Created
January 24, 2025 14:32
-
-
Save carlspring/e4fc0e00d94dfc42e9afc831fb52dfa1 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json", | |
"version": "2.1.0", | |
"runs": [ | |
{ | |
"tool": { | |
"driver": { | |
"name": "Mend.io: Dependency Vulnerability Scanner", | |
"rules": [ | |
{ | |
"id": "CVE-2018-19362", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-19362", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-19362" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.9.8" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36189", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36189", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36189" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2996", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2018-12023", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-12023", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-12023" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.7.9.4, 2.8.11.2, 2.9.6" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-16335", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-16335", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-16335" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-85cw-hj65-qqv9", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2022-42003", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2022-42003", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2022-42003" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.12.7.1,2.13.4.2" | |
}, | |
"helpUri": "https://github.com/advisories/GHSA-jjjh-jjxp-wpff", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-14060", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-14060", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-14060" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.0" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36187", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36187", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36187" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2997", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-24750", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-24750", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-24750" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.6" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36183", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36183", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36183" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/3003", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-11111", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-11111", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11111" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4,2.10.0" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-14195", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-14195", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-14195" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.5" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2021-20190", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2021-20190", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2021-20190" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind-2.9.10.7" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2854", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-17267", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-17267", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-17267" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.8.11.5,2.9.10" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2460", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2018-14720", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-14720", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-14720" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.7" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-x2w5-5m2g-7h5m", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2019-12814", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-12814", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-12814" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2341", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2020-9547", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-9547", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-9547" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.6,2.9.10.4" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-q93h-jc49-78gg", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-10673", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-10673", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10673" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2660", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2018-12022", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-12022", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-12022" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.7.9.4, 2.8.11.2, 2.9.6" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-20330", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-20330", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-20330" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.5,2.9.10.2" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2526", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-14061", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-14061", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-14061" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.0" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-11620", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-11620", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11620" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36184", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36184", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36184" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2998", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-10202", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-10202", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-10202" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.0.0" | |
}, | |
"helpUri": "https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36180", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36180", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36180" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/3004", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2018-14721", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-14721", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-14721" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.5,2.8.11.3,2.9.7" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2018-19360", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-19360", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-19360" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.8" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-f9hv-mg5h-xcw9", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36518", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36518", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36518" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.12.6.1,2.13.2.1" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2816", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-10672", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-10672", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10672" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version jackson-databind-2.9.10.4" | |
}, | |
"helpUri": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36179", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36179", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36179" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/3004", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-14893", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-14893", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14893" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.0" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-9546", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-9546", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-9546" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.3" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-9548", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-9548", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-9548" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.6,2.9.10.4" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-10969", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-10969", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10969" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.8.11.6;com.fasterxml.jackson.core:jackson-databind:2.7.9.7" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36185", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36185", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36185" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2998", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-14062", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-14062", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-14062" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.0" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36181", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36181", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36181" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/3004", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-11619", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-11619", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11619" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-35491", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-35491", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-35491" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2986", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-14379", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-14379", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14379" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.6,2.8.11.4,2.9.9.2" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-6fpp-rgj9-8rwc", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2019-16943", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-16943", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-16943" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10.1" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-fmmc-742q-jg75", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2019-17531", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-17531", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-17531" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10.1" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-gjmw-vf9h-g25v", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-11113", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-11113", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11113" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4;2.10.0" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-12086", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-12086", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-12086" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.9.9" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2018-19361", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-19361", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-19361" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.8" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-mx9v-gmh4-mgqw", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-24616", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-24616", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-24616" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.9.10.6" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-25649", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-25649", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-25649" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.4,2.9.10.7,2.10.5.1,2.11.0.rc1" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2589", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2018-14718", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-14718", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-14718" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.7" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-645p-88qh-w398", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2018-11307", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-11307", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-11307" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version