Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: google group | github issues

Project: BIRT 4.8

Scan Information (show all):

Display: Showing Vulnerable Dependencies (click to show all)

Dependency CPE GAV Highest Severity CVE Count CPE Confidence Evidence Count
com.ibm.icu_58.2.0.v20170418-1837.jar org.eclipse.orbit.bundles:com.ibm.icu:58.2.0-SNAPSHOT   0 16
com.lowagie.text_2.1.7.v201004222200.jar   0 9
javax.el_2.2.0.v201303151357.jar   0 8
javax.inject_1.0.0.v20091030.jar   0 8
javax.servlet.jsp_2.2.0.v201112011158.jar   0 9
javax.servlet_3.1.0.v201410161800.jar   0 16
javax.transaction_1.1.1.v201105210645.jar org.apache.geronimo.specs:geronimo-jta_1.1_spec:1.1.1   0 12
javax.wsdl_1.6.2.v201012040545.jar   0 14
jaxrpc.jar   0 5
javax.xml.stream_1.0.1.v201004272200.jar   0 9
javax.xml_1.3.4.v201005080400.jar   0 8
axis.jar cpe:/a:apache:axis:1.4 Medium 3 MEDIUM 6
org.apache.batik.css_1.7.0.v201011041433.jar cpe:/a:apache:batik:1.7 High 3 HIGH 15
org.apache.batik.css_1.9.0.v20170908-1305.jar cpe:/a:apache:batik:1.9 org.eclipse.orbit.bundles:org.apache.batik.css:1.9.0-SNAPSHOT High 1 HIGHEST 15
org.apache.batik.dom_1.7.1.v201505191845.jar cpe:/a:apache:batik:1.7.1 High 2 HIGH 14
org.apache.batik.ext.awt.extension_1.7.0.v201803131913.jar cpe:/a:apache:batik:1.7.0.v20180313 High 1 LOW 8
org.apache.batik.i18n_1.9.0.v20170906-1841.jar cpe:/a:apache:batik:1.9 org.eclipse.orbit.bundles:org.apache.batik.i18n:1.9.0-SNAPSHOT High 1 HIGHEST 15
org.apache.batik.util.gui_1.7.0.v200903091627.jar cpe:/a:apache:batik:1.7 High 3 HIGH 14
org.apache.commons.codec_1.9.0.v20170208-1614.jar org.eclipse.orbit.bundles:org.apache.commons.codec:1.9.0-SNAPSHOT   0 20
commons-discovery-0.2.jar   0 9
org.apache.commons.jxpath_1.3.0.v200911051830.jar   0 10
org.apache.commons.logging_1.1.1.v201101211721.jar   0 10
org.apache.derby_10.11.1.1_v201605202053.jar cpe:/a:apache:derby:10.11.1.1.v20160520   0 LOW 9
org.apache.felix.scr_2.0.14.v20180117-1452.jar   0 14
org.apache.jasper.glassfish_2.2.2.v201501141630.jar cpe:/a:jasper_project:jasper:2.2.2.v20150114   0 LOW 13
org.apache.lucene.analysis_3.5.0.v20120725-1805.jar   0 16
org.apache.lucene.analyzers-common_7.1.0.v20180122-2126.jar org.eclipse.orbit.bundles:org.apache.lucene.analyzers-common:7.1.0-SNAPSHOT   0 22
org.apache.lucene.analyzers-smartcn_7.1.0.v20180122-2126.jar org.eclipse.orbit.bundles:org.apache.lucene.analyzers-smartcn:7.1.0-SNAPSHOT   0 22
org.apache.lucene.core_3.5.0.v20120725-1805.jar   0 14
org.apache.lucene.core_7.1.0.v20171214-1510.jar org.eclipse.orbit.bundles:org.apache.lucene.core:7.1.0-SNAPSHOT   0 20
org.apache.poi_3.9.0.v201405241750.jar cpe:/a:apache:poi:3.9.0.v20140524 High 5 LOW 8
org.apache.xerces_2.9.0.v201101211617.jar   0 9
org.apache.xml.resolver_1.2.0.v201005080400.jar   0 9
org.apache.xml.serializer_2.7.1.v201005080400.jar   0 9
org.eclipse.birt.chart.device.pdf_4.8.0.v201803131913.jar: fop-2.1.jar   0 9
org.eclipse.birt.core_4.8.0.v201803131913.jar cpe:/a:eclipse:birt:4.8.0.v20180313   0 LOW 10
org.eclipse.birt.data.oda.mongodb_4.8.0.v201803131913.jar cpe:/a:eclipse:birt:4.8.0.v20180313
cpe:/a:mongodb:mongodb:4.8.0.v20180313
Low 2 LOW 11
cassandra-thrift-1.1.0.jar cpe:/a:apache:cassandra:1.1.0
cpe:/a:apache:thrift:1.1.0
  0 LOW 8
commons-lang-2.4.jar commons-lang:commons-lang:2.4   0 20
guava-r09.jar cpe:/a:google:guava:- com.google.guava:guava:r09   0 LOW 14
hector-core-1.1-2.jar org.hectorclient:hector-core:1.1-2   0 11
libthrift-0.7.0.jar cpe:/a:apache:thrift:0.7.0 High 2 LOW 5
slf4j-api-1.6.1.jar cpe:/a:slf4j:slf4j:1.6.1 org.slf4j:slf4j-api:1.6.1   0 LOW 16
org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar: dom4j-1.6.1.jar cpe:/a:dom4j_project:dom4j:1.6.1 Medium 1 HIGHEST 9
org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar: xmlbeans-2.3.0.jar   0 8
org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar: poi-ooxml-3.9-20121203.jar cpe:/a:apache:poi:3.9 High 6 HIGH 11
oda-jdbc.jar cpe:/a:eclipse:birt:- Medium 1 LOW 5
BirtSample.jar   0 1
sampledb.jar cpe:/a:eclipse:birt:- Medium 1 LOW 5
org.eclipse.birt.report.designer.ui.views_4.8.0.v201803131913.jar cpe:/a:eclipse:birt:4.8.0.v20180313
cpe:/a:views_project:views:4.8.0.v20180313
  0 LOW 11
org.eclipse.birt.report.engine_4.8.0.v201803131913.jar: commons-cli-1.0.jar   0 9
org.eclipse.birt.report.engine_4.8.0.v201803131913.jar: Tidy.jar cpe:/a:html-tidy:tidy:- net.sf.jtidy:jtidy:r938   0 LOW 11
jsp.jar   0 5
viewservlets.jar cpe:/a:eclipse:birt:- Medium 1 LOW 4
viewer.jar cpe:/a:eclipse:birt:- Medium 1 LOW 5
org.eclipse.compare.core_3.6.200.v20171212-0901.jar   0 10
org.eclipse.core.commands_3.9.100.v20180219-1020.jar   0 11
org.eclipse.core.contenttype_3.7.0.v20171130-1004.jar   0 12
org.eclipse.core.databinding.observable_1.6.200.v20171212-1736.jar   0 12
org.eclipse.core.databinding.property_1.6.200.v20171212-1736.jar cpe:/a:property_pro:property_pro:1.6.200.v20171212   0 LOW 12
org.eclipse.core.databinding_1.6.200.v20180207-1113.jar   0 12
org.eclipse.core.expressions_3.6.100.v20171130-1004.jar   0 12
org.eclipse.core.filebuffers_3.6.200.v20171212-0901.jar   0 12
org.eclipse.core.filesystem_1.7.100.v20180304-1102.jar   0 12
org.eclipse.core.jobs_3.10.0.v20180221-0910.jar   0 12
org.eclipse.core.net_1.3.200.v20180207-1711.jar   0 12
org.eclipse.core.resources_3.13.0.v20180304-1800.jar   0 12
org.eclipse.core.resources_3.13.0.v20180304-1800.jar: resources-ant.jar   0 5
org.eclipse.core.runtime_3.14.0.v20180220-2036.jar   0 11
org.eclipse.core.variables_3.4.100.v20171201-0724.jar   0 12
org.eclipse.datatools.connectivity.db.generic_1.1.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity.oda.consumer_3.3.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity.oda.design.ui_3.3.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity.oda.design_3.4.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity.oda.flatfile.ui_3.2.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity.oda.flatfile_3.2.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity.oda.profile_3.3.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity.oda_3.5.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity.sqm.core_1.3.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity.ui_1.3.0.201603142002.jar   0 11
org.eclipse.datatools.connectivity_1.13.0.201603142002.jar   0 10
org.eclipse.datatools.enablement.oda.ws_1.3.0.201603142002.jar cpe:/a:ws_project:ws:1.3.0.201603   0 LOW 11
org.eclipse.datatools.enablement.oda.xml.ui_1.3.0.201603142002.jar   0 11
org.eclipse.datatools.enablement.oda.xml_1.3.0.201603142002.jar   0 11
org.eclipse.datatools.help_1.6.0.201603142002.jar   0 10
org.eclipse.datatools.modelbase.dbdefinition_1.1.0.201603142002.jar   0 11
org.eclipse.datatools.modelbase.sql_1.1.0.201603142002.jar   0 11
org.eclipse.datatools.oda.cshelp_1.2.0.201603142002.jar   0 7
org.eclipse.draw2d_3.10.100.201606061308.jar org.eclipse.draw2d.plugins:org.eclipse.draw2d:3.10.100-SNAPSHOT   0 13
org.eclipse.e4.core.commands_0.12.200.v20171212-1736.jar   0 12
org.eclipse.e4.core.contexts_1.7.0.v20171213-1706.jar   0 11
org.eclipse.e4.core.di.annotations_1.6.100.v20171130-1004.jar   0 11
org.eclipse.e4.core.di.extensions.supplier_0.15.100.v20171130-1004.jar   0 13
org.eclipse.e4.core.di.extensions_0.15.100.v20171130-1004.jar   0 11
org.eclipse.e4.core.di_1.7.0.v20180208-1451.jar   0 12
org.eclipse.e4.core.services_2.1.100.v20171130-1004.jar   0 14
org.eclipse.e4.emf.xpath_0.2.100.v20171212-1736.jar   0 12
org.eclipse.e4.ui.bindings_0.12.100.v20171212-1736.jar   0 12
org.eclipse.e4.ui.css.core_0.12.200.v20180209-0329.jar   0 12
org.eclipse.e4.ui.css.swt.theme_0.12.0.v20180224-1102.jar   0 14
org.eclipse.e4.ui.css.swt_0.13.100.v20180228-2008.jar   0 12
org.eclipse.e4.ui.di_1.2.200.v20171212-1736.jar   0 13
org.eclipse.e4.ui.model.workbench_2.1.0.v20180214-1653.jar   0 12
org.eclipse.e4.ui.services_1.3.100.v20171212-1736.jar   0 14
org.eclipse.e4.ui.widgets_1.2.100.v20171212-1736.jar cpe:/a:widgets_project:widgets:1.2.100.v20171212 Medium 1 LOW 12
org.eclipse.e4.ui.workbench.addons.swt_1.3.100.v20180201-1323.jar   0 12
org.eclipse.e4.ui.workbench.renderers.swt_0.14.200.v20180219-0652.jar   0 12
org.eclipse.e4.ui.workbench.swt_0.14.200.v20180129-1004.jar   0 14
org.eclipse.e4.ui.workbench3_0.14.100.v20171212-1736.jar   0 11
org.eclipse.e4.ui.workbench_1.6.0.v20180301-1316.jar   0 14
org.eclipse.ecf.filetransfer_5.0.0.v20160817-1024.jar cpe:/a:file-transfer:file_transfer:5.0.0.v20160817 org.eclipse.ecf:org.eclipse.ecf.filetransfer:5.0.0-SNAPSHOT   0 LOW 12
org.eclipse.ecf.identity_3.8.0.v20161203-2153.jar cpe:/a:eclipse:eclipse_ide:3.8.0.v20161203 org.eclipse.ecf:org.eclipse.ecf.identity:3.8.0-SNAPSHOT Medium 1 LOW 15
org.eclipse.ecf.provider.filetransfer.ssl_1.0.0.v20160817-1024.jar cpe:/a:eclipse:eclipse_ide:1.0 org.eclipse.ecf:org.eclipse.ecf.provider.filetransfer.ssl:1.0.0-SNAPSHOT Medium 2 HIGHEST 12
org.eclipse.ecf.provider.filetransfer_3.2.300.v20161203-1840.jar cpe:/a:eclipse:eclipse_ide:3.2.300.v20161203 org.eclipse.ecf:org.eclipse.ecf.provider.filetransfer:3.2.300-SNAPSHOT Medium 2 LOW 12
org.eclipse.ecf.ssl_1.2.0.v20160817-1024.jar org.eclipse.ecf:org.eclipse.ecf.ssl:1.2.0-SNAPSHOT   0 12
org.eclipse.ecf_3.8.0.v20170104-0657.jar cpe:/a:eclipse:eclipse_ide:3.8.0.v20170104 org.eclipse.ecf:org.eclipse.ecf:3.8.0-SNAPSHOT Medium 1 LOW 14
org.eclipse.emf.common_2.14.0.v20180308-1144.jar org.eclipse.emf:org.eclipse.emf.common:2.14.0-SNAPSHOT   0 14
org.eclipse.emf.ecore.change_2.12.0.v20180125-1130.jar org.eclipse.emf:org.eclipse.emf.ecore.change:2.12.0-SNAPSHOT   0 14
org.eclipse.emf.ecore.xmi_2.14.0.v20180129-1548.jar org.eclipse.emf:org.eclipse.emf.ecore.xmi:2.14.0-SNAPSHOT   0 14
org.eclipse.emf.ecore_2.14.0.v20180213-0937.jar org.eclipse.emf:org.eclipse.emf.ecore:2.14.0-SNAPSHOT   0 14
org.eclipse.equinox.app_1.3.500.v20171221-2204.jar cpe:/a:app_project:app:1.3.500.v20171221 Medium 1 LOW 15
org.eclipse.equinox.common_3.10.0.v20180226-1734.jar   0 12
org.eclipse.equinox.concurrent_1.1.100.v20171221-2204.jar   0 11
org.eclipse.equinox.ds_1.5.100.v20171221-2204.jar cpe:/a:eclipse:eclipse_ide:1.5.100.v20171221 Medium 2 LOW 13
org.eclipse.equinox.event_1.4.200.v20180219-1443.jar cpe:/a:event_list_project:event_list:1.4.200.v20180219   0 LOW 13
org.eclipse.equinox.frameworkadmin.equinox_1.1.0.v20180131-0638.jar   0 12
org.eclipse.equinox.frameworkadmin_2.1.0.v20180131-0638.jar   0 12
org.eclipse.equinox.http.jetty_3.5.0.v20171221-2204.jar cpe:/a:eclipse:jetty:3.5.0.v20171221
cpe:/a:jetty:jetty:3.5.0.v20171221
High 4 LOW 13
org.eclipse.equinox.http.registry_1.1.500.v20171221-2204.jar   0 11
org.eclipse.equinox.http.servlet_1.5.0.v20180122-1726.jar   0 14
org.eclipse.equinox.jsp.jasper_1.1.0.v20171221-2204.jar cpe:/a:jasper_project:jasper:1.1.0.v20171221 High 35 LOW 11
eclipse_1702.dll   0 2
org.eclipse.equinox.launcher_1.5.0.v20180207-1446.jar   0 10
org.eclipse.equinox.p2.artifact.repository_1.2.0.v20180305-0540.jar   0 13
org.eclipse.equinox.p2.core_2.5.0.v20180302-1057.jar cpe:/a:eclipse:eclipse_ide:2.0 Medium 2 MEDIUM 13
org.eclipse.equinox.p2.director_2.4.0.v20180302-1057.jar   0 13
org.eclipse.equinox.p2.directorywatcher_1.2.0.v20180130-1836.jar   0 12
org.eclipse.equinox.p2.engine_2.6.0.v20180302-1057.jar   0 13
org.eclipse.equinox.p2.extensionlocation_1.3.0.v20180103-0918.jar   0 12
org.eclipse.equinox.p2.garbagecollector_1.1.0.v20180103-0918.jar   0 13
org.eclipse.equinox.p2.jarprocessor_1.1.0.v20180103-0918.jar   0 12
org.eclipse.equinox.p2.jarprocessor_1.1.0.v20180103-0918.jar: jarprocessor-ant.jar   0 5
org.eclipse.equinox.p2.metadata.repository_1.3.0.v20180302-1057.jar   0 13
org.eclipse.equinox.p2.metadata.repository_1.3.0.v20180302-1057.jar: metadataRepository-ant.jar   0 5
org.eclipse.equinox.p2.metadata_2.4.0.v20180305-1409.jar   0 12
org.eclipse.equinox.p2.operations_2.5.0.v20180302-1057.jar   0 12
org.eclipse.equinox.p2.publisher.eclipse_1.3.0.v20180302-1057.jar   0 12
org.eclipse.equinox.p2.publisher.eclipse_1.3.0.v20180302-1057.jar: pdepublishing-ant.jar   0 5
org.eclipse.equinox.p2.publisher_1.5.0.v20180305-0540.jar   0 12
org.eclipse.equinox.p2.reconciler.dropins_1.2.0.v20180302-1057.jar   0 12
org.eclipse.equinox.p2.repository.tools_2.2.0.v20180305-0540.jar   0 12
org.eclipse.equinox.p2.repository.tools_2.2.0.v20180305-0540.jar: repository-tools-ant.jar   0 5
org.eclipse.equinox.p2.repository_2.4.0.v20180302-1143.jar   0 13
org.eclipse.equinox.p2.touchpoint.eclipse_2.2.0.v20180302-1057.jar   0 12
org.eclipse.equinox.p2.touchpoint.natives_1.3.0.v20180130-1836.jar   0 12
org.eclipse.equinox.p2.transport.ecf_1.2.0.v20180222-0922.jar cpe:/a:eclipse:eclipse_ide:2.0 Medium 2 MEDIUM 13
org.eclipse.equinox.p2.ui.sdk.scheduler_1.4.0.v20180302-1057.jar   0 12
org.eclipse.equinox.p2.ui.sdk_1.1.0.v20180103-0918.jar   0 13
org.eclipse.equinox.p2.ui_2.5.100.v20180302-1057.jar   0 13
org.eclipse.equinox.p2.updatechecker_1.2.0.v20180302-1057.jar   0 12
org.eclipse.equinox.preferences_3.7.100.v20180223-1719.jar   0 16
org.eclipse.equinox.registry_3.8.0.v20180228-1547.jar   0 14
org.eclipse.equinox.security.ui_1.2.0.v20171221-2204.jar   0 12
org.eclipse.equinox.security_1.2.400.v20171221-2204.jar   0 11
org.eclipse.equinox.simpleconfigurator.manipulator_2.1.0.v20180103-0918.jar   0 13
org.eclipse.equinox.simpleconfigurator_1.3.0.v20180119-2027.jar   0 11
org.eclipse.gef_3.11.0.201606061308.jar org.eclipse.gef.plugins:org.eclipse.gef:3.11.0-SNAPSHOT   0 12
org.eclipse.help.base_4.2.200.v20180308-0630.jar   0 11
org.eclipse.help.base_4.2.200.v20180308-0630.jar: helpbase-ant.jar   0 5
org.eclipse.help.ui_4.1.100.v20180131-1334.jar   0 12
org.eclipse.help.webapp_3.9.100.v20171201-0704.jar   0 12
org.eclipse.help_3.8.100.v20180117-0803.jar   0 11
org.eclipse.jetty.io_9.4.8.v20171121.jar org.eclipse.jetty:jetty-io:9.4.8.v20171121   0 20
org.eclipse.jetty.xml_9.4.8.v20171121.jar cpe:/a:eclipse:jetty:9.4.8.v20171121
cpe:/a:jetty:jetty:9.4.8.v20171121
org.eclipse.jetty:jetty-xml:9.4.8.v20171121   0 LOW 21
org.eclipse.jface.databinding_1.8.200.v20180129-1004.jar   0 12
org.eclipse.jface.text_3.13.0.v20180307-1059.jar   0 11
org.eclipse.jface_3.14.0.v20180302-0704.jar   0 10
org.eclipse.ltk.core.refactoring_3.9.0.v20180220-2105.jar   0 12
org.eclipse.orbit.mongodb_3.2.2.v20170222-2110.jar cpe:/a:mongodb:mongodb:3.2.2 org.eclipse.orbit.bundles:org.eclipse.orbit.mongodb:3.2.2-SNAPSHOT Low 3 HIGHEST 14
org.eclipse.osgi.services_3.7.0.v20180223-1712.jar   0 11
org.eclipse.osgi.util_3.5.0.v20180219-1511.jar   0 12
org.eclipse.osgi_3.13.0.v20180226-1711.jar   0 13
org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar   0 9
org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar: swt-awt-win32-4860.dll   0 2
org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar: swt-gdip-win32-4860.dll   0 2
org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar: swt-wgl-win32-4860.dll   0 2
org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar: swt-win32-4860.dll   0 2
org.eclipse.swt_3.107.0.v20180308-0607.jar   0 7
org.eclipse.text_3.6.300.v20180302-0849.jar   0 11
org.eclipse.ui.browser_3.6.200.v20180301-2011.jar   0 12
org.eclipse.ui.cheatsheets_3.5.200.v20171201-0704.jar   0 12
org.eclipse.ui.forms_3.7.200.v20180220-2000.jar   0 11
org.eclipse.ui.navigator_3.7.100.v20180127-2148.jar   0 12
org.eclipse.ui.views_3.9.100.v20180228-1600.jar cpe:/a:views_project:views:3.9.100.v20180228   0 LOW 12
org.eclipse.ui.workbench.texteditor_3.11.0.v20180222-0920.jar   0 11
org.eclipse.ui.workbench_3.111.0.v20180302-1831.jar cpe:/a:eclipse:eclipse_ide:3.111.0.v20180302 Medium 1 LOW 13
org.eclipse.ui_3.109.100.v20180228-1600.jar   0 11
org.eclipse.update.configurator_3.4.0.v20171211-1115.jar   0 13
org.mozilla.javascript_1.7.5.v201504281450.jar   0 8
org.sat4j.core_2.3.5.v201308161310.jar   0 12
org.sat4j.pb_2.3.5.v201404071733.jar   0 14
org.tukaani.xz_1.8.0.v20180207-1613.jar cpe:/a:tukaani:xz:1.8.0 org.eclipse.orbit.bundles:org.tukaani.xz:1.8.0-SNAPSHOT Medium 1 LOW 16
org.w3c.css.sac_1.3.1.v200903091627.jar   0 9
org.w3c.dom.events_3.0.0.draft20060413_v201105210656.jar   0 9
org.w3c.dom.smil_1.0.1.v200903091627.jar   0 9
org.w3c.dom.svg.extension_1.1.0.v201803131913.jar   0 8
org.w3c.dom.svg_1.1.0.v201011041433.jar   0 10
flute.jar   0 5
commons-codec-1.5.jar commons-codec:commons-codec:1.5   0 20
dom4j-1.6.1.jar cpe:/a:dom4j_project:dom4j:1.6.1 Medium 1 HIGHEST 9
poi-ooxml-3.9-20121203.jar cpe:/a:apache:poi:3.9 High 6 HIGH 11
xmlbeans-2.3.0.jar   0 8

