.equinox.p2.directorywatcher_1.2.0.v20180130-1836.jar
MD5: d3b8076f7d0fd1a110c935d652856e18
SHA1: ea54db0428d256a7f6628f5c3020bb5baf6e57ce
File Path: C:\birt\plugins\org.eclipse.equinox.p2.engine_2.6.0.v20180302-1057.jar
MD5: a8b96672f0e05673ca79b94cc215e003
SHA1: 018f42ce5e9618aa2838dac5d53048dde0c0e55a
File Path: C:\birt\plugins\org.eclipse.equinox.p2.extensionlocation_1.3.0.v20180103-0918.jar
MD5: 0b36e855a117c2135c6b914675915110
SHA1: 3a17f4342717c1ea21e2c42b1ce4462042bd0fb6
File Path: C:\birt\plugins\org.eclipse.equinox.p2.garbagecollector_1.1.0.v20180103-0918.jar
MD5: c575b05508de3c6f1c82b04da7ad4856
SHA1: e1146b179655eceedf58c84a2c4163ec70477d35
File Path: C:\birt\plugins\org.eclipse.equinox.p2.jarprocessor_1.1.0.v20180103-0918.jar
MD5: e7914cc948e94122be34707424b606d4
SHA1: d1a564c888efa811bcad4a2fc71b496feb7ed4d7
File Path: C:\birt\plugins\org.eclipse.equinox.p2.jarprocessor_1.1.0.v20180103-0918.jar\lib\jarprocessor-ant.jar
MD5: cf628b680f9ca533349ed5db1bf6906f
SHA1: 9bcad41eeb28cf39ad0f14a53365a7089cdb89d1
File Path: C:\birt\plugins\org.eclipse.equinox.p2.metadata.repository_1.3.0.v20180302-1057.jar
MD5: c3d3db3dea8a4579b8f5f4e98ec67eb7
SHA1: 635df1dd33affbeb9892ad966f4a82b7622f6f3e
File Path: C:\birt\plugins\org.eclipse.equinox.p2.metadata.repository_1.3.0.v20180302-1057.jar\ant_tasks\metadataRepository-ant.jar
MD5: 0497ec264656754b611ebd5963725d20
SHA1: d42f6d1cbc5ef0e636c81032688a9d08b21e464a
File Path: C:\birt\plugins\org.eclipse.equinox.p2.metadata_2.4.0.v20180305-1409.jar
MD5: c61e25ab1aba997d3f7f072ef8ae7110
SHA1: 7f877a6bfc7a5350eb04ec3bc7e64dc90a9f7a75
File Path: C:\birt\plugins\org.eclipse.equinox.p2.operations_2.5.0.v20180302-1057.jar
MD5: 010504239fc246f63a285f6faf1f0f1e
SHA1: 58962bcde47ec6f044fea807802db989772858f0
File Path: C:\birt\plugins\org.eclipse.equinox.p2.publisher.eclipse_1.3.0.v20180302-1057.jar
MD5: 9a82290d7f97c594bfa6a84dc7beb3f6
SHA1: 6ebedd5c0b8a6ce58c0a7b59fcea9ca9811e793e
File Path: C:\birt\plugins\org.eclipse.equinox.p2.publisher.eclipse_1.3.0.v20180302-1057.jar\ant_tasks\pdepublishing-ant.jar
MD5: eb1498a5f74c05e22506cae4b11a071c
SHA1: 74d5bef5c99b5452f1da38f156dc37716b26fda7
File Path: C:\birt\plugins\org.eclipse.equinox.p2.publisher_1.5.0.v20180305-0540.jar
MD5: c83c06bdf747d4f40dde23b269d608e8
SHA1: e822a7ede8e0e253015ea20d87c66e8f87ab19ba
File Path: C:\birt\plugins\org.eclipse.equinox.p2.reconciler.dropins_1.2.0.v20180302-1057.jar
MD5: f152d3a837b707d67193b6720f707aa8
SHA1: 3debbed3e02cdee3d97e36c52a6c13e2819c8137
File Path: C:\birt\plugins\org.eclipse.equinox.p2.repository.tools_2.2.0.v20180305-0540.jar
MD5: 4d6358bbf55f4ea4b311aa020c0ee85d
SHA1: d12257b3bcc91a0f47dbf260e79fdf2c9fceb435