jackson-databind-2.9.6" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2032", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36188", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36188", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36188" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2996", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-14892", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-14892", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14892" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-cf6r-3wgc-h863", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36186", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36186", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36186" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2997", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2022-42004", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2022-42004", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2022-42004" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.13.4" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/3582", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-10968", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-10968", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10968" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version jackson-databind-2.9.10.4" | |
}, | |
"helpUri": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-8840", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-8840", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-8840" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.3" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2620", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2019-12384", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-12384", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-12384" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.9.9.1" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2020-36182", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-36182", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36182" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/3004", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-10650", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-10650", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10650" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4" | |
}, | |
"helpUri": "https://github.com/advisories/GHSA-rpr3-cw39-3pxh", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-35728", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-35728", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-35728" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35728", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-35490", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-35490", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-35490" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-databind/issues/2986", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-14540", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-14540", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14540" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-h822-r4r5-v8jg", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2019-16942", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-16942", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-16942" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10.1" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-mx7p-6679-8g3q", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2020-11112", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2020-11112", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11112" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4,2.10.0" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2019-14439", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2019-14439", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14439" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.9.9.2" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2018-14719", | |
"name": "jackson-databind-2.9.5.jar is affected by CVE-2018-14719", | |
"shortDescription": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-14719" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.7" | |
}, | |
"helpUri": "https://osv.dev/vulnerability/GHSA-4gq5-ch57-c2mg", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "WS-2022-0468", | |
"name": "jackson-core-2.9.5.jar is affected by WS-2022-0468", | |
"shortDescription": { | |
"text": "jackson-core-2.9.5.jar is affected by WS-2022-0468" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version com.fasterxml.jackson.core:jackson-core:2.15.0" | |
}, | |
"helpUri": "https://github.com/FasterXML/jackson-core/issues/861", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2015-7501", | |
"name": "commons-collections-3.2.1.jar is affected by CVE-2015-7501", | |
"shortDescription": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2015-7501" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version commons-collections:commons-collections:3.2.2;org.apache.commons:commons-collections4:4.1" | |
}, | |
"helpUri": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2015-4852", | |
"name": "commons-collections-3.2.1.jar is affected by CVE-2015-4852", | |
"shortDescription": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2015-4852" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version commons-collections:commons-collections:3.2.2" | |
}, | |
"helpUri": "https://www.openwall.com/lists/oss-security/2015/11/17/19", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2019-13116", | |
"name": "commons-collections-3.2.1.jar is affected by CVE-2019-13116", | |
"shortDescription": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2019-13116" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version commons-collections:commons-collections:3.2.2" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13116", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2015-6420", | |
"name": "commons-collections-3.2.1.jar is affected by CVE-2015-6420", | |
"shortDescription": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2015-6420" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version commons-collections:commons-collections3.2.2,org.apache.commons:commons-collections4:4.1" | |
}, | |
"helpUri": "https://github.com/apache/commons-collections/tree/collections-3.2.2,https://github.com/apache/commons-collections/tree/collections-4.1", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2017-15708", | |
"name": "commons-collections-3.2.1.jar is affected by CVE-2017-15708", | |
"shortDescription": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2017-15708" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.synapse:Apache-Synapse:3.0.1;commons-collections:commons-collections:3.2.2" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15708", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2017-9801", | |
"name": "commons-email-1.1.jar is affected by CVE-2017-9801", | |
"shortDescription": { | |
"text": "commons-email-1.1.jar is affected by CVE-2017-9801" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 1.5" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9801", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2018-1294", | |
"name": "commons-email-1.1.jar is affected by CVE-2018-1294", | |
"shortDescription": { | |
"text": "commons-email-1.1.jar is affected by CVE-2018-1294" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.commons:commons-email:1.5" | |
}, | |
"helpUri": "https://github.com/advisories/GHSA-v7cm-w955-pj6g", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2023-41835", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2023-41835", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2023-41835" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.5.32,6.1.2.2,6.3.0.1" | |
}, | |
"helpUri": "https://www.cve.org/CVERecord?id=CVE-2023-41835", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2024-53677", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2024-53677", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2024-53677" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:6.4.0" | |
}, | |
"helpUri": "https://cwiki.apache.org/confluence/display/WW/S2-067", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2016-4003", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-4003", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4003" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.28" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_28/", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2019-0230", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2019-0230", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2019-0230" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.5.22" | |
}, | |
"helpUri": "https://cwiki.apache.org/confluence/display/ww/s2-059", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2016-4436", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-4436", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4436" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.29,org.apache.struts:struts2-core:2.5.1.3" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_29/", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2021-31805", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2021-31805", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2021-31805" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.5.30" | |
}, | |
"helpUri": "https://cwiki.apache.org/confluence/display/WW/S2-062", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2016-4430", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-4430", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4430" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.29" | |
}, | |
"helpUri": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4430", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2015-2992", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2015-2992", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2015-2992" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.20.1" | |
}, | |
"helpUri": "https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2992", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2015-5209", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2015-5209", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2015-5209" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.3.24.1" | |
}, | |
"helpUri": "https://nvd.nist.gov/vuln/detail/CVE-2015-5209", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2015-5169", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2015-5169", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2015-5169" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 2.3.20" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5169", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2016-3093", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-3093", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-3093" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.28,ognl:ognl:3.0.12" | |
}, | |