Dependencies

com.ibm.icu_58.2.0.v20170418-1837.jar

File Path: C:\birt\plugins\com.ibm.icu_58.2.0.v20170418-1837.jar
MD5: dc83dd159fafba582632b2b794ceed19
SHA1: 64476e506372c6650984155f8ba768042a921a44

Identifiers

  • maven: org.eclipse.orbit.bundles:com.ibm.icu:58.2.0-SNAPSHOT   Confidence:HIGH

com.lowagie.text_2.1.7.v201004222200.jar

File Path: C:\birt\plugins\com.lowagie.text_2.1.7.v201004222200.jar
MD5: b909b403c215b9b173da3baccc3509ed
SHA1: 901bfb4fa0b2b4e6fb163a953070adb006335a54

Identifiers

  • None

javax.el_2.2.0.v201303151357.jar

File Path: C:\birt\plugins\javax.el_2.2.0.v201303151357.jar
MD5: dbc79afd49407c5598a411cfb3543cf2
SHA1: 0f59178deb403418dc3fb0c59e93a1769e409130

Identifiers

  • None

javax.inject_1.0.0.v20091030.jar

File Path: C:\birt\plugins\javax.inject_1.0.0.v20091030.jar
MD5: 508774113f4ecc361d7a7ec5dc93c737
SHA1: bf39840bc3bc7fa50a0d5ab4fea74bc00e89f952

Identifiers

  • None

javax.servlet.jsp_2.2.0.v201112011158.jar

File Path: C:\birt\plugins\javax.servlet.jsp_2.2.0.v201112011158.jar
MD5: cdaf37764ecda0ae846a16465ce34ffa
SHA1: 0d12ed9e52f9cb25e5e1f0c49dfa4dee2ff845ce

Identifiers

  • None

javax.servlet_3.1.0.v201410161800.jar

Description: %bundleDescription

File Path: C:\birt\plugins\javax.servlet_3.1.0.v201410161800.jar
MD5: f3472e3186b7f84cdc4996d42c727eab
SHA1: e0e698d1be57aaef38e54428f5c09c7fe0cf594e

Identifiers

  • None

javax.transaction_1.1.1.v201105210645.jar

Description: Provides open-source implementations of Sun specifications.

File Path: C:\birt\plugins\javax.transaction_1.1.1.v201105210645.jar
MD5: 658b3a59ec07d0a37890c6c06de118df
SHA1: 0fbf758105fcd3212cc8da35debb4dd4a0028752

Identifiers

  • maven: org.apache.geronimo.specs:geronimo-jta_1.1_spec:1.1.1   Confidence:HIGH

javax.wsdl_1.6.2.v201012040545.jar

File Path: C:\birt\plugins\javax.wsdl_1.6.2.v201012040545.jar
MD5: fb444d40fea978eb2bc53114037cefee
SHA1: f4cb5ae5b298e41a056c3d29c292a1128cc16b9a

Identifiers

  • None

jaxrpc.jar

File Path: C:\birt\plugins\javax.xml.rpc_1.1.0.v201209140446\lib\jaxrpc.jar
MD5: b4592e5eccfeeeae87cfadef0ca66c66
SHA1: b393f1f0c0d95b68c86d0b1ab2e687bb71f3c075

Identifiers

  • None

javax.xml.stream_1.0.1.v201004272200.jar

File Path: C:\birt\plugins\javax.xml.stream_1.0.1.v201004272200.jar
MD5: 8ec99d6a4b070c3e11d68ec218aa323b
SHA1: 80a28be3fa17b4c5a0dac56d53c31665765f2920

Identifiers

  • None

javax.xml_1.3.4.v201005080400.jar

File Path: C:\birt\plugins\javax.xml_1.3.4.v201005080400.jar
MD5: 7f7c93e568d12d93268300aa85060dd1
SHA1: 2c04a38e2b05f5ee4ca2556906c10c162fcabd06

Identifiers

  • None

axis.jar

File Path: C:\birt\plugins\org.apache.axis_1.4.0.v201411182030\lib\axis.jar
MD5: 03dcfdd88502505cc5a805a128bfdd8d
SHA1: 94a9ce681a42d0352b3ad22659f67835e560d107

Identifiers

CVE-2018-8032  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.