File Path: C:\birt\plugins\org.eclipse.equinox.p2.repository.tools_2.2.0.v20180305-0540.jar\lib\repository-tools-ant.jar
MD5: 4b3db444979b274b6f41ae5f715682a7
SHA1: eca6c74f8c6eaaf7e298e7b887390ad794860ad7
File Path: C:\birt\plugins\org.eclipse.equinox.p2.repository_2.4.0.v20180302-1143.jar
MD5: adbaa19f4d98a0f4a877930472e8aae4
SHA1: 58b670243dbc6b77984046a6a2e8051d26159041
File Path: C:\birt\plugins\org.eclipse.equinox.p2.touchpoint.eclipse_2.2.0.v20180302-1057.jar
MD5: 91f998762667079a36e28e881c1b1fc1
SHA1: f8fe511601a702875c30641347af3907c22d2b19
File Path: C:\birt\plugins\org.eclipse.equinox.p2.touchpoint.natives_1.3.0.v20180130-1836.jar
MD5: 8ecd1d5f161f0e8b2b7568ef7b9fece3
SHA1: ce64ace8cc4e0728cb65fb2bf330c9922fdc6dd4
File Path: C:\birt\plugins\org.eclipse.equinox.p2.transport.ecf_1.2.0.v20180222-0922.jar
MD5: ed8f53b3908d4c890eac27755347318e
SHA1: 06e78575dad0dcc2fa309af844083c74a7ff25c3
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler_1.4.0.v20180302-1057.jar
MD5: d9360da2b3640859f9ea3c11af997ff9
SHA1: ca1de8d126764442296915c0f401e18aa0c2f0a2
File Path: C:\birt\plugins\org.eclipse.equinox.p2.ui.sdk_1.1.0.v20180103-0918.jar
MD5: 6b5d42ad553d052d501e00f95b864963
SHA1: 37028488d8baf1989f8fed36f0afb157addb8df9
File Path: C:\birt\plugins\org.eclipse.equinox.p2.ui_2.5.100.v20180302-1057.jar
MD5: 60cfbbec8431416c7eb48b4b2fc32835
SHA1: 732c2b409bb31890407ddefe41fcbbd31f7c90c1
File Path: C:\birt\plugins\org.eclipse.equinox.p2.updatechecker_1.2.0.v20180302-1057.jar
MD5: d5378684f5b028bd1becf49eb09c6491
SHA1: 54eedd5b7a5cb384fbf2de5dc65f0e6a3f88f6fb
File Path: C:\birt\plugins\org.eclipse.equinox.preferences_3.7.100.v20180223-1719.jar
MD5: c5950ccb0e5bb676db92bd998de318e7
SHA1: 30a99b20838996ec928c3b400a91f2ca7904c178
File Path: C:\birt\plugins\org.eclipse.equinox.registry_3.8.0.v20180228-1547.jar
MD5: f9e204d7e173bb70e4aaf4ba57881a18
SHA1: f7b9e52ab27b366f2c42172c6a05e93ba0741d40
File Path: C:\birt\plugins\org.eclipse.equinox.security.ui_1.2.0.v20171221-2204.jar
MD5: 1b9c93f6835b1c3fefb018399d58070c
SHA1: 21b7d3ec9b9e52c33f72ab44ef087f10ae99516a
File Path: C:\birt\plugins\org.eclipse.equinox.security_1.2.400.v20171221-2204.jar
MD5: fe534a9dd482bb3ac89d6aec3243874f
SHA1: 6c4862a7e3ed0833cb8e37e1ea8c409f31110a6f
File Path: C:\birt\plugins\org.eclipse.equinox.simpleconfigurator.manipulator_2.1.0.v20180103-0918.jar
MD5: a2a300ae036bc829308fd6f37e7fa294
SHA1: 54eb1135fb4e6f4553209c4b1f5cb294e76ad443
File Path: C:\birt\plugins\org.eclipse.equinox.simpleconfigurator_1.3.0.v20180119-2027.jar
MD5: e9f418c860858454464896c713a3ea2a
SHA1: 04c1570345bc4831e668d9696c1ba11a5bfc2c62
File Path: C:\birt\plugins\org.eclipse.gef_3.11.0.201606061308.jar
MD5: 7fd24e345da40c83486c7050435dd46e