"helpUri": "https://nvd.nist.gov/vuln/detail/CVE-2016-3093", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2016-3082", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-3082", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-3082" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.20.3,org.apache.struts:struts2-core:2.3.24.3,org.apache.struts:struts2-core: 2.3.28.1" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_28_1/", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2023-50164", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2023-50164", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2023-50164" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.5.33,6.3.0.2" | |
}, | |
"helpUri": "https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2016-3087", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-3087", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-3087" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.20.3,org.apache.struts:struts2-core:2.3.24.3,org.apache.struts:struts2-core: 2.3.28.1" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_28_1/", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2023-34149", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2023-34149", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2023-34149" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.5.31,6.1.2.1" | |
}, | |
"helpUri": "https://github.com/advisories/GHSA-8f6x-v685-g2xc", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2018-11776", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2018-11776", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2018-11776" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core - 2.3.35,2.5.17;org.apache.struts:struts2-rest-plugin - 2.3.34,2.5.17" | |
}, | |
"helpUri": "https://nvd.nist.gov/vuln/detail/CVE-2018-11776", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2017-9787", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2017-9787", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2017-9787" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.33,org.apache.struts:struts2-core:2.5.12" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_33/", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2016-6795", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-6795", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-6795" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.31,org.apache.struts:struts2-core:2.5.5" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_31/", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2016-4465", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-4465", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4465" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.29, \torg.apache.struts.xwork:xwork-core:2.3.29" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_29/", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2019-0233", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2019-0233", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2019-0233" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.5.22" | |
}, | |
"helpUri": "https://cwiki.apache.org/confluence/display/ww/s2-060", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2017-12611", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2017-12611", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2017-12611" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.34;org.apache.struts:struts2-core:2.5.12" | |
}, | |
"helpUri": "https://cwiki.apache.org/confluence/display/WW/S2-053", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2016-4433", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-4433", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4433" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.29,\torg.apache.struts.xwork:xwork-core:2.3.29" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_29", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2016-4431", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-4431", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4431" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.29" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_29/", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2016-3081", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2016-3081", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-3081" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.20.3,org.apache.struts:struts2-core:2.3.24.3,org.apache.struts:struts2-core: 2.3.28.1" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_28_1/", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2020-17530", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2020-17530", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2020-17530" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.5.26" | |
}, | |
"helpUri": "https://cwiki.apache.org/confluence/display/WW/S2-061", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2017-5638", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2017-5638", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2017-5638" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.32,org.apache.struts:struts2-core:2.5.10.1" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_32/", | |
"properties": { | |
"severity": "CRITICAL" | |
} | |
}, | |
{ | |
"id": "CVE-2017-9804", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2017-9804", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2017-9804" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.34,org.apache.struts:struts2-core:2.5.13" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_34/", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2023-34396", | |
"name": "struts2-core-2.3.20.jar is affected by CVE-2023-34396", | |
"shortDescription": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2023-34396" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.5.31,6.1.2.1" | |
}, | |
"helpUri": "https://github.com/advisories/GHSA-4g42-gqrg-4633", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2016-3092", | |
"name": "commons-fileupload-1.3.1.jar is affected by CVE-2016-3092", | |
"shortDescription": { | |
"text": "commons-fileupload-1.3.1.jar is affected by CVE-2016-3092" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M8,8.5.3,8.0.36,7.0.70,org.apache.tomcat:tomcat-coyote:9.0.0.M8,8.5.3,8.0.36,7.0.70,commons-fileupload:commons-fileupload:1.3.2" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2016-1000031", | |
"name": "commons-fileupload-1.3.1.jar is affected by CVE-2016-1000031", | |
"shortDescription": { | |
"text": "commons-fileupload-1.3.1.jar is affected by CVE-2016-1000031" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version 1.3.3" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "WS-2014-0034", | |
"name": "commons-fileupload-1.3.1.jar is affected by WS-2014-0034", | |
"shortDescription": { | |
"text": "commons-fileupload-1.3.1.jar is affected by WS-2014-0034" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version commons-fileupload:commons-fileupload:1.4" | |
}, | |
"helpUri": "https://github.com/apache/commons-fileupload/commit/5b4881d7f75f439326f54fa554a9ca7de6d60814", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2023-24998", | |
"name": "commons-fileupload-1.3.1.jar is affected by CVE-2023-24998", | |
"shortDescription": { | |
"text": "commons-fileupload-1.3.1.jar is affected by CVE-2023-24998" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version commons-fileupload:commons-fileupload:1.5;org.apache.tomcat:tomcat-coyote:8.5.85,9.0.71,10.1.5,11.0.0-M3;org.apache.tomcat.embed:tomcat-embed-core:8.5.85,9.0.71,10.1.5,11.0.0-M3;org.apache.tomcat:tomcat-util:8.5.85,9.0.71,10.1.5,11.0.0-M3;org.apache.tomcat:tomcat-catalina:8.5.85,9.0.71,10.1.5,11.0.0-M3" | |
}, | |
"helpUri": "https://tomcat.apache.org/security-10.html", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2024-47554", | |
"name": "commons-io-2.2.jar is affected by CVE-2024-47554", | |
"shortDescription": { | |
"text": "commons-io-2.2.jar is affected by CVE-2024-47554" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version commons-io:commons-io:2.14.0" | |
}, | |
"helpUri": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2021-29425", | |
"name": "commons-io-2.2.jar is affected by CVE-2021-29425", | |
"shortDescription": { | |
"text": "commons-io-2.2.jar is affected by CVE-2021-29425" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version commons-io:commons-io:2.7" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2016-0785", | |
"name": "xwork-core-2.3.20.jar is affected by CVE-2016-0785", | |
"shortDescription": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2016-0785" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts.xwork:xwork-core:2.3.28" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_28", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2016-4461", | |
"name": "xwork-core-2.3.20.jar is affected by CVE-2016-4461", | |
"shortDescription": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2016-4461" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts:struts2-core:2.3.29" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_29/", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2016-2162", | |
"name": "xwork-core-2.3.20.jar is affected by CVE-2016-2162", | |
"shortDescription": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2016-2162" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts.xwork:xwork-core:2.3.25" | |
}, | |
"helpUri": "https://github.com/apache/struts/tree/STRUTS_2_3_25", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2015-1831", | |
"name": "xwork-core-2.3.20.jar is affected by CVE-2015-1831", | |
"shortDescription": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2015-1831" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.apache.struts.xwork:xwork-core - 2.3.20.1" | |
}, | |
"helpUri": "https://nvd.nist.gov/vuln/detail/CVE-2015-1831", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2021-22096", | |
"name": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2021-22096", | |
"shortDescription": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2021-22096" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.springframework:spring-core:5.2.18.RELEASE,5.3.12;org.springframework:spring-web:5.2.18.RELEASE,5.3.12;org.springframework:spring-webmvc:5.2.18.RELEASE,5.3.12;org.springframework:spring-webflux:5.2.18.RELEASE,5.3.12" | |
}, | |
"helpUri": "https://tanzu.vmware.com/security/cve-2021-22096", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2021-22060", | |
"name": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2021-22060", | |
"shortDescription": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2021-22060" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.springframework:spring-core:5.2.19, 5.3.14;org.springframework:spring-web:5.2.19, 5.3.14" | |
}, | |
"helpUri": "https://spring.io/security/cve-2021-22060", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2018-1272", | |
"name": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2018-1272", | |
"shortDescription": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2018-1272" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.springframework:spring-core:4.3.15.RELEASE,5.0.5.RELEASE;org.springframework:spring-web:4.3.15.RELEASE,5.0.5.RELEASE" | |
}, | |
"helpUri": "https://tanzu.vmware.com/security/cve-2018-1272", | |
"properties": { | |
"severity": "HIGH" | |
} | |
}, | |
{ | |
"id": "CVE-2018-1199", | |
"name": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2018-1199", | |
"shortDescription": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2018-1199" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.springframework.security:spring-security-web:4.1.5.RELEASE,4.2.4.RELEASE,5.0.1.RELEASE;org.springframework.security:spring-security-config:4.1.5.RELEASE,4.2.4.RELEASE,5.0.1.RELEASE;org.springframework:spring-core:4.3.14.RELEASE,5.0.3.RELEASE" | |
}, | |
"helpUri": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1199", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
}, | |
{ | |
"id": "CVE-2022-22970", | |
"name": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2022-22970", | |
"shortDescription": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2022-22970" | |
}, | |
"fullDescription": { | |