Vulnerable Software & Versions: (show all)

CVE-2014-3596  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Vulnerable Software & Versions: (show all)

CVE-2012-5784  

Severity: Medium
CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CWE: CWE-20 Improper Input Validation

Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Vulnerable Software & Versions: (show all)

org.apache.batik.css_1.7.0.v201011041433.jar

File Path: C:\birt\plugins\org.apache.batik.css_1.7.0.v201011041433.jar
MD5: 59805d01c5b30652b766971c2b8770aa
SHA1: e32386221b6a4bc7bd9ba3a73bafb56fc85ca373

Identifiers

CVE-2018-8013  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

Vulnerable Software & Versions: (show all)

CVE-2017-5662  

Severity: High
CVSS Score: 7.9 (AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

Vulnerable Software & Versions:

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

org.apache.batik.css_1.9.0.v20170908-1305.jar

File Path: C:\birt\plugins\org.apache.batik.css_1.9.0.v20170908-1305.jar
MD5: 574212e5c4e3f113361122f8c74e1da9
SHA1: 96a2cb4b9ad9a8014695550e1df5efde015eb6a1

Identifiers

  • cpe: cpe:/a:apache:batik:1.9   Confidence:HIGHEST   
  • maven: org.eclipse.orbit.bundles:org.apache.batik.css:1.9.0-SNAPSHOT   Confidence:HIGH

CVE-2018-8013  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

Vulnerable Software & Versions: (show all)

org.apache.batik.dom_1.7.1.v201505191845.jar

File Path: C:\birt\plugins\org.apache.batik.dom_1.7.1.v201505191845.jar
MD5: 60277dbbc8078dfcf910d6aa41c080e5
SHA1: ca2a04a5be488d7d23a84e4b4aa0740047a4c37a

Identifiers

CVE-2018-8013  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

Vulnerable Software & Versions: (show all)

CVE-2017-5662  

Severity: High
CVSS Score: 7.9 (AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

Vulnerable Software & Versions:

org.apache.batik.ext.awt.extension_1.7.0.v201803131913.jar

File Path: C:\birt\plugins\org.apache.batik.ext.awt.extension_1.7.0.v201803131913.jar
MD5: ad6278859d1d514e7108e329d39bda61
SHA1: 74b500a7e47198195021d6ca828f0e063afc7201

Identifiers

  • cpe: cpe:/a:apache:batik:1.7.0.v20180313   Confidence:LOW   

CVE-2017-5662  

Severity: High
CVSS Score: 7.9 (AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

Vulnerable Software & Versions:

org.apache.batik.i18n_1.9.0.v20170906-1841.jar

File Path: C:\birt\plugins\org.apache.batik.i18n_1.9.0.v20170906-1841.jar
MD5: 2f6325dc53e15f58029df416ae28f418
SHA1: 46561ecd67d73e229710fed2e2d38c2b3c6740a2

Identifiers

  • cpe: cpe:/a:apache:batik:1.9   Confidence:HIGHEST   
  • maven: org.eclipse.orbit.bundles:org.apache.batik.i18n:1.9.0-SNAPSHOT   Confidence:HIGH

CVE-2018-8013  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

Vulnerable Software & Versions: (show all)

org.apache.batik.util.gui_1.7.0.v200903091627.jar

File Path: C:\birt\plugins\org.apache.batik.util.gui_1.7.0.v200903091627.jar
MD5: 705e2e76b2d50953dfb0872d46cbd163
SHA1: 44eed20e2aee27a9b092457015c96c5ebf676bb9

Identifiers

CVE-2018-8013  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-502 Deserialization of Untrusted Data

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

Vulnerable Software & Versions: (show all)

CVE-2017-5662  

Severity: High
CVSS Score: 7.9 (AV:N/AC:M/Au:S/C:C/I:N/A:C)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

Vulnerable Software & Versions:

CVE-2015-0250  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)

XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.

Vulnerable Software & Versions: (show all)

org.apache.commons.codec_1.9.0.v20170208-1614.jar

Description: The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\birt\plugins\org.apache.commons.codec_1.9.0.v20170208-1614.jar
MD5: c2180452b877e17d535e2ebe0e469ec7
SHA1: 65deb3882534cce094a81eda7766684d1e9a0849

Identifiers

  • maven: org.eclipse.orbit.bundles:org.apache.commons.codec:1.9.0-SNAPSHOT   Confidence:HIGH

commons-discovery-0.2.jar

File Path: C:\birt\plugins\org.apache.commons.discovery_0.2.0.v201004190315\lib\commons-discovery-0.2.jar
MD5: 9a2fb56e6a79169b2fb6c8a0dc79abb0
SHA1: 7773ac7a7248f08ed2b8d297c6e2ef28260640ea

Identifiers

  • None

org.apache.commons.jxpath_1.3.0.v200911051830.jar

File Path: C:\birt\plugins\org.apache.commons.jxpath_1.3.0.v200911051830.jar
MD5: d24c67043830efac0f7d4180310a279c
SHA1: f20b24af69f023a6247e624b0d06c206f694b3f4

Identifiers

  • None

org.apache.commons.logging_1.1.1.v201101211721.jar

File Path: C:\birt\plugins\org.apache.commons.logging_1.1.1.v201101211721.jar
MD5: 98247c946b389a6043a5852693a6a889
SHA1: 07c8ef9aac68753c9a6fb3a79431bbe8dc3d55d9

Identifiers

  • None

org.apache.derby_10.11.1.1_v201605202053.jar

File Path: C:\birt\plugins\org.apache.derby_10.11.1.1_v201605202053.jar
MD5: 17166d0735e6557d4ad110de9e543d9a
SHA1: 2b60bf505a014edd8e3c7198f9c0b5761d2a1705

Identifiers

  • cpe: cpe:/a:apache:derby:10.11.1.1.v20160520   Confidence:LOW   

org.apache.felix.scr_2.0.14.v20180117-1452.jar

Description: Implementation of the Declarative Services specification 1.3

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\birt\plugins\org.apache.felix.scr_2.0.14.v20180117-1452.jar
MD5: cf33d5a81381a8c751c7254ff508094d
SHA1: 8f5cb662aa26062eda522835c9848b0854fef34c

Identifiers

  • None

org.apache.jasper.glassfish_2.2.2.v201501141630.jar

Description: %Bundle-Description

License:

https://glassfish.dev.java.net/public/CDDLv1.0.html
File Path: C:\birt\plugins\org.apache.jasper.glassfish_2.2.2.v201501141630.jar
MD5: b3269c3e492f032b026de4ca3571c358
SHA1: 2391436763a99ddbfb100352068fe0c5de8f1adb

Identifiers

  • cpe: cpe:/a:jasper_project:jasper:2.2.2.v20150114   Confidence:LOW   

org.apache.lucene.analysis_3.5.0.v20120725-1805.jar

File Path: C:\birt\plugins\org.apache.lucene.analysis_3.5.0.v20120725-1805.jar
MD5: a6cc7984b1b9ee9da27e989e41499c96
SHA1: 38a90c846590c7f0c62ce8ab51d3ee6bd223b664

Identifiers

  • None

org.apache.lucene.analyzers-common_7.1.0.v20180122-2126.jar

File Path: C:\birt\plugins\org.apache.lucene.analyzers-common_7.1.0.v20180122-2126.jar
MD5: 1816857fe43ba26f057616873a96bab2
SHA1: 5c84c24334cac3f3df228e0169c180769c404fc3

Identifiers

  • maven: org.eclipse.orbit.bundles:org.apache.lucene.analyzers-common:7.1.0-SNAPSHOT   Confidence:HIGH

org.apache.lucene.analyzers-smartcn_7.1.0.v20180122-2126.jar

File Path: C:\birt\plugins\org.apache.lucene.analyzers-smartcn_7.1.0.v20180122-2126.jar
MD5: d4e37a04d62a8c606ceed9aed89b727e
SHA1: d62880b8bcbb6bb96ddc83ca159e8c6edb8de22e

Identifiers

  • maven: org.eclipse.orbit.bundles:org.apache.lucene.analyzers-smartcn:7.1.0-SNAPSHOT   Confidence:HIGH

org.apache.lucene.core_3.5.0.v20120725-1805.jar

File Path: C:\birt\plugins\org.apache.lucene.core_3.5.0.v20120725-1805.jar
MD5: e243459011e2ab415d9604b90c2b5180
SHA1: b692d43c07f32c43402dd8c02efac090990c99c1

Identifiers

  • None

org.apache.lucene.core_7.1.0.v20171214-1510.jar

File Path: C:\birt\plugins\org.apache.lucene.core_7.1.0.v20171214-1510.jar
MD5: ed69285dac52cef3b2af38051faa703f
SHA1: a671b86feb8c4f53367d6edbb0eea0e9e5b04204

Identifiers

  • maven: org.eclipse.orbit.bundles:org.apache.lucene.core:7.1.0-SNAPSHOT   Confidence:HIGH

org.apache.poi_3.9.0.v201405241750.jar

File Path: C:\birt\plugins\org.apache.poi_3.9.0.v201405241750.jar
MD5: 9b608ddcec092816f992ca649b714d1b
SHA1: 27955afc1de66091c40c6c622c889931ffe69bc5

Identifiers

  • cpe: cpe:/a:apache:poi:3.9.0.v20140524   Confidence:LOW   

CVE-2017-5644  

Severity: High
CVSS Score: 7.1 (AV:N/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

Vulnerable Software & Versions:

CVE-2016-5000  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions:

CVE-2014-9527  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.

Vulnerable Software & Versions:

CVE-2014-3574  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

Vulnerable Software & Versions: (show all)

CVE-2014-3529  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

org.apache.xerces_2.9.0.v201101211617.jar

File Path: C:\birt\plugins\org.apache.xerces_2.9.0.v201101211617.jar
MD5: 961554fbcc83ea650148e29bea723e6b
SHA1: 106d733bb925686a566de5920e9fa7ae373ae532

Identifiers

  • None

org.apache.xml.resolver_1.2.0.v201005080400.jar

File Path: C:\birt\plugins\org.apache.xml.resolver_1.2.0.v201005080400.jar
MD5: b8ec3d34b82ae36d094e4ad3c3bd6231
SHA1: d17504c7928ebbf8959a1302d327973e878e666f

Identifiers

  • None

org.apache.xml.serializer_2.7.1.v201005080400.jar

File Path: C:\birt\plugins\org.apache.xml.serializer_2.7.1.v201005080400.jar
MD5: 07932f4bcc1fc8e0e24a6d101ac50fd3
SHA1: d0bd0a3d8db9f330a803937c7283904fd4a5886a

Identifiers

  • None

org.eclipse.birt.chart.device.pdf_4.8.0.v201803131913.jar: fop-2.1.jar

File Path: C:\birt\plugins\org.eclipse.birt.chart.device.pdf_4.8.0.v201803131913.jar\lib\fop-2.1.jar
MD5: 4d337e3e7e867a498325cc48888c0092
SHA1: 0b30f89682116ae9054609cc59271502247e8bab

Identifiers

  • None

org.eclipse.birt.core_4.8.0.v201803131913.jar

File Path: C:\birt\plugins\org.eclipse.birt.core_4.8.0.v201803131913.jar
MD5: 71f3b7f3b8af1acc823e6ad167c08b21
SHA1: f4d06828ecce0fe26efb5dd487601665dc163f5e

Identifiers

  • cpe: cpe:/a:eclipse:birt:4.8.0.v20180313   Confidence:LOW   

org.eclipse.birt.data.oda.mongodb_4.8.0.v201803131913.jar

File Path: C:\birt\plugins\org.eclipse.birt.data.oda.mongodb_4.8.0.v201803131913.jar
MD5: dad4e8df7b9e73d153b6ededc86f016b
SHA1: d571f6206a5ae45a31b2c17a7dc2e7c8680d0c93

Identifiers

CVE-2017-2665  

Severity: Low
CVSS Score: 1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-255 Credentials Management

The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.

Vulnerable Software & Versions: (show all)

CVE-2014-8180  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-287 Improper Authentication

MongoDB on Red Hat Satellite 6 allows local users to bypass authentication by logging in with an empty password and delete information which can cause a Denial of Service.

Vulnerable Software & Versions:

cassandra-thrift-1.1.0.jar

File Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\cassandra-thrift-1.1.0.jar
MD5: 2f23c24741a758acc2d2cdc246392754
SHA1: a48767fc25d46cb80f17452482d7f12d42b59a28

Identifiers

  • cpe: cpe:/a:apache:cassandra:1.1.0   Confidence:LOW   
  • cpe: cpe:/a:apache:thrift:1.1.0   Confidence:LOW   

commons-lang-2.4.jar

Description:  Commons Lang, a package of Java utility classes for the classes that are in java.lang's hierarchy, or are considered to be so standard as to justify existence in java.lang.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\commons-lang-2.4.jar
MD5: 75a0ef60a666f724f3c053447194df5f
SHA1: c2fb8dbb38c760d123d44353f99615944bbc5d74

Identifiers

  • maven: commons-lang:commons-lang:2.4   Confidence:HIGH

guava-r09.jar

Description:  Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more. This project is a complete packaging of all the Guava libraries into a single jar. Individual portions of Guava can be used by downloading the appropriate module and its dependencies. Guava (complete) has only one code dependency - javax.annotation, per the JSR-305 spec.

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\guava-r09.jar
MD5: 355fea275e35bab661832bc177d5de39
SHA1: 49bfc2dae752575241b02c837bc33df56f0fea88

Identifiers

  • maven: com.google.guava:guava:r09   Confidence:HIGH
  • cpe: cpe:/a:google:guava:-   Confidence:LOW   

hector-core-1.1-2.jar

Description: Cassandra Java Client Library

License:

https://github.com/hector/hector-client/wiki/License
File Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\hector-core-1.1-2.jar
MD5: 0af5634a942380a6ca03d941c3cda516
SHA1: ae4d4447b503373e06fc197a56d8a3b79eda2497

Identifiers

  • maven: org.hectorclient:hector-core:1.1-2   Confidence:HIGH

libthrift-0.7.0.jar

File Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\libthrift-0.7.0.jar
MD5: 960bca5be1ce4b1485646f22372919b6
SHA1: a86aaceaffc6ca81a960a2a92b59702fa3b594b5

Identifiers

  • cpe: cpe:/a:apache:thrift:0.7.0   Confidence:LOW   

CVE-2016-5397  

Severity: High
CVSS Score: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)
CWE: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.

Vulnerable Software & Versions:

CVE-2015-3254  

Severity: Medium
CVSS Score: 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

The client libraries in Apache Thrift before 0.9.3 might allow remote authenticated users to cause a denial of service (infinite recursion) via vectors involving the skip function.