SHA1: c02efd73f3ed9041719e3f78cfd9d97c61724f53
File Path: C:\birt\plugins\org.eclipse.help.base_4.2.200.v20180308-0630.jar
MD5: 21100684b1f6826ca005c99d1c804c56
SHA1: b6eba614234ba21c9434fc64dd3342d2d72ff353
File Path: C:\birt\plugins\org.eclipse.help.base_4.2.200.v20180308-0630.jar\ant_tasks\helpbase-ant.jar
MD5: 4b278187568f7aeefed29fa1ad79cebe
SHA1: f10b7a86d6318baf21a1aa0aafdbdd9d53d2b9d6
File Path: C:\birt\plugins\org.eclipse.help.ui_4.1.100.v20180131-1334.jar
MD5: ddd5caa865faceac0c2026394835b175
SHA1: 99e905f8f1fcaa19319d46b010eb85b317623a29
File Path: C:\birt\plugins\org.eclipse.help.webapp_3.9.100.v20171201-0704.jar
MD5: 13bf695d11637329de4a246d0aa38439
SHA1: 9d6e5be32f17c884cb73b98d1a6ddb867e96dfdb
File Path: C:\birt\plugins\org.eclipse.help_3.8.100.v20180117-0803.jar
MD5: b1acc29e2b8e1afcee748c01b6e44ee5
SHA1: 2ad214b7b9a83f54b27334d468bb8d4c1f2056fe
Description: Jetty module for Jetty :: IO Utility
License:
http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.phpFile Path: C:\birt\plugins\org.eclipse.jetty.io_9.4.8.v20171121.jar
Description: The jetty xml utilities.
License:
http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.phpFile Path: C:\birt\plugins\org.eclipse.jetty.xml_9.4.8.v20171121.jar
File Path: C:\birt\plugins\org.eclipse.jface.databinding_1.8.200.v20180129-1004.jar
MD5: 13df30727dfb3192bd887d550289eff2
SHA1: 1128286a1de74c2f410aa552120e73e97f11750a
File Path: C:\birt\plugins\org.eclipse.jface.text_3.13.0.v20180307-1059.jar
MD5: 9423ca4204d8f54ad8a6b5fe83e29f60
SHA1: 0a35533c19302157fe6b1ffd9f579a4311d13032
File Path: C:\birt\plugins\org.eclipse.jface_3.14.0.v20180302-0704.jar
MD5: 032fd9668ad5901fe7b50e5cfcf224fa
SHA1: 27f1f880fc69acc720c001ac7efe870cd44605a0
File Path: C:\birt\plugins\org.eclipse.ltk.core.refactoring_3.9.0.v20180220-2105.jar
MD5: d7c6d138d75d63cb236342ba77471f1c
SHA1: 25bfb9ebf5116a67962a64ed29b5a8e29b4ab613
File Path: C:\birt\plugins\org.eclipse.orbit.mongodb_3.2.2.v20170222-2110.jar
MD5: 4c85887ef0048c3cc23e76c0f3da8802
SHA1: a3a257e84816eccc47718511758bf2a37cb90368
Severity:
Low
CVSS Score: 1.9
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-255 Credentials Management
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.
Vulnerable Software & Versions: (show all)
Severity:
Low
CVSS Score: 2.1
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure
The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.
Vulnerable Software & Versions: (show all)
Severity:
Low
CVSS Score: 2.1
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-287 Improper Authentication
MongoDB on Red Hat Satellite 6 allows local users to bypass authentication by logging in with an empty password and delete information which can cause a Denial of Service.