"text": "Upgrade to version org.springframework:spring-beans:5.2.22,5.3.20;org.springframework:spring-core:5.2.22,5.3.20" | |
}, | |
"helpUri": "https://tanzu.vmware.com/security/cve-2022-22970", | |
"properties": { | |
"severity": "MEDIUM" | |
} | |
} | |
] | |
} | |
}, | |
"results": [ | |
{ | |
"ruleId": "CVE-2018-19362", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-19362", | |
"markdown": "<b>Recommendations for [CVE-2018-19362](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362):</b><br/><br/>* Upgrade to version 2.9.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-19362)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-19362", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36189", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36189", | |
"markdown": "<b>Recommendations for [CVE-2020-36189](https://github.com/FasterXML/jackson-databind/issues/2996):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36189)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36189", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2996" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-12023", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-12023", | |
"markdown": "<b>Recommendations for [CVE-2018-12023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022):</b><br/><br/>* Upgrade to version 2.7.9.4, 2.8.11.2, 2.9.6.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-12023)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-12023", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-16335", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-16335", | |
"markdown": "<b>Recommendations for [CVE-2019-16335](https://osv.dev/vulnerability/GHSA-85cw-hj65-qqv9):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-16335)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-16335", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-85cw-hj65-qqv9" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2022-42003", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2022-42003", | |
"markdown": "<b>Recommendations for [CVE-2022-42003](https://github.com/advisories/GHSA-jjjh-jjxp-wpff):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.12.7.1,2.13.4.2.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2022-42003)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2022-42003", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/advisories/GHSA-jjjh-jjxp-wpff" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-14060", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-14060", | |
"markdown": "<b>Recommendations for [CVE-2020-14060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-14060)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-14060", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36187", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36187", | |
"markdown": "<b>Recommendations for [CVE-2020-36187](https://github.com/FasterXML/jackson-databind/issues/2997):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36187)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36187", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2997" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-24750", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-24750", | |
"markdown": "<b>Recommendations for [CVE-2020-24750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.6.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-24750)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-24750", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36183", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36183", | |
"markdown": "<b>Recommendations for [CVE-2020-36183](https://github.com/FasterXML/jackson-databind/issues/3003):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36183)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36183", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/3003" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-11111", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11111", | |
"markdown": "<b>Recommendations for [CVE-2020-11111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4,2.10.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-11111)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-11111", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-14195", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-14195", | |
"markdown": "<b>Recommendations for [CVE-2020-14195](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.5.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-14195)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-14195", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2021-20190", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2021-20190", | |
"markdown": "<b>Recommendations for [CVE-2021-20190](https://github.com/FasterXML/jackson-databind/issues/2854):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind-2.9.10.7.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2021-20190)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2021-20190", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2854" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-17267", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-17267", | |
"markdown": "<b>Recommendations for [CVE-2019-17267](https://github.com/FasterXML/jackson-databind/issues/2460):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.8.11.5,2.9.10.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-17267)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-17267", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2460" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-14720", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-14720", | |
"markdown": "<b>Recommendations for [CVE-2018-14720](https://osv.dev/vulnerability/GHSA-x2w5-5m2g-7h5m):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.7.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-14720)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-14720", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-x2w5-5m2g-7h5m" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-12814", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-12814", | |
"markdown": "<b>Recommendations for [CVE-2019-12814](https://github.com/FasterXML/jackson-databind/issues/2341):</b><br/><br/>* Upgrade to version 2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-12814)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-12814", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2341" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-9547", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-9547", | |
"markdown": "<b>Recommendations for [CVE-2020-9547](https://osv.dev/vulnerability/GHSA-q93h-jc49-78gg):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.6,2.9.10.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-9547)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-9547", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-q93h-jc49-78gg" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-10673", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10673", | |
"markdown": "<b>Recommendations for [CVE-2020-10673](https://github.com/FasterXML/jackson-databind/issues/2660):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-10673)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-10673", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2660" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-12022", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-12022", | |
"markdown": "<b>Recommendations for [CVE-2018-12022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022):</b><br/><br/>* Upgrade to version 2.7.9.4, 2.8.11.2, 2.9.6.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-12022)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-12022", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-20330", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-20330", | |
"markdown": "<b>Recommendations for [CVE-2019-20330](https://github.com/FasterXML/jackson-databind/issues/2526):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.5,2.9.10.2.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-20330)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-20330", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2526" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-14061", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-14061", | |
"markdown": "<b>Recommendations for [CVE-2020-14061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-14061)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-14061", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-11620", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11620", | |
"markdown": "<b>Recommendations for [CVE-2020-11620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-11620)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-11620", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36184", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36184", | |
"markdown": "<b>Recommendations for [CVE-2020-36184](https://github.com/FasterXML/jackson-databind/issues/2998):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36184)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36184", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2998" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-10202", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-10202", | |
"markdown": "<b>Recommendations for [CVE-2019-10202](https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.0.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-10202)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-10202", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36180", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36180", | |
"markdown": "<b>Recommendations for [CVE-2020-36180](https://github.com/FasterXML/jackson-databind/issues/3004):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36180)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36180", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/3004" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-14721", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-14721", | |
"markdown": "<b>Recommendations for [CVE-2018-14721](https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.5,2.8.11.3,2.9.7.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-14721)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-14721", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-19360", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-19360", | |
"markdown": "<b>Recommendations for [CVE-2018-19360](https://osv.dev/vulnerability/GHSA-f9hv-mg5h-xcw9):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-19360)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-19360", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-f9hv-mg5h-xcw9" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36518", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36518", | |
"markdown": "<b>Recommendations for [CVE-2020-36518](https://github.com/FasterXML/jackson-databind/issues/2816):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.12.6.1,2.13.2.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36518)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36518", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2816" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-10672", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10672", | |
"markdown": "<b>Recommendations for [CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672):</b><br/><br/>* Upgrade to version jackson-databind-2.9.10.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-10672)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-10672", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36179", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36179", | |
"markdown": "<b>Recommendations for [CVE-2020-36179](https://github.com/FasterXML/jackson-databind/issues/3004):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36179)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36179", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/3004" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-14893", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14893", | |