Vulnerable Software & Versions:

slf4j-api-1.6.1.jar

Description: The slf4j API

File Path: C:\birt\plugins\org.eclipse.birt.me.prettyprint.hector_4.8.0.v201803131913\lib\slf4j-api-1.6.1.jar
MD5: 286f7299d1fbce0ca7698f89b24ba60c
SHA1: 1c7a8ff75430181428a263e7b07a7cdf4bfabe1b

Identifiers

  • cpe: cpe:/a:slf4j:slf4j:1.6.1   Confidence:LOW   
  • maven: org.slf4j:slf4j-api:1.6.1   Confidence:HIGH

org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar: dom4j-1.6.1.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar\lib\poi-3.9\ooxml-lib\dom4j-1.6.1.jar
MD5: d7bf1b96a16130688ad3a578b6c98516
SHA1: c0d98b9815cfb5fd30dc44f2d47347d3fa786f28

Identifiers

CVE-2018-1000632  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CWE: CWE-91 XML Injection (aka Blind XPath Injection)

dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.

Vulnerable Software & Versions: (show all)

org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar: xmlbeans-2.3.0.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar\lib\poi-3.9\ooxml-lib\xmlbeans-2.3.0.jar
MD5: 37958346e40a65552ac4387c0524a3e4
SHA1: 19fe17d8aaf928c0adacedebdb0aa02ebfb6673e

Identifiers

  • None

org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar: poi-ooxml-3.9-20121203.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.excel_4.8.0.v201803131913.jar\lib\poi-3.9\poi-ooxml-3.9-20121203.jar
MD5: 6f40fff664b8185252d8f55212b703b1
SHA1: 442172c691a526949d7567616e248a277752f3a1

Identifiers

CVE-2017-5644  

Severity: High
CVSS Score: 7.1 (AV:N/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

Vulnerable Software & Versions:

CVE-2017-12626  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).

Vulnerable Software & Versions: (show all)

CVE-2016-5000  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions:

CVE-2014-9527  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.

Vulnerable Software & Versions:

CVE-2014-3574  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

Vulnerable Software & Versions: (show all)

CVE-2014-3529  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

oda-jdbc.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.jdbc_4.8.0.v201803131913\oda-jdbc.jar
MD5: 76b98affdf7991ce8f731dadda084482
SHA1: 928e9fe054ff87c4ed3880ef093da20ad816de99

Identifiers

  • cpe: cpe:/a:eclipse:birt:-   Confidence:LOW   

CVE-2009-4521  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in birt-viewer/run in Eclipse Business Intelligence and Reporting Tools (BIRT) before 2.5.0, as used in KonaKart and other products, allows remote attackers to inject arbitrary web script or HTML via the __report parameter.

Vulnerable Software & Versions:

BirtSample.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.sampledb_4.8.0.v201803131913\db\BirtSample.jar
MD5: 23bb128ef8cfcb94ff220b8d857aa2ce
SHA1: 556b1550b173e5acba8c05de6eb0753322a6ff90

Identifiers

  • None

sampledb.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.data.oda.sampledb_4.8.0.v201803131913\sampledb.jar
MD5: d328cc57deb92ae220277d0946884b97
SHA1: f6e0be4683e6fedb0d18a263d76e56ef11983b1e

Identifiers

  • cpe: cpe:/a:eclipse:birt:-   Confidence:LOW   

CVE-2009-4521  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in birt-viewer/run in Eclipse Business Intelligence and Reporting Tools (BIRT) before 2.5.0, as used in KonaKart and other products, allows remote attackers to inject arbitrary web script or HTML via the __report parameter.

Vulnerable Software & Versions:

org.eclipse.birt.report.designer.ui.views_4.8.0.v201803131913.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.designer.ui.views_4.8.0.v201803131913.jar
MD5: aa85ef3731d79e4900ae103928e1f111
SHA1: 77b755765d8058d9cc90ba85cba61d29e2800b24

Identifiers

  • cpe: cpe:/a:eclipse:birt:4.8.0.v20180313   Confidence:LOW   
  • cpe: cpe:/a:views_project:views:4.8.0.v20180313   Confidence:LOW   

org.eclipse.birt.report.engine_4.8.0.v201803131913.jar: commons-cli-1.0.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.engine_4.8.0.v201803131913.jar\lib\commons-cli-1.0.jar
MD5: f76ceb00f9440a2570d657e3f030ed1e
SHA1: 7f1557e36dd0c1c88523983ebcfff226460b44ea

Identifiers

  • None

org.eclipse.birt.report.engine_4.8.0.v201803131913.jar: Tidy.jar

Description:  JTidy is a Java port of HTML Tidy, a HTML syntax checker and pretty printer. Like its non-Java cousin, JTidy can be used as a tool for cleaning up malformed and faulty HTML. In addition, JTidy provides a DOM interface to the document that is being processed, which effectively makes you able to use JTidy as a DOM parser for real-world HTML.

License:

Java HTML Tidy License: http://jtidy.svn.sourceforge.net/viewvc/jtidy/trunk/jtidy/LICENSE.txt?revision=95
File Path: C:\birt\plugins\org.eclipse.birt.report.engine_4.8.0.v201803131913.jar\lib\Tidy.jar
MD5: 4cf49378ae26daf8b26ca6b1270dcf3a
SHA1: dee86d0dc982b75e411cc53dbdd4ae7eeaf25041

Identifiers

  • cpe: cpe:/a:html-tidy:tidy:-   Confidence:LOW   
  • maven: net.sf.jtidy:jtidy:r938   Confidence:HIGH

jsp.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.viewer_4.8.0.v201803131913\birt\WEB-INF\lib\jsp.jar
MD5: 5a9d18c9f5952e72753ed2528bec5e0e
SHA1: b2974c9ca7aeed128135b7b36925ec52eae44c24

Identifiers

  • None

viewservlets.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.viewer_4.8.0.v201803131913\birt\WEB-INF\lib\viewservlets.jar
MD5: 850302bc4d10807fa40825e5d587d519
SHA1: 5dfa70cf99059dfd4f780d4805afef60bcd616e4

Identifiers

  • cpe: cpe:/a:eclipse:birt:-   Confidence:LOW   

CVE-2009-4521  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in birt-viewer/run in Eclipse Business Intelligence and Reporting Tools (BIRT) before 2.5.0, as used in KonaKart and other products, allows remote attackers to inject arbitrary web script or HTML via the __report parameter.

Vulnerable Software & Versions:

viewer.jar

File Path: C:\birt\plugins\org.eclipse.birt.report.viewer_4.8.0.v201803131913\viewer.jar
MD5: 0fe98dc3c01ba10f5aff65ad2131786b
SHA1: 688fa88d609f4be0c954c3caddbad52d8ddd3ec6

Identifiers

  • cpe: cpe:/a:eclipse:birt:-   Confidence:LOW   

CVE-2009-4521  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in birt-viewer/run in Eclipse Business Intelligence and Reporting Tools (BIRT) before 2.5.0, as used in KonaKart and other products, allows remote attackers to inject arbitrary web script or HTML via the __report parameter.

Vulnerable Software & Versions:

org.eclipse.compare.core_3.6.200.v20171212-0901.jar

File Path: C:\birt\plugins\org.eclipse.compare.core_3.6.200.v20171212-0901.jar
MD5: ee20a137e633798ecbe6834be49c0c5c
SHA1: 954bab93b9fdd488abf95f6c3c1bf4d8aa1e4629

Identifiers

  • None

org.eclipse.core.commands_3.9.100.v20180219-1020.jar

File Path: C:\birt\plugins\org.eclipse.core.commands_3.9.100.v20180219-1020.jar
MD5: af90f38ca717cbe046c71a269d8649b4
SHA1: 5b5c5ada88289286b3830070c3cb15144d595672

Identifiers

  • None

org.eclipse.core.contenttype_3.7.0.v20171130-1004.jar

File Path: C:\birt\plugins\org.eclipse.core.contenttype_3.7.0.v20171130-1004.jar
MD5: a2ccb589cc92ddf8b94c5223786fa90a
SHA1: b242cf47df6567f875a0779a2f8ea5bba9404e58

Identifiers

  • None

org.eclipse.core.databinding.observable_1.6.200.v20171212-1736.jar

File Path: C:\birt\plugins\org.eclipse.core.databinding.observable_1.6.200.v20171212-1736.jar
MD5: d6e7eb666070e7d26e3d77e30223a2d9
SHA1: 824584bf70a418c667a6ed1439d6685960f487de

Identifiers

  • None

org.eclipse.core.databinding.property_1.6.200.v20171212-1736.jar

File Path: C:\birt\plugins\org.eclipse.core.databinding.property_1.6.200.v20171212-1736.jar
MD5: 0a22c0bda127dd790c9477352330bbd0
SHA1: e64b1bb21e0ddc06287fe0fa39081e4019e6524a

Identifiers

  • cpe: cpe:/a:property_pro:property_pro:1.6.200.v20171212   Confidence:LOW   

org.eclipse.core.databinding_1.6.200.v20180207-1113.jar

File Path: C:\birt\plugins\org.eclipse.core.databinding_1.6.200.v20180207-1113.jar
MD5: 78b9f34a0c07eca3fe462279c21a812e
SHA1: 640240e08b8e2def838c9ed2d640cff9626fae03

Identifiers

  • None

org.eclipse.core.expressions_3.6.100.v20171130-1004.jar

File Path: C:\birt\plugins\org.eclipse.core.expressions_3.6.100.v20171130-1004.jar
MD5: 10bc1ee4729743cb3b4a6dc4c031db96
SHA1: 9be1e8f2b1c99c2d4a7a3e05cccab33753dee7f6

Identifiers

  • None

org.eclipse.core.filebuffers_3.6.200.v20171212-0901.jar

File Path: C:\birt\plugins\org.eclipse.core.filebuffers_3.6.200.v20171212-0901.jar
MD5: 05f4b51e8a509df89d5563be7413cfbe
SHA1: d0eb714f294d4317badfcc4ae66420321dcdba17

Identifiers

  • None

org.eclipse.core.filesystem_1.7.100.v20180304-1102.jar

File Path: C:\birt\plugins\org.eclipse.core.filesystem_1.7.100.v20180304-1102.jar
MD5: c738a8c61fca56374ec8f242436361be
SHA1: b3ad92ecd4bc57e4c4e6fd8184f2f79ab5bb7aa1

Identifiers

  • None

org.eclipse.core.jobs_3.10.0.v20180221-0910.jar

File Path: C:\birt\plugins\org.eclipse.core.jobs_3.10.0.v20180221-0910.jar
MD5: 2fad584b7ace1a504ee6b45bbafdb795
SHA1: 2bdfc3798de15e98f0398d8c2e840b4010631167

Identifiers

  • None

org.eclipse.core.net_1.3.200.v20180207-1711.jar

File Path: C:\birt\plugins\org.eclipse.core.net_1.3.200.v20180207-1711.jar
MD5: 8d90004bdd92985ded099e3b39b93d8f
SHA1: e25fe2dc537a58e95be8e6c50a3bbe88e7fec4a4

Identifiers

  • None

org.eclipse.core.resources_3.13.0.v20180304-1800.jar

File Path: C:\birt\plugins\org.eclipse.core.resources_3.13.0.v20180304-1800.jar
MD5: adc24a75835e3661fb592a5e48eb2614
SHA1: 9f91ced7a3eaf87f27b533af12d8336611a7c878

Identifiers

  • None

org.eclipse.core.resources_3.13.0.v20180304-1800.jar: resources-ant.jar

File Path: C:\birt\plugins\org.eclipse.core.resources_3.13.0.v20180304-1800.jar\ant_tasks\resources-ant.jar
MD5: b48a53bb93d12a202e7747b1e8b228d3
SHA1: 2542d39dfc2fb17b29ee170bf38347fdcaf14b79

Identifiers

  • None

org.eclipse.core.runtime_3.14.0.v20180220-2036.jar

File Path: C:\birt\plugins\org.eclipse.core.runtime_3.14.0.v20180220-2036.jar
MD5: ae74be4fac8a8d87764bf38058161678
SHA1: 68ffadc5880cbcf7919b876a197a7de2003cf001

Identifiers

  • None

org.eclipse.core.variables_3.4.100.v20171201-0724.jar

File Path: C:\birt\plugins\org.eclipse.core.variables_3.4.100.v20171201-0724.jar
MD5: 73b7c1172baa327441078019526809bd
SHA1: 1ffbfc74a00a03cc975f25ac80e3cdf92437a156

Identifiers

  • None

org.eclipse.datatools.connectivity.db.generic_1.1.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.db.generic_1.1.0.201603142002.jar
MD5: 1333f4ec33dcbd9f36672538fd73add8
SHA1: 6463155c98d188a710c78889d1edee8be699fea0

Identifiers

  • None

org.eclipse.datatools.connectivity.oda.consumer_3.3.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.consumer_3.3.0.201603142002.jar
MD5: 105361057f828ff2b360517bb1af9034
SHA1: 1754b65b77accc04ecc8d23f410058f9fba2a4cd

Identifiers

  • None

org.eclipse.datatools.connectivity.oda.design.ui_3.3.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.design.ui_3.3.0.201603142002.jar
MD5: ca55f80b6df27df973b518ae631933da
SHA1: bf764bdcae8dc844b65e4d23769fb11fee59223f

Identifiers

  • None

org.eclipse.datatools.connectivity.oda.design_3.4.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.design_3.4.0.201603142002.jar
MD5: 1bb55defd9d65066d570079dd9b088a8
SHA1: cd9396a66ac6b6b91a2f973589abd855e61456f7

Identifiers

  • None

org.eclipse.datatools.connectivity.oda.flatfile.ui_3.2.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.flatfile.ui_3.2.0.201603142002.jar
MD5: bfa9f39b753871a53841d22036bc4fa7
SHA1: f852a7671d8d5fc89720c8188c857230802191d3

Identifiers

  • None

org.eclipse.datatools.connectivity.oda.flatfile_3.2.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.flatfile_3.2.0.201603142002.jar
MD5: 5f016361e036c6e8986cb0f70f2d54a7
SHA1: 1b82d731576d8de50e18845febfc2d24b929d915

Identifiers

  • None

org.eclipse.datatools.connectivity.oda.profile_3.3.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda.profile_3.3.0.201603142002.jar
MD5: 8dd84f05391410a30f0a480ace0adba1
SHA1: cf44968fcaa6a6e80b65bae66532e2618c4c3f2c