Vulnerable Software & Versions:
Description: %osgiServicesDes
File Path: C:\birt\plugins\org.eclipse.osgi.services_3.7.0.v20180223-1712.jar
MD5: ae9dc223ec9fe198437f83d4f4442166
SHA1: 3af1cd8ae7b7def1f75caca8426f2f883711cef3
Description: %osgiUtilDes
File Path: C:\birt\plugins\org.eclipse.osgi.util_3.5.0.v20180219-1511.jar
MD5: 8599ee220e59e1f7899eea075e71c3a3
SHA1: 2a4a95a956dde4790668d25e5993472d60456b20
Description: %systemBundle
File Path: C:\birt\plugins\org.eclipse.osgi_3.13.0.v20180226-1711.jar
MD5: 83dc82d793d209074783f075455ab6d0
SHA1: 8f3ad90611b64d35429e2339787da34c652151ff
File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar
MD5: 3da318ccdf7df18219e337d18cb8c62d
SHA1: 55dd3e52dfa700e32c3e6ae61cb976ece6fcb6a6
File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar\swt-awt-win32-4860.dll
MD5: 22bf6261e7ca41c47505d66a38fd24fd
SHA1: db29d2105fcf6442498ef1fb1270fac441afb00f
File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar\swt-gdip-win32-4860.dll
MD5: 4fde24680dfa2ac4ccde24d8e01b493b
SHA1: d56b93c93fc33da371e2ecdf635eb6e7220bb78e
File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar\swt-wgl-win32-4860.dll
MD5: c03d0c9f451c562e724f769b8c0da5ed
SHA1: a05fbb65f34c645107bb80614d57cea6d6731986
File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar\swt-win32-4860.dll
MD5: 9759304e2cc294409f839ca4c6b2905a
SHA1: 1a35e21ab95eb69760b0b4156891c67434b91b46
File Path: C:\birt\plugins\org.eclipse.swt_3.107.0.v20180308-0607.jar
MD5: 0cd1bf2a5b483e540b06addc7a696e64
SHA1: d508f213d99fc4a49596350db837aa8703d2a583
File Path: C:\birt\plugins\org.eclipse.text_3.6.300.v20180302-0849.jar
MD5: fb329b43ddaa28f8ed382324dc219a8f
SHA1: f10745a522d4ad1a7cbbecc55e930ef2347c0dda
File Path: C:\birt\plugins\org.eclipse.ui.browser_3.6.200.v20180301-2011.jar
MD5: 9eed693cdbc9a25bc9cb06777f2fb2b3
SHA1: db2e19245c17bc27259d9b5ec7d80a4ce7efbdea
File Path: C:\birt\plugins\org.eclipse.ui.cheatsheets_3.5.200.v20171201-0704.jar
MD5: 1498c33e4385d6834d37c3d28b341aa5
SHA1: ad3e40a36270775f3434f4cc03b1bd38ce5bdcde
File Path: C:\birt\plugins\org.eclipse.ui.forms_3.7.200.v20180220-2000.jar
MD5: f3f1adf3184de286cd9fe472262a937f
SHA1: a8bc153ad5a20e6d19f83f6d2fff4fa2a95d0661
File Path: C:\birt\plugins\org.eclipse.ui.navigator_3.7.100.v20180127-2148.jar
MD5: b797c4d40f6b44ae0d7f6d35129f7969
SHA1: 4d7aafb8701096e5af8ad2d31e7b95452443ce5f
File Path: C:\birt\plugins\org.eclipse.ui.views_3.9.100.v20180228-1600.jar
MD5: 42a5154ebc481c209518fe294a1df653
SHA1: 94fb3b4d7a7cbb4fffe6a1f4c14e39a9ee1d51f1
File Path: C:\birt\plugins\org.eclipse.ui.workbench.texteditor_3.11.0.v20180222-0920.jar
MD5: db68191f996e1daad74aa6727f1e10e1
SHA1: 295a8b521616c31b1cf200fc006f1de8a299ce70
File Path: C:\birt\plugins\org.eclipse.ui.workbench_3.111.0.v20180302-1831.jar
MD5: 652a44bb058faddf277724e9aab9c473
SHA1: 1491cbe088f165d142333734948cbcc260e7ec65
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\org.eclipse.ui_3.109.100.v20180228-1600.jar
MD5: 1e17a7a79ac83047e9f4216e2eaec6c7
SHA1: 88301f344884b07167fe68321b4be873dc858c3d
File Path: C:\birt\plugins\org.eclipse.update.configurator_3.4.0.v20171211-1115.jar
MD5: 07124def355f59c8caaaaaa6c0d05d03
SHA1: 33789a53d64e9f31c3cc6898c7cad57844764322
File Path: C:\birt\plugins\org.mozilla.javascript_1.7.5.v201504281450.jar
MD5: 7c605a1b0b2d489aec7ed1b4f44ac26f
SHA1: dbd067fe2a3c4caec6326ec366b505b76fe73743
File Path: C:\birt\plugins\org.sat4j.core_2.3.5.v201308161310.jar
MD5: 797ce277f3dd2acb14f066fc1da203b9
SHA1: b692e87cf65442eff2125f48500ba7150ed7810d
File Path: C:\birt\plugins\org.sat4j.pb_2.3.5.v201404071733.jar
MD5: 76494edaecd18849bb6044f6bda5fc9e
SHA1: b3350e59a5e2a8a36b8c631b6e1cf0627cb2df78
File Path: C:\birt\plugins\org.tukaani.xz_1.8.0.v20180207-1613.jar
MD5: cdbc6c373260d18c753098881deab30f
SHA1: 0b50fc159568d334ff9c3a712cf6386d3038295d
Severity:
Medium
CVSS Score: 4.6
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation
scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.