"markdown": "<b>Recommendations for [CVE-2019-14893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-14893)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-14893", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-9546", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-9546", | |
"markdown": "<b>Recommendations for [CVE-2020-9546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.3.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-9546)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-9546", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-9548", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-9548", | |
"markdown": "<b>Recommendations for [CVE-2020-9548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.6,2.9.10.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-9548)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-9548", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-10969", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10969", | |
"markdown": "<b>Recommendations for [CVE-2020-10969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.8.11.6;com.fasterxml.jackson.core:jackson-databind:2.7.9.7.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-10969)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-10969", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36185", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36185", | |
"markdown": "<b>Recommendations for [CVE-2020-36185](https://github.com/FasterXML/jackson-databind/issues/2998):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36185)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36185", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2998" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-14062", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-14062", | |
"markdown": "<b>Recommendations for [CVE-2020-14062](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.10.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-14062)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-14062", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36181", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36181", | |
"markdown": "<b>Recommendations for [CVE-2020-36181](https://github.com/FasterXML/jackson-databind/issues/3004):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36181)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36181", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/3004" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-11619", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11619", | |
"markdown": "<b>Recommendations for [CVE-2020-11619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-11619)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-11619", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-35491", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-35491", | |
"markdown": "<b>Recommendations for [CVE-2020-35491](https://github.com/FasterXML/jackson-databind/issues/2986):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-35491)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-35491", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2986" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-14379", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14379", | |
"markdown": "<b>Recommendations for [CVE-2019-14379](https://osv.dev/vulnerability/GHSA-6fpp-rgj9-8rwc):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.6,2.8.11.4,2.9.9.2.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-14379)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-14379", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-6fpp-rgj9-8rwc" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-16943", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-16943", | |
"markdown": "<b>Recommendations for [CVE-2019-16943](https://osv.dev/vulnerability/GHSA-fmmc-742q-jg75):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-16943)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-16943", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-fmmc-742q-jg75" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-17531", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-17531", | |
"markdown": "<b>Recommendations for [CVE-2019-17531](https://osv.dev/vulnerability/GHSA-gjmw-vf9h-g25v):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-17531)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-17531", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-gjmw-vf9h-g25v" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-11113", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11113", | |
"markdown": "<b>Recommendations for [CVE-2020-11113](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4;2.10.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-11113)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-11113", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-12086", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-12086", | |
"markdown": "<b>Recommendations for [CVE-2019-12086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086):</b><br/><br/>* Upgrade to version 2.9.9.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-12086)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-12086", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-19361", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-19361", | |
"markdown": "<b>Recommendations for [CVE-2018-19361](https://osv.dev/vulnerability/GHSA-mx9v-gmh4-mgqw):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-19361)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-19361", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-mx9v-gmh4-mgqw" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-24616", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-24616", | |
"markdown": "<b>Recommendations for [CVE-2020-24616](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616):</b><br/><br/>* Upgrade to version 2.9.10.6.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-24616)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-24616", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-25649", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-25649", | |
"markdown": "<b>Recommendations for [CVE-2020-25649](https://github.com/FasterXML/jackson-databind/issues/2589):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.4,2.9.10.7,2.10.5.1,2.11.0.rc1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-25649)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-25649", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2589" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-14718", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-14718", | |
"markdown": "<b>Recommendations for [CVE-2018-14718](https://osv.dev/vulnerability/GHSA-645p-88qh-w398):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.7.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-14718)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-14718", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-645p-88qh-w398" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-11307", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-11307", | |
"markdown": "<b>Recommendations for [CVE-2018-11307](https://github.com/FasterXML/jackson-databind/issues/2032):</b><br/><br/>* Upgrade to version jackson-databind-2.9.6.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-11307)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-11307", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2032" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36188", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36188", | |
"markdown": "<b>Recommendations for [CVE-2020-36188](https://github.com/FasterXML/jackson-databind/issues/2996):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36188)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36188", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2996" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-14892", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14892", | |
"markdown": "<b>Recommendations for [CVE-2019-14892](https://osv.dev/vulnerability/GHSA-cf6r-3wgc-h863):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-14892)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-14892", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-cf6r-3wgc-h863" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36186", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36186", | |
"markdown": "<b>Recommendations for [CVE-2020-36186](https://github.com/FasterXML/jackson-databind/issues/2997):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36186)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36186", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2997" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2022-42004", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2022-42004", | |
"markdown": "<b>Recommendations for [CVE-2022-42004](https://github.com/FasterXML/jackson-databind/issues/3582):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.13.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2022-42004)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2022-42004", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/3582" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-10968", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10968", | |
"markdown": "<b>Recommendations for [CVE-2020-10968](https://nvd.nist.gov/vuln/detail/CVE-2020-10968):</b><br/><br/>* Upgrade to version jackson-databind-2.9.10.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-10968)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-10968", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-8840", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-8840", | |
"markdown": "<b>Recommendations for [CVE-2020-8840](https://github.com/FasterXML/jackson-databind/issues/2620):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.3.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-8840)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-8840", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2620" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-12384", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-12384", | |
"markdown": "<b>Recommendations for [CVE-2019-12384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384):</b><br/><br/>* Upgrade to version 2.9.9.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-12384)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-12384", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-36182", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-36182", | |
"markdown": "<b>Recommendations for [CVE-2020-36182](https://github.com/FasterXML/jackson-databind/issues/3004):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-36182)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-36182", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/3004" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-10650", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-10650", | |
"markdown": "<b>Recommendations for [CVE-2020-10650](https://github.com/advisories/GHSA-rpr3-cw39-3pxh):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-10650)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-10650", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/advisories/GHSA-rpr3-cw39-3pxh" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-35728", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-35728", | |
"markdown": "<b>Recommendations for [CVE-2020-35728](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35728):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-35728)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-35728", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35728" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-35490", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-35490", | |