Identifiers

  • None

org.eclipse.datatools.connectivity.oda_3.5.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.oda_3.5.0.201603142002.jar
MD5: 454ebcab3770747bfc31190e095130f7
SHA1: 44819825c5bc709854e4de9d3aee3b060dddd84e

Identifiers

  • None

org.eclipse.datatools.connectivity.sqm.core_1.3.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.sqm.core_1.3.0.201603142002.jar
MD5: 0e4148583ed1e77beef5f3b3a4600530
SHA1: 298b37d83bbcdbbf7aae01f213225f684bb22380

Identifiers

  • None

org.eclipse.datatools.connectivity.ui_1.3.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity.ui_1.3.0.201603142002.jar
MD5: 5cd8f8f8e410e9e4257b99ec865f2beb
SHA1: 14ea77f206c62e5bf877518fa3468c0cf7c1913b

Identifiers

  • None

org.eclipse.datatools.connectivity_1.13.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.connectivity_1.13.0.201603142002.jar
MD5: 4dc98b3be5edcd93f66774c11d77cbe3
SHA1: bfe0b7f13d270af2069b2431a8a7a596fdf53352

Identifiers

  • None

org.eclipse.datatools.enablement.oda.ws_1.3.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.enablement.oda.ws_1.3.0.201603142002.jar
MD5: 0d7d66a1fa624e50ec4acb885cd08054
SHA1: 7c08c4a5c25ffc2eb5d4330accd91219061136f3

Identifiers

  • cpe: cpe:/a:ws_project:ws:1.3.0.201603   Confidence:LOW   

org.eclipse.datatools.enablement.oda.xml.ui_1.3.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.enablement.oda.xml.ui_1.3.0.201603142002.jar
MD5: d2786383b6721930d567a2f343e0b333
SHA1: 2a84bfe19e21ddb0dc14c9c169be23e4e0c7e27f

Identifiers

  • None

org.eclipse.datatools.enablement.oda.xml_1.3.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.enablement.oda.xml_1.3.0.201603142002.jar
MD5: 2249322144358b39ed098fd37b3cb079
SHA1: dc985e73b95ec4d0dba3b75deb2d923ce8e17890

Identifiers

  • None

org.eclipse.datatools.help_1.6.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.help_1.6.0.201603142002.jar
MD5: 25ab902a88ef09fe4348102c1ffbf0e1
SHA1: 1f0a05d895478d2ed9769e8fee51800bb0e28b5a

Identifiers

  • None

org.eclipse.datatools.modelbase.dbdefinition_1.1.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.modelbase.dbdefinition_1.1.0.201603142002.jar
MD5: c06650cd6312fddd96f74719a30f8a05
SHA1: 74b503eaaa42a1f6d76dec0afc8fcfdce7fd67e1

Identifiers

  • None

org.eclipse.datatools.modelbase.sql_1.1.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.modelbase.sql_1.1.0.201603142002.jar
MD5: 623a2d50fc329720430d599a4ec01120
SHA1: a8dc0b4a7d959f118dc7a3fde70bf9076637a2e8

Identifiers

  • None

org.eclipse.datatools.oda.cshelp_1.2.0.201603142002.jar

File Path: C:\birt\plugins\org.eclipse.datatools.oda.cshelp_1.2.0.201603142002.jar
MD5: bf63bcc3432348e0f9a48c843a735e0e
SHA1: bd8fc3f9b3b9a109fab7c9f434b4951e8b436699

Identifiers

  • None

org.eclipse.draw2d_3.10.100.201606061308.jar

File Path: C:\birt\plugins\org.eclipse.draw2d_3.10.100.201606061308.jar
MD5: bb071071a6642cf0416eb66673af7686
SHA1: a61731ecb76b724689895f1c39ed2016672b5509

Identifiers

  • maven: org.eclipse.draw2d.plugins:org.eclipse.draw2d:3.10.100-SNAPSHOT   Confidence:HIGH

org.eclipse.e4.core.commands_0.12.200.v20171212-1736.jar

File Path: C:\birt\plugins\org.eclipse.e4.core.commands_0.12.200.v20171212-1736.jar
MD5: d367cdb6aae8ee93d3623541bc2b2d2f
SHA1: 59da28ff901be2dc78ae3ff6b9c155285277421d

Identifiers

  • None

org.eclipse.e4.core.contexts_1.7.0.v20171213-1706.jar

File Path: C:\birt\plugins\org.eclipse.e4.core.contexts_1.7.0.v20171213-1706.jar
MD5: 8f2c1de56eaaa63fe81ae2f558192590
SHA1: b2beecd2816ab2c061651eba4a62bf4598d00e0e

Identifiers

  • None

org.eclipse.e4.core.di.annotations_1.6.100.v20171130-1004.jar

File Path: C:\birt\plugins\org.eclipse.e4.core.di.annotations_1.6.100.v20171130-1004.jar
MD5: 0e09708b4d31908149089bc75cfc65eb
SHA1: f19f5e7eae6c3519b0c1ff5c29ab86bca9472171

Identifiers

  • None

org.eclipse.e4.core.di.extensions.supplier_0.15.100.v20171130-1004.jar

File Path: C:\birt\plugins\org.eclipse.e4.core.di.extensions.supplier_0.15.100.v20171130-1004.jar
MD5: 40ac1964735c8c61fd81c928d7245f97
SHA1: ab7541986b8e395e4fd7c8f4d1071715fbd98b32

Identifiers

  • None

org.eclipse.e4.core.di.extensions_0.15.100.v20171130-1004.jar

File Path: C:\birt\plugins\org.eclipse.e4.core.di.extensions_0.15.100.v20171130-1004.jar
MD5: 3128a4db360f36b4b9cc4cd1a9f4ebea
SHA1: 1ea77407fad5136bb5aa55b033e93a79847d483a

Identifiers

  • None

org.eclipse.e4.core.di_1.7.0.v20180208-1451.jar

File Path: C:\birt\plugins\org.eclipse.e4.core.di_1.7.0.v20180208-1451.jar
MD5: 31c4f25505f4b58b6f1c570962bb2755
SHA1: 27bfb79b200fbccd61fd337b79e8c3ba0fc9e353

Identifiers

  • None

org.eclipse.e4.core.services_2.1.100.v20171130-1004.jar

File Path: C:\birt\plugins\org.eclipse.e4.core.services_2.1.100.v20171130-1004.jar
MD5: b7f070228445d5c6ea410ad8ac273421
SHA1: 884b4b9386f664954b5d1436c6d0cb985008c4f4

Identifiers

  • None

org.eclipse.e4.emf.xpath_0.2.100.v20171212-1736.jar

File Path: C:\birt\plugins\org.eclipse.e4.emf.xpath_0.2.100.v20171212-1736.jar
MD5: 00e6356bc05a2af2228a13db338694cf
SHA1: 928c78fead767797f8506f84cb3b283e4c873728

Identifiers

  • None

org.eclipse.e4.ui.bindings_0.12.100.v20171212-1736.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.bindings_0.12.100.v20171212-1736.jar
MD5: 034393dce70b963b1f69d99f43ec473b
SHA1: 173428aa6330c1f4dc29b84d29f25f786611c570

Identifiers

  • None

org.eclipse.e4.ui.css.core_0.12.200.v20180209-0329.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.css.core_0.12.200.v20180209-0329.jar
MD5: 95c9b6ddf2ec0e19b1392665b2990dd6
SHA1: c3a227ffc85930a6ccac2c7104ea88caa5c9c8cb

Identifiers

  • None

org.eclipse.e4.ui.css.swt.theme_0.12.0.v20180224-1102.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.css.swt.theme_0.12.0.v20180224-1102.jar
MD5: c3fe9ae2c7b76f948a947a464ac7ed29
SHA1: 252761fde6bf55d0161b53526fd2cb2427420dcb

Identifiers

  • None

org.eclipse.e4.ui.css.swt_0.13.100.v20180228-2008.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.css.swt_0.13.100.v20180228-2008.jar
MD5: 9970af5cd4bdd795dec78f4fc06dc409
SHA1: 15379c2ba784bcb5c97c41a9ece374ff0cb1e3b7

Identifiers

  • None

org.eclipse.e4.ui.di_1.2.200.v20171212-1736.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.di_1.2.200.v20171212-1736.jar
MD5: 9c05a4ca5d8d42ad6896c6203e3e9194
SHA1: 2416efc06eccbd01a794887b893ee96b5502f44f

Identifiers

  • None

org.eclipse.e4.ui.model.workbench_2.1.0.v20180214-1653.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.model.workbench_2.1.0.v20180214-1653.jar
MD5: 72eaf06f42fc9d0ab5239d5c1a2a098a
SHA1: 6b1bb905cd12dc87790238333c707899210c703f

Identifiers

  • None

org.eclipse.e4.ui.services_1.3.100.v20171212-1736.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.services_1.3.100.v20171212-1736.jar
MD5: 6e88bfd0e19c57a9cc55bef5dbdd7845
SHA1: 67535a2bfd22a1611e8fa1d11ee24b025582620f

Identifiers

  • None

org.eclipse.e4.ui.widgets_1.2.100.v20171212-1736.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.widgets_1.2.100.v20171212-1736.jar
MD5: 0aab8ca3784752ba1afad3f13a021a69
SHA1: a0ce42a67377e8bc571b1100336f91a3e2118742

Identifiers

CVE-2015-6737  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-site scripting (XSS) vulnerability in the Widgets extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via vectors involving base64 encoded content.

Vulnerable Software & Versions:

org.eclipse.e4.ui.workbench.addons.swt_1.3.100.v20180201-1323.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench.addons.swt_1.3.100.v20180201-1323.jar
MD5: 916c54801489c1e287a59f1d978f45b4
SHA1: c8b759d7baaeb23a5d1eb4e44acdb5f5e9807b38

Identifiers

  • None

org.eclipse.e4.ui.workbench.renderers.swt_0.14.200.v20180219-0652.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench.renderers.swt_0.14.200.v20180219-0652.jar
MD5: 9764787ddfeb0bd67a3043376f68c643
SHA1: bdc07f443a3fd887f9c19f694dc452c9d6ad9344

Identifiers

  • None

org.eclipse.e4.ui.workbench.swt_0.14.200.v20180129-1004.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench.swt_0.14.200.v20180129-1004.jar
MD5: f31562fab804b22f5954eb265f37bf1e
SHA1: 580240b54a448671113986a9e5a49536313acc6e

Identifiers

  • None

org.eclipse.e4.ui.workbench3_0.14.100.v20171212-1736.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench3_0.14.100.v20171212-1736.jar
MD5: 531d2a681e115ae7b68483e7aea11e73
SHA1: d0543f8dd5fe5baa14e16d030b082686937d9423

Identifiers

  • None

org.eclipse.e4.ui.workbench_1.6.0.v20180301-1316.jar

File Path: C:\birt\plugins\org.eclipse.e4.ui.workbench_1.6.0.v20180301-1316.jar
MD5: acf2aaf3645343ef15458cde57eeb140
SHA1: 57e6253a7d38a854a1b66f79ce843ee849311d11

Identifiers

  • None

org.eclipse.ecf.filetransfer_5.0.0.v20160817-1024.jar

File Path: C:\birt\plugins\org.eclipse.ecf.filetransfer_5.0.0.v20160817-1024.jar
MD5: 65da4c93b482db12dc72b4644008eec7
SHA1: dc9ae632d162dd92e62fffb00066d7e59951c201

Identifiers

  • cpe: cpe:/a:file-transfer:file_transfer:5.0.0.v20160817   Confidence:LOW   
  • maven: org.eclipse.ecf:org.eclipse.ecf.filetransfer:5.0.0-SNAPSHOT   Confidence:HIGH

org.eclipse.ecf.identity_3.8.0.v20161203-2153.jar

File Path: C:\birt\plugins\org.eclipse.ecf.identity_3.8.0.v20161203-2153.jar
MD5: af40f444edef16e548755038cd2edb95
SHA1: a8902b8358cf142befd55a3514fded558f5bb6b1

Identifiers

CVE-2008-7271  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.

Vulnerable Software & Versions: (show all)

org.eclipse.ecf.provider.filetransfer.ssl_1.0.0.v20160817-1024.jar

File Path: C:\birt\plugins\org.eclipse.ecf.provider.filetransfer.ssl_1.0.0.v20160817-1024.jar
MD5: 2465f3f27ae6627ffb23f8d8401cbeb4
SHA1: 9b2893ffb6a513065b5daaa9d920557550e3988f

Identifiers

  • cpe: cpe:/a:eclipse:eclipse_ide:1.0   Confidence:HIGHEST   
  • maven: org.eclipse.ecf:org.eclipse.ecf.provider.filetransfer.ssl:1.0.0-SNAPSHOT   Confidence:HIGH

CVE-2010-4647  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.

Vulnerable Software & Versions: (show all)

CVE-2008-7271  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.

Vulnerable Software & Versions: (show all)

org.eclipse.ecf.provider.filetransfer_3.2.300.v20161203-1840.jar

File Path: C:\birt\plugins\org.eclipse.ecf.provider.filetransfer_3.2.300.v20161203-1840.jar
MD5: 490e5775ebe93f1e361d00aefd00cd04
SHA1: 1cc4a67985fd23c43d9dff3cf9c3f30e8f86bb14

Identifiers

CVE-2010-4647  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.

Vulnerable Software & Versions: (show all)

CVE-2008-7271  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.

Vulnerable Software & Versions: (show all)

org.eclipse.ecf.ssl_1.2.0.v20160817-1024.jar

File Path: C:\birt\plugins\org.eclipse.ecf.ssl_1.2.0.v20160817-1024.jar
MD5: 2b98e9a2d9a13a7018c10cb2a6399891
SHA1: c9ab7820796f458e6d0b6fca6cf85161175208b8

Identifiers

  • maven: org.eclipse.ecf:org.eclipse.ecf.ssl:1.2.0-SNAPSHOT   Confidence:HIGH

org.eclipse.ecf_3.8.0.v20170104-0657.jar

File Path: C:\birt\plugins\org.eclipse.ecf_3.8.0.v20170104-0657.jar
MD5: 1321b38ec21ebefa5f85b5d9ced6875d
SHA1: 6f32c14176fb208696afd7f276d6e22f22300052

Identifiers

CVE-2008-7271  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.