Vulnerable Software & Versions:
File Path: C:\birt\plugins\org.w3c.css.sac_1.3.1.v200903091627.jar
MD5: 72902273245b11d21039de8c10398844
SHA1: 8a9501900c6ed5d6da577bf9e947011319c8e512
File Path: C:\birt\plugins\org.w3c.dom.events_3.0.0.draft20060413_v201105210656.jar
MD5: f78c10bd77b8c842cae88e8988378e23
SHA1: 381ff9d23c3d8d92b420ea84e22dbeb0c6fe20d4
File Path: C:\birt\plugins\org.w3c.dom.smil_1.0.1.v200903091627.jar
MD5: 3bc1ea6fc7920fbdb728dfcc58612479
SHA1: 752f7970735ab40b4af6f8be3266b17e468fea86
File Path: C:\birt\plugins\org.w3c.dom.svg.extension_1.1.0.v201803131913.jar
MD5: 8b851ff9d0cbd5e2b96460e04bcb8e64
SHA1: ad3fd8e6f0cefd3ea0029f2526dc503c0de0f272
File Path: C:\birt\plugins\org.w3c.dom.svg_1.1.0.v201011041433.jar
MD5: 82e4a20bab6cb9ca8324defc887bc8a6
SHA1: ea6041ad2cce77784d6b33e0ce01dacd4f545b28
File Path: C:\birt\plugins\org.w3c.sac_1.3.0.v201803131913\lib\flute.jar
MD5: a5655b62866e8beefa56cb0b9bb4abc4
SHA1: 9fd999a48fefad8c38951d50519f0668a3d107fb
Description:
The codec package contains simple encoder and decoders for
various formats such as Base64 and Hexadecimal. In addition to these
widely used encoders and decoders, the codec package also maintains a
collection of phonetic encoding utilities.
License:
http://www.apache.org/licenses/LICENSE-2.0.txtFile Path: C:\birt\plugins\uk.co.spudsoft.birt.emitters.excel_4.8.0.v201803131913\lib\commons-codec-1.5.jar
File Path: C:\birt\plugins\uk.co.spudsoft.birt.emitters.excel_4.8.0.v201803131913\lib\dom4j-1.6.1.jar
MD5: 252d2b4dea63a9f795832dadb409e1f4
SHA1: 9ef47b4f0ca34117e3b28600ad042200483c8201
Severity:
Medium
CVSS Score: 6.4
(AV:N/AC:L/Au:N/C:N/I:P/A:P)
CWE: CWE-91 XML Injection (aka Blind XPath Injection)
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\uk.co.spudsoft.birt.emitters.excel_4.8.0.v201803131913\lib\poi-ooxml-3.9-20121203.jar
MD5: acd566068cdbee11ce9f8aacef8b9f0d
SHA1: 4d4a5ca6603ade790b8c133595db268a16c4ae20
Severity:
High
CVSS Score: 7.1
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
Vulnerable Software & Versions:
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Vulnerable Software & Versions: (show all)
Severity:
Medium
CVSS Score: 4.3
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Vulnerable Software & Versions: (show all)
File Path: C:\birt\plugins\uk.co.spudsoft.birt.emitters.excel_4.8.0.v201803131913\lib\xmlbeans-2.3.0.jar
MD5: fe76fc5187474d83be998901ab5a1462
SHA1: b0ec90720c0127ca98664a79575e4c8238dde27e