"markdown": "<b>Recommendations for [CVE-2020-35490](https://github.com/FasterXML/jackson-databind/issues/2986):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.8.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-35490)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-35490", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-databind/issues/2986" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-14540", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14540", | |
"markdown": "<b>Recommendations for [CVE-2019-14540](https://osv.dev/vulnerability/GHSA-h822-r4r5-v8jg):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-14540)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-14540", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-h822-r4r5-v8jg" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-16942", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-16942", | |
"markdown": "<b>Recommendations for [CVE-2019-16942](https://osv.dev/vulnerability/GHSA-mx7p-6679-8g3q):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.8.11.5,2.9.10.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-16942)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-16942", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-mx7p-6679-8g3q" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-11112", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2020-11112", | |
"markdown": "<b>Recommendations for [CVE-2020-11112](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.9.10.4,2.10.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2020-11112)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-11112", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-14439", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2019-14439", | |
"markdown": "<b>Recommendations for [CVE-2019-14439](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439):</b><br/><br/>* Upgrade to version 2.9.9.2.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2019-14439)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-14439", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-14719", | |
"message": { | |
"text": "jackson-databind-2.9.5.jar is affected by CVE-2018-14719", | |
"markdown": "<b>Recommendations for [CVE-2018-14719](https://osv.dev/vulnerability/GHSA-4gq5-ch57-c2mg):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.7.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar (CVE-2018-14719)\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-14719", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://osv.dev/vulnerability/GHSA-4gq5-ch57-c2mg" | |
} | |
} | |
}, | |
{ | |
"ruleId": "WS-2022-0468", | |
"message": { | |
"text": "jackson-core-2.9.5.jar is affected by WS-2022-0468", | |
"markdown": "<b>Recommendations for [WS-2022-0468](https://github.com/FasterXML/jackson-core/issues/861):</b><br/><br/>* Upgrade to version com.fasterxml.jackson.core:jackson-core:2.15.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar (WS-2022-0468)\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "WS-2022-0468", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/FasterXML/jackson-core/issues/861" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2015-7501", | |
"message": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2015-7501", | |
"markdown": "<b>Recommendations for [CVE-2015-7501](https://bugzilla.redhat.com/show_bug.cgi?id=1279330):</b><br/><br/>* Upgrade to version commons-collections:commons-collections:3.2.2;org.apache.commons:commons-collections4:4.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar (CVE-2015-7501)\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2015-7501", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2015-4852", | |
"message": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2015-4852", | |
"markdown": "<b>Recommendations for [CVE-2015-4852](https://www.openwall.com/lists/oss-security/2015/11/17/19):</b><br/><br/>* Upgrade to version commons-collections:commons-collections:3.2.2.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar (CVE-2015-4852)\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2015-4852", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://www.openwall.com/lists/oss-security/2015/11/17/19" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-13116", | |
"message": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2019-13116", | |
"markdown": "<b>Recommendations for [CVE-2019-13116](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13116):</b><br/><br/>* Upgrade to version commons-collections:commons-collections:3.2.2.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar (CVE-2019-13116)\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-13116", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13116" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2015-6420", | |
"message": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2015-6420", | |
"markdown": "<b>Recommendations for [CVE-2015-6420](https://github.com/apache/commons-collections/tree/collections-3.2.2,https://github.com/apache/commons-collections/tree/collections-4.1):</b><br/><br/>* Upgrade to version commons-collections:commons-collections3.2.2,org.apache.commons:commons-collections4:4.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar (CVE-2015-6420)\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2015-6420", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/commons-collections/tree/collections-3.2.2,https://github.com/apache/commons-collections/tree/collections-4.1" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2017-15708", | |
"message": { | |
"text": "commons-collections-3.2.1.jar is affected by CVE-2017-15708", | |
"markdown": "<b>Recommendations for [CVE-2017-15708](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15708):</b><br/><br/>* Upgrade to version org.apache.synapse:Apache-Synapse:3.0.1;commons-collections:commons-collections:3.2.2.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar (CVE-2017-15708)\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2017-15708", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15708" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2017-9801", | |
"message": { | |
"text": "commons-email-1.1.jar is affected by CVE-2017-9801", | |
"markdown": "<b>Recommendations for [CVE-2017-9801](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9801):</b><br/><br/>* Upgrade to version 1.5.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar (CVE-2017-9801)\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2017-9801", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9801" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-1294", | |
"message": { | |
"text": "commons-email-1.1.jar is affected by CVE-2018-1294", | |
"markdown": "<b>Recommendations for [CVE-2018-1294](https://github.com/advisories/GHSA-v7cm-w955-pj6g):</b><br/><br/>* Upgrade to version org.apache.commons:commons-email:1.5.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar (CVE-2018-1294)\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-1294", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/advisories/GHSA-v7cm-w955-pj6g" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2023-41835", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2023-41835", | |
"markdown": "<b>Recommendations for [CVE-2023-41835](https://www.cve.org/CVERecord?id=CVE-2023-41835):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.5.32,6.1.2.2,6.3.0.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2023-41835)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2023-41835", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41835" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2024-53677", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2024-53677", | |
"markdown": "<b>Recommendations for [CVE-2024-53677](https://cwiki.apache.org/confluence/display/WW/S2-067):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:6.4.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2024-53677)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2024-53677", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-4003", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4003", | |
"markdown": "<b>Recommendations for [CVE-2016-4003](https://github.com/apache/struts/tree/STRUTS_2_3_28/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.28.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-4003)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-4003", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_28/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-0230", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2019-0230", | |
"markdown": "<b>Recommendations for [CVE-2019-0230](https://cwiki.apache.org/confluence/display/ww/s2-059):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.5.22.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2019-0230)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-0230", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cwiki.apache.org/confluence/display/ww/s2-059" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-4436", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4436", | |
"markdown": "<b>Recommendations for [CVE-2016-4436](https://github.com/apache/struts/tree/STRUTS_2_3_29/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.29,org.apache.struts:struts2-core:2.5.1.3.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-4436)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-4436", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_29/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2021-31805", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2021-31805", | |
"markdown": "<b>Recommendations for [CVE-2021-31805](https://cwiki.apache.org/confluence/display/WW/S2-062):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.5.30.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2021-31805)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2021-31805", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cwiki.apache.org/confluence/display/WW/S2-062" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-4430", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4430", | |
"markdown": "<b>Recommendations for [CVE-2016-4430](http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4430):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.29.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-4430)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-4430", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4430" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2015-2992", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2015-2992", | |
"markdown": "<b>Recommendations for [CVE-2015-2992](https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2992):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.20.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2015-2992)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2015-2992", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2992" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2015-5209", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2015-5209", | |
"markdown": "<b>Recommendations for [CVE-2015-5209](https://nvd.nist.gov/vuln/detail/CVE-2015-5209):</b><br/><br/>* Upgrade to version 2.3.24.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2015-5209)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2015-5209)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2015-5209", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5209" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2015-5169", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2015-5169", | |
"markdown": "<b>Recommendations for [CVE-2015-5169](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5169):</b><br/><br/>* Upgrade to version 2.3.20.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2015-5169)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2015-5169", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5169" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-3093", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-3093", | |