Vulnerable Software & Versions: (show all)

org.eclipse.emf.common_2.14.0.v20180308-1144.jar

File Path: C:\birt\plugins\org.eclipse.emf.common_2.14.0.v20180308-1144.jar
MD5: 5816402c71c85b0882cd51594a2dafca
SHA1: 5def7e2caced794ce9baf99f1cbde8500a485bee

Identifiers

  • maven: org.eclipse.emf:org.eclipse.emf.common:2.14.0-SNAPSHOT   Confidence:HIGH

org.eclipse.emf.ecore.change_2.12.0.v20180125-1130.jar

File Path: C:\birt\plugins\org.eclipse.emf.ecore.change_2.12.0.v20180125-1130.jar
MD5: 92c980706a53f163b5d7ccd1255c6023
SHA1: 985bd3522e4e6a07fe645ba4798136d5fdf8c6a1

Identifiers

  • maven: org.eclipse.emf:org.eclipse.emf.ecore.change:2.12.0-SNAPSHOT   Confidence:HIGH

org.eclipse.emf.ecore.xmi_2.14.0.v20180129-1548.jar

File Path: C:\birt\plugins\org.eclipse.emf.ecore.xmi_2.14.0.v20180129-1548.jar
MD5: 3c00538d5a39f975977699f0b7ff0ce4
SHA1: 73a4542c504de770e8795d44197d8e0c63cd790a

Identifiers

  • maven: org.eclipse.emf:org.eclipse.emf.ecore.xmi:2.14.0-SNAPSHOT   Confidence:HIGH

org.eclipse.emf.ecore_2.14.0.v20180213-0937.jar

File Path: C:\birt\plugins\org.eclipse.emf.ecore_2.14.0.v20180213-0937.jar
MD5: a84fd85fae44d4f6ae363093a710e094
SHA1: b5c0de39f9c619aa3b1379ce939a2066e701f956

Identifiers

  • maven: org.eclipse.emf:org.eclipse.emf.ecore:2.14.0-SNAPSHOT   Confidence:HIGH

org.eclipse.equinox.app_1.3.500.v20171221-2204.jar

File Path: C:\birt\plugins\org.eclipse.equinox.app_1.3.500.v20171221-2204.jar
MD5: 7dbd2734ffdd369a11a9582f019bb218
SHA1: 00b2dc328b287382ffe07391b7324e4682e2cff0

Identifiers

  • cpe: cpe:/a:app_project:app:1.3.500.v20171221   Confidence:LOW   

CVE-2018-13661  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-190 Integer Overflow or Wraparound

The mintToken function of a smart contract implementation for APP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.

Vulnerable Software & Versions:

org.eclipse.equinox.common_3.10.0.v20180226-1734.jar

File Path: C:\birt\plugins\org.eclipse.equinox.common_3.10.0.v20180226-1734.jar
MD5: 67c311bcbef3d29c67532b9423119a12
SHA1: a376349ab831f9e6f47b0a8a223d28880dd637f1

Identifiers

  • None

org.eclipse.equinox.concurrent_1.1.100.v20171221-2204.jar

File Path: C:\birt\plugins\org.eclipse.equinox.concurrent_1.1.100.v20171221-2204.jar
MD5: 965741c21b31bc6c97547405b90f021a
SHA1: a44696a8537f39a639df16fdc27895eaf21a834f

Identifiers

  • None

org.eclipse.equinox.ds_1.5.100.v20171221-2204.jar

Description: This bundle provides support for OSGi Declarative Services

File Path: C:\birt\plugins\org.eclipse.equinox.ds_1.5.100.v20171221-2204.jar
MD5: f102d48b2e72d9c876f5b764753ee4e2
SHA1: 13df1340de7939b7f405dbc99b7b8b637c8d4529

Identifiers

CVE-2010-4647  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.

Vulnerable Software & Versions: (show all)

CVE-2008-7271  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.

Vulnerable Software & Versions: (show all)

org.eclipse.equinox.event_1.4.200.v20180219-1443.jar

File Path: C:\birt\plugins\org.eclipse.equinox.event_1.4.200.v20180219-1443.jar
MD5: 34fa3a15cd6596d57bf0807b3ebff54a
SHA1: 5506cd4b59d940e31e6c3ca636a81d46e1ea703b

Identifiers

  • cpe: cpe:/a:event_list_project:event_list:1.4.200.v20180219   Confidence:LOW   

org.eclipse.equinox.frameworkadmin.equinox_1.1.0.v20180131-0638.jar

File Path: C:\birt\plugins\org.eclipse.equinox.frameworkadmin.equinox_1.1.0.v20180131-0638.jar
MD5: 403dc839ebeba2a3434aa3b76cf223d6
SHA1: 31529a2e3b4c345a138fcc74ad0ea2013518f5a6

Identifiers

  • None

org.eclipse.equinox.frameworkadmin_2.1.0.v20180131-0638.jar

File Path: C:\birt\plugins\org.eclipse.equinox.frameworkadmin_2.1.0.v20180131-0638.jar
MD5: 452fd779ab8f960c828a5502d6cdfed7
SHA1: f4a775fbb0987173b2892342136575608509f17e

Identifiers

  • None

org.eclipse.equinox.http.jetty_3.5.0.v20171221-2204.jar

File Path: C:\birt\plugins\org.eclipse.equinox.http.jetty_3.5.0.v20171221-2204.jar
MD5: d9c933839c8481ae4efba3697ad5f890
SHA1: 25edda071e2496e2cef491e0670e0ddb1585d1af

Identifiers

  • cpe: cpe:/a:eclipse:jetty:3.5.0.v20171221   Confidence:LOW   
  • cpe: cpe:/a:jetty:jetty:3.5.0.v20171221   Confidence:LOW   

CVE-2017-9735  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

Vulnerable Software & Versions:

CVE-2017-7658  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-19 Data Handling

In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.

Vulnerable Software & Versions: (show all)

CVE-2017-7657  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.

Vulnerable Software & Versions: (show all)

CVE-2017-7656  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CWE: CWE-284 Improper Access Control

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.

Vulnerable Software & Versions: (show all)

org.eclipse.equinox.http.registry_1.1.500.v20171221-2204.jar

File Path: C:\birt\plugins\org.eclipse.equinox.http.registry_1.1.500.v20171221-2204.jar
MD5: 02758e41254aaae72b46e01b5e340cf0
SHA1: 6390604a37e3344548f6fcc8bc09332a3af613f1

Identifiers

  • None

org.eclipse.equinox.http.servlet_1.5.0.v20180122-1726.jar

File Path: C:\birt\plugins\org.eclipse.equinox.http.servlet_1.5.0.v20180122-1726.jar
MD5: 8f88a0d69cbb0673d99625b06e28c5ec
SHA1: 4656463b482b0951bb1ff64ebe03c5e38d40a5a2

Identifiers

  • None

org.eclipse.equinox.jsp.jasper_1.1.0.v20171221-2204.jar

File Path: C:\birt\plugins\org.eclipse.equinox.jsp.jasper_1.1.0.v20171221-2204.jar
MD5: 2f2d797a5fa624ddd674ba1b2349fb93
SHA1: 87004712fc5243e8332297fd0a10cb8f15fac422

Identifiers

  • cpe: cpe:/a:jasper_project:jasper:1.1.0.v20171221   Confidence:LOW   

CVE-2017-6852  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Heap-based buffer overflow in the jpc_dec_decodepkt function in jpc_t2dec.c in JasPer 2.0.10 allows remote attackers to have unspecified impact via a crafted image.

Vulnerable Software & Versions:

CVE-2017-6851  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-125 Out-of-bounds Read

The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows remote attackers to cause a denial of service (invalid read) via a crafted image.

Vulnerable Software & Versions:

CVE-2017-6850  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference

The jp2_cdef_destroy function in jp2_cod.c in JasPer before 2.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image.

Vulnerable Software & Versions:

CVE-2016-9560  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.

Vulnerable Software & Versions:

CVE-2016-9557  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

Integer overflow in jas_image.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (application crash) via a crafted file.

Vulnerable Software & Versions:

CVE-2016-9398  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.

Vulnerable Software & Versions:

CVE-2016-9396  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The JPC_NOMINALGAIN function in jpc/jpc_t1cod.c in JasPer through 2.0.12 allows remote attackers to cause a denial of service (JPC_COX_RFT assertion failure) via unspecified vectors.

Vulnerable Software & Versions:

CVE-2016-9395  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.

Vulnerable Software & Versions:

CVE-2016-9394  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.

Vulnerable Software & Versions:

CVE-2016-9392  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

The calcstepsizes function in jpc_dec.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.

Vulnerable Software & Versions:

CVE-2016-9391  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.

Vulnerable Software & Versions:

CVE-2016-9390  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-20 Improper Input Validation

The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.

Vulnerable Software & Versions:

CVE-2016-9389  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).

Vulnerable Software & Versions:

CVE-2016-9387  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

Integer overflow in the jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.13 allows remote attackers to have unspecified impact via a crafted file, which triggers an assertion failure.

Vulnerable Software & Versions:

CVE-2016-9262  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

Multiple integer overflows in the (1) jas_realloc function in base/jas_malloc.c and (2) mem_resize function in base/jas_stream.c in JasPer before 1.900.22 allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities.

Vulnerable Software & Versions:

CVE-2016-8887  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference

The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).

Vulnerable Software & Versions:

CVE-2016-8886  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure.

Vulnerable Software & Versions:

CVE-2016-8885  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference

The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image.

Vulnerable Software & Versions:

CVE-2016-8883  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.

Vulnerable Software & Versions:

CVE-2016-8882  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference

The jpc_dec_tilefini function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.

Vulnerable Software & Versions:

CVE-2016-8693  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-415 Double Free

Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.

Vulnerable Software & Versions:

CVE-2016-8692  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-369 Divide By Zero

The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.

Vulnerable Software & Versions:

CVE-2016-8691  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-369 Divide By Zero

The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.

Vulnerable Software & Versions:

CVE-2016-8690  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference

The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.

Vulnerable Software & Versions:

CVE-2016-2116  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.

Vulnerable Software & Versions:

CVE-2016-1577  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137.

Vulnerable Software & Versions:

CVE-2016-10251  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.

Vulnerable Software & Versions:

CVE-2016-10250  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference

The jp2_colr_destroy function in jp2_cod.c in JasPer before 1.900.13 allows remote attackers to cause a denial of service (NULL pointer dereference) by leveraging incorrect cleanup of JP2 box data on error. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8887.

Vulnerable Software & Versions:

CVE-2016-10249  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-190 Integer Overflow or Wraparound

Integer overflow in the jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.12 allows remote attackers to have unspecified impact via a crafted image file, which triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

CVE-2016-10248  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-476 NULL Pointer Dereference

The jpc_tsfb_synthesize function in jpc_tsfb.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) via vectors involving an empty sequence.

Vulnerable Software & Versions:

CVE-2015-5221  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
CWE: CWE-416 Use After Free

Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.

Vulnerable Software & Versions:

CVE-2014-9029  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-189 Numeric Errors

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

CVE-2014-8158  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

Vulnerable Software & Versions:

CVE-2014-8157  

Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-189 Numeric Errors

Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

Vulnerable Software & Versions:

CVE-2014-8137  

Severity: Medium
CVSS Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.

Vulnerable Software & Versions:

eclipse_1702.dll

File Path: C:\birt\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.700.v20180124-1426\eclipse_1702.dll
MD5: a99ee92b912b9cbcae989eeefcc1f34c
SHA1: 5b4d7f985d93784eb37da565d33fdd472a45da26

Identifiers

  • None

org.eclipse.equinox.launcher_1.5.0.v20180207-1446.jar

File Path: C:\birt\plugins\org.eclipse.equinox.launcher_1.5.0.v20180207-1446.jar
MD5: 3ee9bb77073b8adc05a5fa9387e1670a
SHA1: 4dda9168a69e3d5cfa9c45c286e973a1cb30b9d3

Identifiers

  • None

org.eclipse.equinox.p2.artifact.repository_1.2.0.v20180305-0540.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.artifact.repository_1.2.0.v20180305-0540.jar
MD5: 323298f8ed9214779e149c780a2fa047
SHA1: 2b395942eeea66a0fb1bbb632ac6e9fa07009792

Identifiers

  • None

org.eclipse.equinox.p2.core_2.5.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.core_2.5.0.v20180302-1057.jar
MD5: add84661e9f88275be441e4de348d0fb
SHA1: 9d1c95875d2e5cc24fc894a23f9b5a19858cd57d

Identifiers

CVE-2010-4647  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.

Vulnerable Software & Versions: (show all)

CVE-2008-7271  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.

Vulnerable Software & Versions: (show all)

org.eclipse.equinox.p2.director_2.4.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.director_2.4.0.v20180302-1057.jar
MD5: 36d4989adc82985f27b829a511cb2f4a
SHA1: f9ebd17854e362cc2dd30788bfe290acaa4c6a84

Identifiers

  • None

org.eclipse.equinox.p2.directorywatcher_1.2.0.v20180130-1836.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.directorywatcher_1.2.0.v20180130-1836.jar
MD5: d3b8076f7d0fd1a110c935d652856e18
SHA1: ea54db0428d256a7f6628f5c3020bb5baf6e57ce

Identifiers

  • None

org.eclipse.equinox.p2.engine_2.6.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.engine_2.6.0.v20180302-1057.jar
MD5: a8b96672f0e05673ca79b94cc215e003
SHA1: 018f42ce5e9618aa2838dac5d53048dde0c0e55a

Identifiers

  • None

org.eclipse.equinox.p2.extensionlocation_1.3.0.v20180103-0918.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.extensionlocation_1.3.0.v20180103-0918.jar
MD5: 0b36e855a117c2135c6b914675915110
SHA1: 3a17f4342717c1ea21e2c42b1ce4462042bd0fb6

Identifiers

  • None

org.eclipse.equinox.p2.garbagecollector_1.1.0.v20180103-0918.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.garbagecollector_1.1.0.v20180103-0918.jar
MD5: c575b05508de3c6f1c82b04da7ad4856
SHA1: e1146b179655eceedf58c84a2c4163ec70477d35

Identifiers

  • None

org.eclipse.equinox.p2.jarprocessor_1.1.0.v20180103-0918.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.jarprocessor_1.1.0.v20180103-0918.jar
MD5: e7914cc948e94122be34707424b606d4
SHA1: d1a564c888efa811bcad4a2fc71b496feb7ed4d7

Identifiers

  • None

org.eclipse.equinox.p2.jarprocessor_1.1.0.v20180103-0918.jar: jarprocessor-ant.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.jarprocessor_1.1.0.v20180103-0918.jar\lib\jarprocessor-ant.jar
MD5: cf628b680f9ca533349ed5db1bf6906f
SHA1: 9bcad41eeb28cf39ad0f14a53365a7089cdb89d1

Identifiers

  • None

org.eclipse.equinox.p2.metadata.repository_1.3.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.metadata.repository_1.3.0.v20180302-1057.jar
MD5: c3d3db3dea8a4579b8f5f4e98ec67eb7
SHA1: 635df1dd33affbeb9892ad966f4a82b7622f6f3e

Identifiers

  • None

org.eclipse.equinox.p2.metadata.repository_1.3.0.v20180302-1057.jar: metadataRepository-ant.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.metadata.repository_1.3.0.v20180302-1057.jar\ant_tasks\metadataRepository-ant.jar
MD5: 0497ec264656754b611ebd5963725d20
SHA1: d42f6d1cbc5ef0e636c81032688a9d08b21e464a

Identifiers

  • None

org.eclipse.equinox.p2.metadata_2.4.0.v20180305-1409.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.metadata_2.4.0.v20180305-1409.jar
MD5: c61e25ab1aba997d3f7f072ef8ae7110
SHA1: 7f877a6bfc7a5350eb04ec3bc7e64dc90a9f7a75

Identifiers

  • None

org.eclipse.equinox.p2.operations_2.5.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.operations_2.5.0.v20180302-1057.jar
MD5: 010504239fc246f63a285f6faf1f0f1e
SHA1: 58962bcde47ec6f044fea807802db989772858f0

Identifiers

  • None

org.eclipse.equinox.p2.publisher.eclipse_1.3.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.publisher.eclipse_1.3.0.v20180302-1057.jar
MD5: 9a82290d7f97c594bfa6a84dc7beb3f6
SHA1: 6ebedd5c0b8a6ce58c0a7b59fcea9ca9811e793e

Identifiers

  • None

org.eclipse.equinox.p2.publisher.eclipse_1.3.0.v20180302-1057.jar: pdepublishing-ant.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.publisher.eclipse_1.3.0.v20180302-1057.jar\ant_tasks\pdepublishing-ant.jar
MD5: eb1498a5f74c05e22506cae4b11a071c
SHA1: 74d5bef5c99b5452f1da38f156dc37716b26fda7

Identifiers

  • None

org.eclipse.equinox.p2.publisher_1.5.0.v20180305-0540.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.publisher_1.5.0.v20180305-0540.jar
MD5: c83c06bdf747d4f40dde23b269d608e8
SHA1: e822a7ede8e0e253015ea20d87c66e8f87ab19ba

Identifiers

  • None

org.eclipse.equinox.p2.reconciler.dropins_1.2.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.reconciler.dropins_1.2.0.v20180302-1057.jar
MD5: f152d3a837b707d67193b6720f707aa8
SHA1: 3debbed3e02cdee3d97e36c52a6c13e2819c8137

Identifiers

  • None

org.eclipse.equinox.p2.repository.tools_2.2.0.v20180305-0540.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.repository.tools_2.2.0.v20180305-0540.jar
MD5: 4d6358bbf55f4ea4b311aa020c0ee85d
SHA1: d12257b3bcc91a0f47dbf260e79fdf2c9fceb435

Identifiers

  • None

org.eclipse.equinox.p2.repository.tools_2.2.0.v20180305-0540.jar: repository-tools-ant.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.repository.tools_2.2.0.v20180305-0540.jar\lib\repository-tools-ant.jar
MD5: 4b3db444979b274b6f41ae5f715682a7
SHA1: eca6c74f8c6eaaf7e298e7b887390ad794860ad7

Identifiers

  • None

org.eclipse.equinox.p2.repository_2.4.0.v20180302-1143.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.repository_2.4.0.v20180302-1143.jar
MD5: adbaa19f4d98a0f4a877930472e8aae4
SHA1: 58b670243dbc6b77984046a6a2e8051d26159041

Identifiers

  • None

org.eclipse.equinox.p2.touchpoint.eclipse_2.2.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.touchpoint.eclipse_2.2.0.v20180302-1057.jar
MD5: 91f998762667079a36e28e881c1b1fc1
SHA1: f8fe511601a702875c30641347af3907c22d2b19

Identifiers

  • None

org.eclipse.equinox.p2.touchpoint.natives_1.3.0.v20180130-1836.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.touchpoint.natives_1.3.0.v20180130-1836.jar
MD5: 8ecd1d5f161f0e8b2b7568ef7b9fece3
SHA1: ce64ace8cc4e0728cb65fb2bf330c9922fdc6dd4

Identifiers

  • None

org.eclipse.equinox.p2.transport.ecf_1.2.0.v20180222-0922.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.transport.ecf_1.2.0.v20180222-0922.jar
MD5: ed8f53b3908d4c890eac27755347318e
SHA1: 06e78575dad0dcc2fa309af844083c74a7ff25c3

Identifiers

CVE-2010-4647  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp.

Vulnerable Software & Versions: (show all)

CVE-2008-7271  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.

Vulnerable Software & Versions: (show all)

org.eclipse.equinox.p2.ui.sdk.scheduler_1.4.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler_1.4.0.v20180302-1057.jar
MD5: d9360da2b3640859f9ea3c11af997ff9
SHA1: ca1de8d126764442296915c0f401e18aa0c2f0a2

Identifiers

  • None

org.eclipse.equinox.p2.ui.sdk_1.1.0.v20180103-0918.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.ui.sdk_1.1.0.v20180103-0918.jar
MD5: 6b5d42ad553d052d501e00f95b864963
SHA1: 37028488d8baf1989f8fed36f0afb157addb8df9

Identifiers

  • None

org.eclipse.equinox.p2.ui_2.5.100.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.ui_2.5.100.v20180302-1057.jar
MD5: 60cfbbec8431416c7eb48b4b2fc32835
SHA1: 732c2b409bb31890407ddefe41fcbbd31f7c90c1

Identifiers

  • None

org.eclipse.equinox.p2.updatechecker_1.2.0.v20180302-1057.jar

File Path: C:\birt\plugins\org.eclipse.equinox.p2.updatechecker_1.2.0.v20180302-1057.jar
MD5: d5378684f5b028bd1becf49eb09c6491
SHA1: 54eedd5b7a5cb384fbf2de5dc65f0e6a3f88f6fb

Identifiers

  • None

org.eclipse.equinox.preferences_3.7.100.v20180223-1719.jar

File Path: C:\birt\plugins\org.eclipse.equinox.preferences_3.7.100.v20180223-1719.jar
MD5: c5950ccb0e5bb676db92bd998de318e7
SHA1: 30a99b20838996ec928c3b400a91f2ca7904c178

Identifiers

  • None

org.eclipse.equinox.registry_3.8.0.v20180228-1547.jar

File Path: C:\birt\plugins\org.eclipse.equinox.registry_3.8.0.v20180228-1547.jar
MD5: f9e204d7e173bb70e4aaf4ba57881a18
SHA1: f7b9e52ab27b366f2c42172c6a05e93ba0741d40

Identifiers

  • None

org.eclipse.equinox.security.ui_1.2.0.v20171221-2204.jar

File Path: C:\birt\plugins\org.eclipse.equinox.security.ui_1.2.0.v20171221-2204.jar
MD5: 1b9c93f6835b1c3fefb018399d58070c
SHA1: 21b7d3ec9b9e52c33f72ab44ef087f10ae99516a

Identifiers

  • None

org.eclipse.equinox.security_1.2.400.v20171221-2204.jar

File Path: C:\birt\plugins\org.eclipse.equinox.security_1.2.400.v20171221-2204.jar
MD5: fe534a9dd482bb3ac89d6aec3243874f
SHA1: 6c4862a7e3ed0833cb8e37e1ea8c409f31110a6f

Identifiers

  • None

org.eclipse.equinox.simpleconfigurator.manipulator_2.1.0.v20180103-0918.jar

File Path: C:\birt\plugins\org.eclipse.equinox.simpleconfigurator.manipulator_2.1.0.v20180103-0918.jar
MD5: a2a300ae036bc829308fd6f37e7fa294
SHA1: 54eb1135fb4e6f4553209c4b1f5cb294e76ad443

Identifiers

  • None

org.eclipse.equinox.simpleconfigurator_1.3.0.v20180119-2027.jar

File Path: C:\birt\plugins\org.eclipse.equinox.simpleconfigurator_1.3.0.v20180119-2027.jar
MD5: e9f418c860858454464896c713a3ea2a
SHA1: 04c1570345bc4831e668d9696c1ba11a5bfc2c62

Identifiers

  • None

org.eclipse.gef_3.11.0.201606061308.jar

File Path: C:\birt\plugins\org.eclipse.gef_3.11.0.201606061308.jar
MD5: 7fd24e345da40c83486c7050435dd46e
SHA1: c02efd73f3ed9041719e3f78cfd9d97c61724f53

Identifiers

  • maven: org.eclipse.gef.plugins:org.eclipse.gef:3.11.0-SNAPSHOT   Confidence:HIGH

org.eclipse.help.base_4.2.200.v20180308-0630.jar

File Path: C:\birt\plugins\org.eclipse.help.base_4.2.200.v20180308-0630.jar
MD5: 21100684b1f6826ca005c99d1c804c56
SHA1: b6eba614234ba21c9434fc64dd3342d2d72ff353

Identifiers

  • None

org.eclipse.help.base_4.2.200.v20180308-0630.jar: helpbase-ant.jar

File Path: C:\birt\plugins\org.eclipse.help.base_4.2.200.v20180308-0630.jar\ant_tasks\helpbase-ant.jar
MD5: 4b278187568f7aeefed29fa1ad79cebe
SHA1: f10b7a86d6318baf21a1aa0aafdbdd9d53d2b9d6

Identifiers

  • None

org.eclipse.help.ui_4.1.100.v20180131-1334.jar

File Path: C:\birt\plugins\org.eclipse.help.ui_4.1.100.v20180131-1334.jar
MD5: ddd5caa865faceac0c2026394835b175
SHA1: 99e905f8f1fcaa19319d46b010eb85b317623a29

Identifiers

  • None

org.eclipse.help.webapp_3.9.100.v20171201-0704.jar

File Path: C:\birt\plugins\org.eclipse.help.webapp_3.9.100.v20171201-0704.jar
MD5: 13bf695d11637329de4a246d0aa38439
SHA1: 9d6e5be32f17c884cb73b98d1a6ddb867e96dfdb

Identifiers

  • None

org.eclipse.help_3.8.100.v20180117-0803.jar

File Path: C:\birt\plugins\org.eclipse.help_3.8.100.v20180117-0803.jar
MD5: b1acc29e2b8e1afcee748c01b6e44ee5
SHA1: 2ad214b7b9a83f54b27334d468bb8d4c1f2056fe

Identifiers

  • None

org.eclipse.jetty.io_9.4.8.v20171121.jar

Description: Jetty module for Jetty :: IO Utility

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.php
File Path: C:\birt\plugins\org.eclipse.jetty.io_9.4.8.v20171121.jar
MD5: 6e05aa2303b72049fc3c496ef30a6783
SHA1: 0125186fc18ce2525153f1b0614623d3bfb43896

Identifiers

  • maven: org.eclipse.jetty:jetty-io:9.4.8.v20171121   Confidence:HIGH

org.eclipse.jetty.xml_9.4.8.v20171121.jar

Description: The jetty xml utilities.

License:

http://www.apache.org/licenses/LICENSE-2.0, http://www.eclipse.org/org/documents/epl-v10.php
File Path: C:\birt\plugins\org.eclipse.jetty.xml_9.4.8.v20171121.jar
MD5: 55ebb416ad38b168658383dd285f3951
SHA1: bf598f54cd8ee2939ffc5c60f4795afa7c22608f

Identifiers

  • cpe: cpe:/a:eclipse:jetty:9.4.8.v20171121   Confidence:LOW   
  • cpe: cpe:/a:jetty:jetty:9.4.8.v20171121   Confidence:LOW   
  • maven: org.eclipse.jetty:jetty-xml:9.4.8.v20171121   Confidence:HIGH

org.eclipse.jface.databinding_1.8.200.v20180129-1004.jar

File Path: C:\birt\plugins\org.eclipse.jface.databinding_1.8.200.v20180129-1004.jar
MD5: 13df30727dfb3192bd887d550289eff2
SHA1: 1128286a1de74c2f410aa552120e73e97f11750a

Identifiers

  • None

org.eclipse.jface.text_3.13.0.v20180307-1059.jar

File Path: C:\birt\plugins\org.eclipse.jface.text_3.13.0.v20180307-1059.jar
MD5: 9423ca4204d8f54ad8a6b5fe83e29f60
SHA1: 0a35533c19302157fe6b1ffd9f579a4311d13032

Identifiers

  • None

org.eclipse.jface_3.14.0.v20180302-0704.jar

File Path: C:\birt\plugins\org.eclipse.jface_3.14.0.v20180302-0704.jar
MD5: 032fd9668ad5901fe7b50e5cfcf224fa
SHA1: 27f1f880fc69acc720c001ac7efe870cd44605a0

Identifiers

  • None

org.eclipse.ltk.core.refactoring_3.9.0.v20180220-2105.jar

File Path: C:\birt\plugins\org.eclipse.ltk.core.refactoring_3.9.0.v20180220-2105.jar
MD5: d7c6d138d75d63cb236342ba77471f1c
SHA1: 25bfb9ebf5116a67962a64ed29b5a8e29b4ab613

Identifiers

  • None

org.eclipse.orbit.mongodb_3.2.2.v20170222-2110.jar

File Path: C:\birt\plugins\org.eclipse.orbit.mongodb_3.2.2.v20170222-2110.jar
MD5: 4c85887ef0048c3cc23e76c0f3da8802
SHA1: a3a257e84816eccc47718511758bf2a37cb90368

Identifiers

  • cpe: cpe:/a:mongodb:mongodb:3.2.2   Confidence:HIGHEST   
  • maven: org.eclipse.orbit.bundles:org.eclipse.orbit.mongodb:3.2.2-SNAPSHOT   Confidence:HIGH

CVE-2017-2665  

Severity: Low
CVSS Score: 1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-255 Credentials Management

The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.

Vulnerable Software & Versions: (show all)

CVE-2016-6494  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
CWE: CWE-200 Information Exposure

The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.

Vulnerable Software & Versions: (show all)

CVE-2014-8180  

Severity: Low
CVSS Score: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-287 Improper Authentication

MongoDB on Red Hat Satellite 6 allows local users to bypass authentication by logging in with an empty password and delete information which can cause a Denial of Service.

Vulnerable Software & Versions:

org.eclipse.osgi.services_3.7.0.v20180223-1712.jar

Description: %osgiServicesDes

File Path: C:\birt\plugins\org.eclipse.osgi.services_3.7.0.v20180223-1712.jar
MD5: ae9dc223ec9fe198437f83d4f4442166
SHA1: 3af1cd8ae7b7def1f75caca8426f2f883711cef3

Identifiers

  • None

org.eclipse.osgi.util_3.5.0.v20180219-1511.jar

Description: %osgiUtilDes

File Path: C:\birt\plugins\org.eclipse.osgi.util_3.5.0.v20180219-1511.jar
MD5: 8599ee220e59e1f7899eea075e71c3a3
SHA1: 2a4a95a956dde4790668d25e5993472d60456b20

Identifiers

  • None

org.eclipse.osgi_3.13.0.v20180226-1711.jar

Description: %systemBundle

File Path: C:\birt\plugins\org.eclipse.osgi_3.13.0.v20180226-1711.jar
MD5: 83dc82d793d209074783f075455ab6d0
SHA1: 8f3ad90611b64d35429e2339787da34c652151ff

Identifiers

  • None

org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar

File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar
MD5: 3da318ccdf7df18219e337d18cb8c62d
SHA1: 55dd3e52dfa700e32c3e6ae61cb976ece6fcb6a6

Identifiers

  • None

org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar: swt-awt-win32-4860.dll

File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar\swt-awt-win32-4860.dll
MD5: 22bf6261e7ca41c47505d66a38fd24fd
SHA1: db29d2105fcf6442498ef1fb1270fac441afb00f

Identifiers

  • None

org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar: swt-gdip-win32-4860.dll

File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar\swt-gdip-win32-4860.dll
MD5: 4fde24680dfa2ac4ccde24d8e01b493b
SHA1: d56b93c93fc33da371e2ecdf635eb6e7220bb78e

Identifiers

  • None

org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar: swt-wgl-win32-4860.dll

File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar\swt-wgl-win32-4860.dll
MD5: c03d0c9f451c562e724f769b8c0da5ed
SHA1: a05fbb65f34c645107bb80614d57cea6d6731986

Identifiers

  • None

org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar: swt-win32-4860.dll

File Path: C:\birt\plugins\org.eclipse.swt.win32.win32.x86_64_3.107.0.v20180308-0607.jar\swt-win32-4860.dll
MD5: 9759304e2cc294409f839ca4c6b2905a
SHA1: 1a35e21ab95eb69760b0b4156891c67434b91b46

Identifiers

  • None

org.eclipse.swt_3.107.0.v20180308-0607.jar

File Path: C:\birt\plugins\org.eclipse.swt_3.107.0.v20180308-0607.jar
MD5: 0cd1bf2a5b483e540b06addc7a696e64
SHA1: d508f213d99fc4a49596350db837aa8703d2a583

Identifiers

  • None

org.eclipse.text_3.6.300.v20180302-0849.jar

File Path: C:\birt\plugins\org.eclipse.text_3.6.300.v20180302-0849.jar
MD5: fb329b43ddaa28f8ed382324dc219a8f
SHA1: f10745a522d4ad1a7cbbecc55e930ef2347c0dda

Identifiers

  • None

org.eclipse.ui.browser_3.6.200.v20180301-2011.jar

File Path: C:\birt\plugins\org.eclipse.ui.browser_3.6.200.v20180301-2011.jar
MD5: 9eed693cdbc9a25bc9cb06777f2fb2b3
SHA1: db2e19245c17bc27259d9b5ec7d80a4ce7efbdea

Identifiers

  • None

org.eclipse.ui.cheatsheets_3.5.200.v20171201-0704.jar

File Path: C:\birt\plugins\org.eclipse.ui.cheatsheets_3.5.200.v20171201-0704.jar
MD5: 1498c33e4385d6834d37c3d28b341aa5
SHA1: ad3e40a36270775f3434f4cc03b1bd38ce5bdcde

Identifiers

  • None

org.eclipse.ui.forms_3.7.200.v20180220-2000.jar

File Path: C:\birt\plugins\org.eclipse.ui.forms_3.7.200.v20180220-2000.jar
MD5: f3f1adf3184de286cd9fe472262a937f
SHA1: a8bc153ad5a20e6d19f83f6d2fff4fa2a95d0661

Identifiers

  • None

org.eclipse.ui.navigator_3.7.100.v20180127-2148.jar

File Path: C:\birt\plugins\org.eclipse.ui.navigator_3.7.100.v20180127-2148.jar
MD5: b797c4d40f6b44ae0d7f6d35129f7969
SHA1: 4d7aafb8701096e5af8ad2d31e7b95452443ce5f

Identifiers

  • None

org.eclipse.ui.views_3.9.100.v20180228-1600.jar

File Path: C:\birt\plugins\org.eclipse.ui.views_3.9.100.v20180228-1600.jar
MD5: 42a5154ebc481c209518fe294a1df653
SHA1: 94fb3b4d7a7cbb4fffe6a1f4c14e39a9ee1d51f1

Identifiers

  • cpe: cpe:/a:views_project:views:3.9.100.v20180228   Confidence:LOW   

org.eclipse.ui.workbench.texteditor_3.11.0.v20180222-0920.jar

File Path: C:\birt\plugins\org.eclipse.ui.workbench.texteditor_3.11.0.v20180222-0920.jar
MD5: db68191f996e1daad74aa6727f1e10e1
SHA1: 295a8b521616c31b1cf200fc006f1de8a299ce70

Identifiers

  • None

org.eclipse.ui.workbench_3.111.0.v20180302-1831.jar

File Path: C:\birt\plugins\org.eclipse.ui.workbench_3.111.0.v20180302-1831.jar
MD5: 652a44bb058faddf277724e9aab9c473
SHA1: 1491cbe088f165d142333734948cbcc260e7ec65

Identifiers

CVE-2008-7271  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE, possibly 3.3.2, allow remote attackers to inject arbitrary web script or HTML via (1) the searchWord parameter to help/advanced/searchView.jsp or (2) the workingSet parameter in an add action to help/advanced/workingSetManager.jsp, a different issue than CVE-2010-4647.

Vulnerable Software & Versions: (show all)

org.eclipse.ui_3.109.100.v20180228-1600.jar

File Path: C:\birt\plugins\org.eclipse.ui_3.109.100.v20180228-1600.jar
MD5: 1e17a7a79ac83047e9f4216e2eaec6c7
SHA1: 88301f344884b07167fe68321b4be873dc858c3d

Identifiers

  • None

org.eclipse.update.configurator_3.4.0.v20171211-1115.jar

File Path: C:\birt\plugins\org.eclipse.update.configurator_3.4.0.v20171211-1115.jar
MD5: 07124def355f59c8caaaaaa6c0d05d03
SHA1: 33789a53d64e9f31c3cc6898c7cad57844764322

Identifiers

  • None

org.mozilla.javascript_1.7.5.v201504281450.jar

File Path: C:\birt\plugins\org.mozilla.javascript_1.7.5.v201504281450.jar
MD5: 7c605a1b0b2d489aec7ed1b4f44ac26f
SHA1: dbd067fe2a3c4caec6326ec366b505b76fe73743

Identifiers

  • None

org.sat4j.core_2.3.5.v201308161310.jar

File Path: C:\birt\plugins\org.sat4j.core_2.3.5.v201308161310.jar
MD5: 797ce277f3dd2acb14f066fc1da203b9
SHA1: b692e87cf65442eff2125f48500ba7150ed7810d

Identifiers

  • None

org.sat4j.pb_2.3.5.v201404071733.jar

File Path: C:\birt\plugins\org.sat4j.pb_2.3.5.v201404071733.jar
MD5: 76494edaecd18849bb6044f6bda5fc9e
SHA1: b3350e59a5e2a8a36b8c631b6e1cf0627cb2df78

Identifiers

  • None

org.tukaani.xz_1.8.0.v20180207-1613.jar

File Path: C:\birt\plugins\org.tukaani.xz_1.8.0.v20180207-1613.jar
MD5: cdbc6c373260d18c753098881deab30f
SHA1: 0b50fc159568d334ff9c3a712cf6386d3038295d

Identifiers

  • cpe: cpe:/a:tukaani:xz:1.8.0   Confidence:LOW   
  • maven: org.eclipse.orbit.bundles:org.tukaani.xz:1.8.0-SNAPSHOT   Confidence:HIGH

CVE-2015-4035  

Severity: Medium
CVSS Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation

scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.

Vulnerable Software & Versions:

org.w3c.css.sac_1.3.1.v200903091627.jar

File Path: C:\birt\plugins\org.w3c.css.sac_1.3.1.v200903091627.jar
MD5: 72902273245b11d21039de8c10398844
SHA1: 8a9501900c6ed5d6da577bf9e947011319c8e512

Identifiers

  • None

org.w3c.dom.events_3.0.0.draft20060413_v201105210656.jar

File Path: C:\birt\plugins\org.w3c.dom.events_3.0.0.draft20060413_v201105210656.jar
MD5: f78c10bd77b8c842cae88e8988378e23
SHA1: 381ff9d23c3d8d92b420ea84e22dbeb0c6fe20d4

Identifiers

  • None

org.w3c.dom.smil_1.0.1.v200903091627.jar

File Path: C:\birt\plugins\org.w3c.dom.smil_1.0.1.v200903091627.jar
MD5: 3bc1ea6fc7920fbdb728dfcc58612479
SHA1: 752f7970735ab40b4af6f8be3266b17e468fea86

Identifiers

  • None

org.w3c.dom.svg.extension_1.1.0.v201803131913.jar

File Path: C:\birt\plugins\org.w3c.dom.svg.extension_1.1.0.v201803131913.jar
MD5: 8b851ff9d0cbd5e2b96460e04bcb8e64
SHA1: ad3fd8e6f0cefd3ea0029f2526dc503c0de0f272

Identifiers

  • None

org.w3c.dom.svg_1.1.0.v201011041433.jar

File Path: C:\birt\plugins\org.w3c.dom.svg_1.1.0.v201011041433.jar
MD5: 82e4a20bab6cb9ca8324defc887bc8a6
SHA1: ea6041ad2cce77784d6b33e0ce01dacd4f545b28

Identifiers

  • None

flute.jar

File Path: C:\birt\plugins\org.w3c.sac_1.3.0.v201803131913\lib\flute.jar
MD5: a5655b62866e8beefa56cb0b9bb4abc4
SHA1: 9fd999a48fefad8c38951d50519f0668a3d107fb

Identifiers

  • None

commons-codec-1.5.jar

Description:  The codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\birt\plugins\uk.co.spudsoft.birt.emitters.excel_4.8.0.v201803131913\lib\commons-codec-1.5.jar
MD5: e2c89a40a4c39ba5eddcac0adf960b0f
SHA1: 834d49afdfc26fcaf19c539f0e9cfb521787ce88

Identifiers

  • maven: commons-codec:commons-codec:1.5   Confidence:HIGH

dom4j-1.6.1.jar

File Path: C:\birt\plugins\uk.co.spudsoft.birt.emitters.excel_4.8.0.v201803131913\lib\dom4j-1.6.1.jar
MD5: 252d2b4dea63a9f795832dadb409e1f4
SHA1: 9ef47b4f0ca34117e3b28600ad042200483c8201

Identifiers

CVE-2018-1000632  

Severity: Medium
CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CWE: CWE-91 XML Injection (aka Blind XPath Injection)

dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.

Vulnerable Software & Versions: (show all)

poi-ooxml-3.9-20121203.jar

File Path: C:\birt\plugins\uk.co.spudsoft.birt.emitters.excel_4.8.0.v201803131913\lib\poi-ooxml-3.9-20121203.jar
MD5: acd566068cdbee11ce9f8aacef8b9f0d
SHA1: 4d4a5ca6603ade790b8c133595db268a16c4ae20

Identifiers

CVE-2017-5644  

Severity: High
CVSS Score: 7.1 (AV:N/AC:M/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors

Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

Vulnerable Software & Versions:

CVE-2017-12626  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).

Vulnerable Software & Versions: (show all)

CVE-2016-5000  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CWE: CWE-611 Improper Restriction of XML External Entity Reference ('XXE')

The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions:

CVE-2014-9527  

Severity: Medium
CVSS Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CWE: CWE-399 Resource Management Errors

HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.

Vulnerable Software & Versions:

CVE-2014-3574  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.

Vulnerable Software & Versions: (show all)

CVE-2014-3529  

Severity: Medium
CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vulnerable Software & Versions: (show all)

xmlbeans-2.3.0.jar

File Path: C:\birt\plugins\uk.co.spudsoft.birt.emitters.excel_4.8.0.v201803131913\lib\xmlbeans-2.3.0.jar
MD5: fe76fc5187474d83be998901ab5a1462
SHA1: b0ec90720c0127ca98664a79575e4c8238dde27e

Identifiers

  • None


This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the Node Security Platform.