"markdown": "<b>Recommendations for [CVE-2016-3093](https://nvd.nist.gov/vuln/detail/CVE-2016-3093):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.28,ognl:ognl:3.0.12.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-3093)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar (CVE-2016-3093)\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar (CVE-2016-3093)\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-3093", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3093" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-3082", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-3082", | |
"markdown": "<b>Recommendations for [CVE-2016-3082](https://github.com/apache/struts/tree/STRUTS_2_3_28_1/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.20.3,org.apache.struts:struts2-core:2.3.24.3,org.apache.struts:struts2-core: 2.3.28.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-3082)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-3082", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_28_1/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2023-50164", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2023-50164", | |
"markdown": "<b>Recommendations for [CVE-2023-50164](https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.5.33,6.3.0.2.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2023-50164)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2023-50164", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-3087", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-3087", | |
"markdown": "<b>Recommendations for [CVE-2016-3087](https://github.com/apache/struts/tree/STRUTS_2_3_28_1/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.20.3,org.apache.struts:struts2-core:2.3.24.3,org.apache.struts:struts2-core: 2.3.28.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-3087)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-3087", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_28_1/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2023-34149", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2023-34149", | |
"markdown": "<b>Recommendations for [CVE-2023-34149](https://github.com/advisories/GHSA-8f6x-v685-g2xc):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.5.31,6.1.2.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2023-34149)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2023-34149", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://github.com/advisories/GHSA-8f6x-v685-g2xc" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-11776", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2018-11776", | |
"markdown": "<b>Recommendations for [CVE-2018-11776](https://nvd.nist.gov/vuln/detail/CVE-2018-11776):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core - 2.3.35,2.5.17;org.apache.struts:struts2-rest-plugin - 2.3.34,2.5.17.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2018-11776)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-11776", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11776" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2017-9787", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2017-9787", | |
"markdown": "<b>Recommendations for [CVE-2017-9787](https://github.com/apache/struts/tree/STRUTS_2_3_33/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.33,org.apache.struts:struts2-core:2.5.12.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2017-9787)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2017-9787)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2017-9787", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_33/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-6795", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-6795", | |
"markdown": "<b>Recommendations for [CVE-2016-6795](https://github.com/apache/struts/tree/STRUTS_2_3_31/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.31,org.apache.struts:struts2-core:2.5.5.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-6795)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-6795", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_31/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-4465", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4465", | |
"markdown": "<b>Recommendations for [CVE-2016-4465](https://github.com/apache/struts/tree/STRUTS_2_3_29/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.29, \torg.apache.struts.xwork:xwork-core:2.3.29.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-4465)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2016-4465)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-4465", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_29/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2019-0233", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2019-0233", | |
"markdown": "<b>Recommendations for [CVE-2019-0233](https://cwiki.apache.org/confluence/display/ww/s2-060):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.5.22.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2019-0233)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2019-0233", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cwiki.apache.org/confluence/display/ww/s2-060" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2017-12611", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2017-12611", | |
"markdown": "<b>Recommendations for [CVE-2017-12611](https://cwiki.apache.org/confluence/display/WW/S2-053):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.34;org.apache.struts:struts2-core:2.5.12.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2017-12611)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2017-12611", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cwiki.apache.org/confluence/display/WW/S2-053" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-4433", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4433", | |
"markdown": "<b>Recommendations for [CVE-2016-4433](https://github.com/apache/struts/tree/STRUTS_2_3_29):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.29,\torg.apache.struts.xwork:xwork-core:2.3.29.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-4433)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2016-4433)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-4433", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_29" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-4431", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-4431", | |
"markdown": "<b>Recommendations for [CVE-2016-4431](https://github.com/apache/struts/tree/STRUTS_2_3_29/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.29.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-4431)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-4431", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_29/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-3081", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2016-3081", | |
"markdown": "<b>Recommendations for [CVE-2016-3081](https://github.com/apache/struts/tree/STRUTS_2_3_28_1/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.20.3,org.apache.struts:struts2-core:2.3.24.3,org.apache.struts:struts2-core: 2.3.28.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-3081)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-3081", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_28_1/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2020-17530", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2020-17530", | |
"markdown": "<b>Recommendations for [CVE-2020-17530](https://cwiki.apache.org/confluence/display/WW/S2-061):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.5.26.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2020-17530)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2020-17530", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://cwiki.apache.org/confluence/display/WW/S2-061" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2017-5638", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2017-5638", | |
"markdown": "<b>Recommendations for [CVE-2017-5638](https://github.com/apache/struts/tree/STRUTS_2_3_32/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.32,org.apache.struts:struts2-core:2.5.10.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2017-5638)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2017-5638", | |
"severity": "CRITICAL", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_32/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2017-9804", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2017-9804", | |
"markdown": "<b>Recommendations for [CVE-2017-9804](https://github.com/apache/struts/tree/STRUTS_2_3_34/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.34,org.apache.struts:struts2-core:2.5.13.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2017-9804)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2017-9804)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2017-9804", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_34/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2023-34396", | |
"message": { | |
"text": "struts2-core-2.3.20.jar is affected by CVE-2023-34396", | |
"markdown": "<b>Recommendations for [CVE-2023-34396](https://github.com/advisories/GHSA-4g42-gqrg-4633):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.5.31,6.1.2.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2023-34396)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2023-34396", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://github.com/advisories/GHSA-4g42-gqrg-4633" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-3092", | |
"message": { | |
"text": "commons-fileupload-1.3.1.jar is affected by CVE-2016-3092", | |
"markdown": "<b>Recommendations for [CVE-2016-3092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092):</b><br/><br/>* Upgrade to version org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M8,8.5.3,8.0.36,7.0.70,org.apache.tomcat:tomcat-coyote:9.0.0.M8,8.5.3,8.0.36,7.0.70,commons-fileupload:commons-fileupload:1.3.2.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar (CVE-2016-3092)\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-3092", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-1000031", | |
"message": { | |
"text": "commons-fileupload-1.3.1.jar is affected by CVE-2016-1000031", | |
"markdown": "<b>Recommendations for [CVE-2016-1000031](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031):</b><br/><br/>* Upgrade to version 1.3.3.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar (CVE-2016-1000031)\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-1000031", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031" | |
} | |
} | |
}, | |
{ | |
"ruleId": "WS-2014-0034", | |
"message": { | |
"text": "commons-fileupload-1.3.1.jar is affected by WS-2014-0034", | |
"markdown": "<b>Recommendations for [WS-2014-0034](https://github.com/apache/commons-fileupload/commit/5b4881d7f75f439326f54fa554a9ca7de6d60814):</b><br/><br/>* Upgrade to version commons-fileupload:commons-fileupload:1.4.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar (WS-2014-0034)\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "WS-2014-0034", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/commons-fileupload/commit/5b4881d7f75f439326f54fa554a9ca7de6d60814" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2023-24998", | |
"message": { | |
"text": "commons-fileupload-1.3.1.jar is affected by CVE-2023-24998", | |
"markdown": "<b>Recommendations for [CVE-2023-24998](https://tomcat.apache.org/security-10.html):</b><br/><br/>* Upgrade to version commons-fileupload:commons-fileupload:1.5;org.apache.tomcat:tomcat-coyote:8.5.85,9.0.71,10.1.5,11.0.0-M3;org.apache.tomcat.embed:tomcat-embed-core:8.5.85,9.0.71,10.1.5,11.0.0-M3;org.apache.tomcat:tomcat-util:8.5.85,9.0.71,10.1.5,11.0.0-M3;org.apache.tomcat:tomcat-catalina:8.5.85,9.0.71,10.1.5,11.0.0-M3.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar (CVE-2023-24998)\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2023-24998", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://tomcat.apache.org/security-10.html" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2024-47554", | |
"message": { | |
"text": "commons-io-2.2.jar is affected by CVE-2024-47554", | |
"markdown": "<b>Recommendations for [CVE-2024-47554](https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1):</b><br/><br/>* Upgrade to version commons-io:commons-io:2.14.0.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar (CVE-2024-47554)\n| \u251c\u2500 commons-io-2.2.jar (CVE-2024-47554)\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar (CVE-2024-47554)\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar (CVE-2024-47554)\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2024-47554", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2021-29425", | |
"message": { | |
"text": "commons-io-2.2.jar is affected by CVE-2021-29425", | |
"markdown": "<b>Recommendations for [CVE-2021-29425](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425):</b><br/><br/>* Upgrade to version commons-io:commons-io:2.7.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar (CVE-2021-29425)\n| \u251c\u2500 commons-io-2.2.jar (CVE-2021-29425)\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar (CVE-2021-29425)\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar (CVE-2021-29425)\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2021-29425", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-3093", | |
"message": { | |
"text": "ognl-3.0.6.jar is affected by CVE-2016-3093", | |
"markdown": "<b>Recommendations for [CVE-2016-3093](https://nvd.nist.gov/vuln/detail/CVE-2016-3093):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.28,ognl:ognl:3.0.12.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-3093)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar (CVE-2016-3093)\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar (CVE-2016-3093)\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-3093", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3093" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2017-9787", | |
"message": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2017-9787", | |
"markdown": "<b>Recommendations for [CVE-2017-9787](https://github.com/apache/struts/tree/STRUTS_2_3_33/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.33,org.apache.struts:struts2-core:2.5.12.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2017-9787)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2017-9787)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2017-9787", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_33/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-4465", | |
"message": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2016-4465", | |
"markdown": "<b>Recommendations for [CVE-2016-4465](https://github.com/apache/struts/tree/STRUTS_2_3_29/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.29, \torg.apache.struts.xwork:xwork-core:2.3.29.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-4465)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2016-4465)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-4465", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_29/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-0785", | |
"message": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2016-0785", | |
"markdown": "<b>Recommendations for [CVE-2016-0785](https://github.com/apache/struts/tree/STRUTS_2_3_28):</b><br/><br/>* Upgrade to version org.apache.struts.xwork:xwork-core:2.3.28.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2016-0785)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-0785", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_28" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-4461", | |
"message": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2016-4461", | |
"markdown": "<b>Recommendations for [CVE-2016-4461](https://github.com/apache/struts/tree/STRUTS_2_3_29/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.29.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2016-4461)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-4461", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_29/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-2162", | |
"message": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2016-2162", | |
"markdown": "<b>Recommendations for [CVE-2016-2162](https://github.com/apache/struts/tree/STRUTS_2_3_25):</b><br/><br/>* Upgrade to version org.apache.struts.xwork:xwork-core:2.3.25.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2016-2162)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-2162", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_25" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2016-4433", | |
"message": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2016-4433", | |
"markdown": "<b>Recommendations for [CVE-2016-4433](https://github.com/apache/struts/tree/STRUTS_2_3_29):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.29,\torg.apache.struts.xwork:xwork-core:2.3.29.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2016-4433)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2016-4433)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2016-4433", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_29" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2015-5209", | |
"message": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2015-5209", | |
"markdown": "<b>Recommendations for [CVE-2015-5209](https://nvd.nist.gov/vuln/detail/CVE-2015-5209):</b><br/><br/>* Upgrade to version 2.3.24.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2015-5209)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2015-5209)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2015-5209", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5209" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2017-9804", | |
"message": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2017-9804", | |
"markdown": "<b>Recommendations for [CVE-2017-9804](https://github.com/apache/struts/tree/STRUTS_2_3_34/):</b><br/><br/>* Upgrade to version org.apache.struts:struts2-core:2.3.34,org.apache.struts:struts2-core:2.5.13.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar (CVE-2017-9804)\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2017-9804)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2017-9804", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://github.com/apache/struts/tree/STRUTS_2_3_34/" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2015-1831", | |
"message": { | |
"text": "xwork-core-2.3.20.jar is affected by CVE-2015-1831", | |
"markdown": "<b>Recommendations for [CVE-2015-1831](https://nvd.nist.gov/vuln/detail/CVE-2015-1831):</b><br/><br/>* Upgrade to version org.apache.struts.xwork:xwork-core - 2.3.20.1.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar (CVE-2015-1831)\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2015-1831", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1831" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2021-22096", | |
"message": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2021-22096", | |
"markdown": "<b>Recommendations for [CVE-2021-22096](https://tanzu.vmware.com/security/cve-2021-22096):</b><br/><br/>* Upgrade to version org.springframework:spring-core:5.2.18.RELEASE,5.3.12;org.springframework:spring-web:5.2.18.RELEASE,5.3.12;org.springframework:spring-webmvc:5.2.18.RELEASE,5.3.12;org.springframework:spring-webflux:5.2.18.RELEASE,5.3.12.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2021-22096)\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2021-22096)\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2021-22096)\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2021-22096", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://tanzu.vmware.com/security/cve-2021-22096" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2021-22060", | |
"message": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2021-22060", | |
"markdown": "<b>Recommendations for [CVE-2021-22060](https://spring.io/security/cve-2021-22060):</b><br/><br/>* Upgrade to version org.springframework:spring-core:5.2.19, 5.3.14;org.springframework:spring-web:5.2.19, 5.3.14.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2021-22060)\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2021-22060)\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2021-22060)\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2021-22060", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://spring.io/security/cve-2021-22060" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-1272", | |
"message": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2018-1272", | |
"markdown": "<b>Recommendations for [CVE-2018-1272](https://tanzu.vmware.com/security/cve-2018-1272):</b><br/><br/>* Upgrade to version org.springframework:spring-core:4.3.15.RELEASE,5.0.5.RELEASE;org.springframework:spring-web:4.3.15.RELEASE,5.0.5.RELEASE.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2018-1272)\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2018-1272)\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2018-1272)\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-1272", | |
"severity": "HIGH", | |
"description": "Upgrade to version", | |
"url": "https://tanzu.vmware.com/security/cve-2018-1272" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2018-1199", | |
"message": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2018-1199", | |
"markdown": "<b>Recommendations for [CVE-2018-1199](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1199):</b><br/><br/>* Upgrade to version org.springframework.security:spring-security-web:4.1.5.RELEASE,4.2.4.RELEASE,5.0.1.RELEASE;org.springframework.security:spring-security-config:4.1.5.RELEASE,4.2.4.RELEASE,5.0.1.RELEASE;org.springframework:spring-core:4.3.14.RELEASE,5.0.3.RELEASE.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2018-1199)\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2018-1199)\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2018-1199)\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2018-1199", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1199" | |
} | |
} | |
}, | |
{ | |
"ruleId": "CVE-2022-22970", | |
"message": { | |
"text": "spring-core-4.3.13.RELEASE.jar is affected by CVE-2022-22970", | |
"markdown": "<b>Recommendations for [CVE-2022-22970](https://tanzu.vmware.com/security/cve-2022-22970):</b><br/><br/>* Upgrade to version org.springframework:spring-beans:5.2.22,5.3.20;org.springframework:spring-core:5.2.22,5.3.20.<br/><br/><b>Dependency tree</b><br/><br/>\u251c\u2500 jackson-databind-2.9.5.jar\n| \u251c\u2500 jackson-annotations-2.9.0.jar\n| \u2514\u2500 jackson-core-2.9.5.jar\n\u251c\u2500 commons-collections-3.2.1.jar\n\u251c\u2500 commons-email-1.1.jar\n| \u251c\u2500 commons-logging-1.2.jar\n| \u251c\u2500 activation-1.1.jar\n| \u2514\u2500 mail-1.4.jar\n| \u2514\u2500 activation-1.1.jar\n\u251c\u2500 struts2-core-2.3.20.jar\n| \u251c\u2500 commons-fileupload-1.3.1.jar\n| | \u2514\u2500 commons-io-2.2.jar\n| \u251c\u2500 commons-io-2.2.jar\n| \u251c\u2500 ognl-3.0.6.jar\n| | \u2514\u2500 javassist-3.11.0.GA.jar\n| \u251c\u2500 xwork-core-2.3.20.jar\n| | \u251c\u2500 commons-io-2.2.jar\n| | \u251c\u2500 commons-logging-1.2.jar\n| | \u251c\u2500 ognl-3.0.6.jar\n| | \u251c\u2500 commons-lang3-3.2.jar\n| | | \u2514\u2500 commons-io-2.2.jar\n| | \u251c\u2500 asm-commons-5.0.2.jar\n| | | \u2514\u2500 asm-tree-5.0.2.jar\n| | | \u2514\u2500 asm-5.0.2.jar\n| | \u251c\u2500 asm-5.0.2.jar\n| | \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2022-22970)\n| \u251c\u2500 freemarker-2.3.19.jar\n| \u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2022-22970)\n\u2514\u2500 spring-core-4.3.13.RELEASE.jar (CVE-2022-22970)\n \u2514\u2500 commons-logging-1.2.jar<br/>" | |
}, | |
"locations": [ | |
{ | |
"physicalLocation": { | |
"artifactLocation": { | |
"uri": "/java/work/mend-poc-webgoat/pom.xml" | |
} | |
} | |
} | |
], | |
"properties": { | |
"vulnerability": { | |
"id": "CVE-2022-22970", | |
"severity": "MEDIUM", | |
"description": "Upgrade to version", | |
"url": "https://tanzu.vmware.com/security/cve-2022-22970" | |
} | |
} | |
} | |
] | |
} | |
] | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment