Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: github issues

Project: kodexa-java

com.kodexa.client:kodexa-java:6.2.14

Scan Information (show all):

Summary

Display: Showing Vulnerable Dependencies (click to show all)

DependencyVulnerability IDsPackageHighest SeverityCVE CountConfidenceEvidence Count
sqlite-jdbc-3.42.0.0.jarcpe:2.3:a:sqlite_jdbc_project:sqlite_jdbc:3.42.0.0:*:*:*:*:*:*:*pkg:maven/org.xerial/sqlite-jdbc@3.42.0.0 0Highest29
jdbi3-core-3.39.1.jarpkg:maven/org.jdbi/jdbi3-core@3.39.1 036
geantyref-1.3.14.jarpkg:maven/io.leangen.geantyref/geantyref@1.3.14 032
msgpack-core-0.9.5.jarcpe:2.3:a:messagepack:messagepack:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:messagepack_project:messagepack:0.9.5:*:*:*:*:*:*:*
pkg:maven/org.msgpack/msgpack-core@0.9.5HIGH2Low31
commons-lang3-3.13.0.jarcpe:2.3:a:apache:commons_net:3.13.0:*:*:*:*:*:*:*pkg:maven/org.apache.commons/commons-lang3@3.13.0 0Highest41
httpmime-4.5.14.jarpkg:maven/org.apache.httpcomponents/httpmime@4.5.14 032
httpclient-4.5.14.jarcpe:2.3:a:apache:httpclient:4.5.14:*:*:*:*:*:*:*pkg:maven/org.apache.httpcomponents/httpclient@4.5.14 0Highest34
httpcore-4.4.16.jarpkg:maven/org.apache.httpcomponents/httpcore@4.4.16 034
commons-logging-1.2.jarcpe:2.3:a:apache:commons_net:1.2:*:*:*:*:*:*:*pkg:maven/commons-logging/commons-logging@1.2MEDIUM1Highest36
commons-codec-1.11.jarcpe:2.3:a:apache:commons_net:1.11:*:*:*:*:*:*:*pkg:maven/commons-codec/commons-codec@1.11MEDIUM1Highest42
jackson-dataformat-msgpack-0.9.5.jarcpe:2.3:a:messagepack:messagepack:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:messagepack_project:messagepack:0.9.5:*:*:*:*:*:*:*
pkg:maven/org.msgpack/jackson-dataformat-msgpack@0.9.5HIGH2Low31
jackson-databind-2.14.2.jarcpe:2.3:a:fasterxml:jackson-databind:2.14.2:*:*:*:*:*:*:*pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.14.2MEDIUM1Highest41
jackson-annotations-2.14.2.jarpkg:maven/com.fasterxml.jackson.core/jackson-annotations@2.14.2 038
jackson-core-2.14.2.jarcpe:2.3:a:json-java_project:json-java:2.14.2:*:*:*:*:*:*:*pkg:maven/com.fasterxml.jackson.core/jackson-core@2.14.2HIGH1Low47
httpclient5-5.2.1.jarcpe:2.3:a:apache:httpclient:5.2.1:*:*:*:*:*:*:*pkg:maven/org.apache.httpcomponents.client5/httpclient5@5.2.1 0Highest32
httpcore5-5.2.jarpkg:maven/org.apache.httpcomponents.core5/httpcore5@5.2 032
httpcore5-h2-5.2.jarpkg:maven/org.apache.httpcomponents.core5/httpcore5-h2@5.2 032
logback-core-1.4.6.jarcpe:2.3:a:qos:logback:1.4.6:*:*:*:*:*:*:*pkg:maven/ch.qos.logback/logback-core@1.4.6 0Highest37
slf4j-api-2.0.5.jarpkg:maven/org.slf4j/slf4j-api@2.0.5 035
commons-io-2.11.0.jarcpe:2.3:a:apache:commons_io:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:commons_net:2.11.0:*:*:*:*:*:*:*
pkg:maven/commons-io/commons-io@2.11.0MEDIUM1Highest42
jdbi3-core-3.39.1.jar (shaded: org.antlr:antlr4-runtime:4.13.0)pkg:maven/org.antlr/antlr4-runtime@4.13.0 011

Dependencies

sqlite-jdbc-3.42.0.0.jar

Description:

SQLite JDBC library

License:

The Apache Software License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/org/xerial/sqlite-jdbc/3.42.0.0/sqlite-jdbc-3.42.0.0.jar
MD5: 6a46db3a6f38043ffb7e6782708cd401
SHA1: a4c84376df810062d20c84777b84ec077b5ecdab
SHA256:53174d76087bb73cc29db9c02766fb921fd7fc652f7952f3609e0018e3dd5ded
Referenced In Project/Scope:kodexa-java:compile

Identifiers

jdbi3-core-3.39.1.jar

Description:

The Jdbi core API.

        Jdbi 3 is designed to provide convenient tabular data access in
        Java(tm) and other JVM based languages.
        It uses the Java collections framework for query results,
        provides a convenient means of externalizing SQL statements, and
        named parameter support for any database that supports JDBC.

File Path: /home/runner/.m2/repository/org/jdbi/jdbi3-core/3.39.1/jdbi3-core-3.39.1.jar
MD5: 02c4a9a39b64be87a5664083dc62c323
SHA1: 3cf0d9683f596205e7ecc1c8e4029ffe82092783
SHA256:97df5ff14aab838af473dc20af507506f7035add9046ab9984702d7b118b4cbb
Referenced In Project/Scope:kodexa-java:compile

Identifiers

geantyref-1.3.14.jar

Description:

Generic type reflection library with support for AnnotatedType

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/io/leangen/geantyref/geantyref/1.3.14/geantyref-1.3.14.jar
MD5: 8ff9aa6efb1cbdd491e2393dd1fb3209
SHA1: 104fa1c08e44f5d7573f9fc0763d92984596645d
SHA256:62b722d132454503904a5f7b0a47a24f0fc581821ec8d3687df1e0f146c6d61e
Referenced In Project/Scope:kodexa-java:compile

Identifiers

msgpack-core-0.9.5.jar

Description:

Core library of the MessagePack for Java

License:

Apache-2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/org/msgpack/msgpack-core/0.9.5/msgpack-core-0.9.5.jar
MD5: cf3baac082728253152121fb83aadd77
SHA1: 60dd74abd86c3620d49e70ffd13f348e545730cb
SHA256:e446cef1cd934da5b626fd14a1479445ef368e11c87904b498b7fb43bc8b92c2
Referenced In Project/Scope:kodexa-java:compile

Identifiers

  • pkg:maven/org.msgpack/msgpack-core@0.9.5  (Confidence:High)
  • cpe:2.3:a:messagepack:messagepack:0.9.5:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:messagepack_project:messagepack:0.9.5:*:*:*:*:*:*:*  (Confidence:Low)  

CVE-2020-5234  

MessagePack for C# and Unity before version 1.9.11 and 2.1.90 has a vulnerability where untrusted data can lead to DoS attack due to hash collisions and stack overflow. Review the linked GitHub Security Advisory for more information and remediation steps.
CWE-787 Out-of-bounds Write

CVSSv2:
  • Base Score: MEDIUM (6.8)
  • Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:C
CVSSv3:
  • Base Score: MEDIUM (6.5)
  • Vector: /AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

References:

Vulnerable Software & Versions: (show all)

CVE-2022-41719  

Unmarshal can panic on some inputs, possibly allowing for denial of service attacks.
NVD-CWE-noinfo

CVSSv3:
  • Base Score: HIGH (7.5)
  • Vector: /AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References:

Vulnerable Software & Versions:

commons-lang3-3.13.0.jar

Description:

  Apache Commons Lang, a package of Java utility classes for the
  classes that are in java.lang's hierarchy, or are considered to be so
  standard as to justify existence in java.lang.
  

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/org/apache/commons/commons-lang3/3.13.0/commons-lang3-3.13.0.jar
MD5: 3435b913691a5c1b173485a49850b1a8
SHA1: b7263237aa89c1f99b327197c41d0669707a462e
SHA256:82f528cf718c7a3c2f30fc5bc784e3c6a0a10b17605dadb9e16c82ede11e6064
Referenced In Project/Scope:kodexa-java:compile

Identifiers

httpmime-4.5.14.jar

Description:

   Apache HttpComponents HttpClient - MIME coded entities
  

File Path: /home/runner/.m2/repository/org/apache/httpcomponents/httpmime/4.5.14/httpmime-4.5.14.jar
MD5: 714c4ae31c40e6633c0bcaa4e6264153
SHA1: 6662758a1f1cb1149cf916bdac28332e0902ec44
SHA256:d401243d5c6eae928a37121b6e819158c8c32ea0584793e7285bb489ab2a3d17
Referenced In Project/Scope:kodexa-java:compile

Identifiers

httpclient-4.5.14.jar

Description:

   Apache HttpComponents Client
  

File Path: /home/runner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.14/httpclient-4.5.14.jar
MD5: 2cb357c4b763f47e58af6cad47df6ba3
SHA1: 1194890e6f56ec29177673f2f12d0b8e627dec98
SHA256:c8bc7e1c51a6d4ce72f40d2ebbabf1c4b68bfe76e732104b04381b493478e9d6
Referenced In Project/Scope:kodexa-java:compile

Identifiers

httpcore-4.4.16.jar

Description:

   Apache HttpComponents Core (blocking I/O)
  

File Path: /home/runner/.m2/repository/org/apache/httpcomponents/httpcore/4.4.16/httpcore-4.4.16.jar
MD5: 28d2cd9bf8789fd2ec774fb88436ebd1
SHA1: 51cf043c87253c9f58b539c9f7e44c8894223850
SHA256:6c9b3dd142a09dc468e23ad39aad6f75a0f2b85125104469f026e52a474e464f
Referenced In Project/Scope:kodexa-java:compile

Identifiers

commons-logging-1.2.jar

Description:

Apache Commons Logging is a thin adapter allowing configurable bridging to other,
    well known logging systems.

License:

http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/commons-logging/commons-logging/1.2/commons-logging-1.2.jar
MD5: 040b4b4d8eac886f6b4a2a3bd2f31b00
SHA1: 4bfc12adfe4842bf07b657f0369c4cb522955686
SHA256:daddea1ea0be0f56978ab3006b8ac92834afeefbd9b7e4e6316fca57df0fa636
Referenced In Project/Scope:kodexa-java:compile

Identifiers

CVE-2021-37533  

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
CWE-20 Improper Input Validation

CVSSv3:
  • Base Score: MEDIUM (6.5)
  • Vector: /AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

References:

Vulnerable Software & Versions:

commons-codec-1.11.jar

Description:

     The Apache Commons Codec package contains simple encoder and decoders for
     various formats such as Base64 and Hexadecimal.  In addition to these
     widely used encoders and decoders, the codec package also maintains a
     collection of phonetic encoding utilities.
  

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/commons-codec/commons-codec/1.11/commons-codec-1.11.jar
MD5: 567159b1ae257a43e1391a8f59d24cfe
SHA1: 3acb4705652e16236558f0f4f2192cc33c3bd189
SHA256:e599d5318e97aa48f42136a2927e6dfa4e8881dff0e6c8e3109ddbbff51d7b7d
Referenced In Project/Scope:kodexa-java:compile

Identifiers

CVE-2021-37533  

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
CWE-20 Improper Input Validation

CVSSv3:
  • Base Score: MEDIUM (6.5)
  • Vector: /AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

References:

Vulnerable Software & Versions:

jackson-dataformat-msgpack-0.9.5.jar

Description:

Jackson extension that adds support for MessagePack

License:

Apache-2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/org/msgpack/jackson-dataformat-msgpack/0.9.5/jackson-dataformat-msgpack-0.9.5.jar
MD5: d7e0f3e7db7fcfe091bd0c22407cbb33
SHA1: 850c19c52023330be453bd072ed16368c0e1df33
SHA256:33d6e278618226f75ef4c3d9b53672db976b1231533511c30d0258eed0f5d7c7
Referenced In Project/Scope:kodexa-java:compile

Identifiers

CVE-2020-5234  

MessagePack for C# and Unity before version 1.9.11 and 2.1.90 has a vulnerability where untrusted data can lead to DoS attack due to hash collisions and stack overflow. Review the linked GitHub Security Advisory for more information and remediation steps.
CWE-787 Out-of-bounds Write

CVSSv2:
  • Base Score: MEDIUM (6.8)
  • Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:C
CVSSv3:
  • Base Score: MEDIUM (6.5)
  • Vector: /AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

References:

Vulnerable Software & Versions: (show all)

CVE-2022-41719  

Unmarshal can panic on some inputs, possibly allowing for denial of service attacks.
NVD-CWE-noinfo

CVSSv3:
  • Base Score: HIGH (7.5)
  • Vector: /AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References:

Vulnerable Software & Versions:

jackson-databind-2.14.2.jar

Description:

General data-binding functionality for Jackson: works on core streaming API

License:

The Apache Software License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.14.2/jackson-databind-2.14.2.jar
MD5: c1b12dd14734cd1986132bf55042dd7e
SHA1: 01e71fddbc80bb86f71a6345ac1e8ab8a00e7134
SHA256:501d3abce4d18dcc381058ec593c5b94477906bba6efbac14dae40a642f77424
Referenced In Project/Scope:kodexa-java:compile

Identifiers

CVE-2023-35116  

** DISPUTED ** jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.
CWE-770 Allocation of Resources Without Limits or Throttling

CVSSv3:
  • Base Score: MEDIUM (4.7)
  • Vector: /AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

References:

Vulnerable Software & Versions:

jackson-annotations-2.14.2.jar

Description:

Core annotations used for value types, used by Jackson data binding package.
  

License:

The Apache Software License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/com/fasterxml/jackson/core/jackson-annotations/2.14.2/jackson-annotations-2.14.2.jar
MD5: 10d19982a8890f6eb37557af2f58e272
SHA1: a7aae9525864930723e3453ab799521fdfd9d873
SHA256:2c6869d505cf60dc066734b7d50339f975bd3adc635e26a78abb71acb4473c0d
Referenced In Project/Scope:kodexa-java:compile

Identifiers

jackson-core-2.14.2.jar

Description:

Core Jackson processing abstractions (aka Streaming API), implementation for JSON

License:

The Apache Software License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.14.2/jackson-core-2.14.2.jar
MD5: 6ee422ee4c481b2d5aacb2b5e36a7dc0
SHA1: f804090e6399ce0cf78242db086017512dd71fcc
SHA256:b5d37a77c88277b97e3593c8740925216c06df8e4172bbde058528df04ad3e7a
Referenced In Project/Scope:kodexa-java:compile

Identifiers

CVE-2022-45688  

A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
CWE-787 Out-of-bounds Write

CVSSv3:
  • Base Score: HIGH (7.5)
  • Vector: /AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References:

Vulnerable Software & Versions: (show all)

httpclient5-5.2.1.jar

Description:

Apache HttpComponents Client

File Path: /home/runner/.m2/repository/org/apache/httpcomponents/client5/httpclient5/5.2.1/httpclient5-5.2.1.jar
MD5: fbbefc687f2e0c55b34b77edf53d486a
SHA1: 0c900514d3446d9ce5d9dbd90c21192048125440
SHA256:9355f3876baf82fec13ced22c12b62d57536230836406d359459128e4f73ed51
Referenced In Project/Scope:kodexa-java:compile

Identifiers

httpcore5-5.2.jar

Description:

Apache HttpComponents HTTP/1.1 core components

File Path: /home/runner/.m2/repository/org/apache/httpcomponents/core5/httpcore5/5.2/httpcore5-5.2.jar
MD5: 3a40241f9a99cf063f347dfb73c5c4e8
SHA1: ab7d251b8dfa3f2878f1eefbcca0e1fc0ebeba27
SHA256:293321cbf594d79ea8a0cb0214f75f146d17f088be17ad5ce11c2fe864df124c
Referenced In Project/Scope:kodexa-java:compile

Identifiers

httpcore5-h2-5.2.jar

Description:

Apache HttpComponents HTTP/2 Core Components

File Path: /home/runner/.m2/repository/org/apache/httpcomponents/core5/httpcore5-h2/5.2/httpcore5-h2-5.2.jar
MD5: 272112133e0dd0559efdd8f5e615a344
SHA1: 698bd8c759ccc7fd7398f3179ff45d0e5a7ccc16
SHA256:5a087fb8c619979d492a83546f351ddadf32b28cc6a32923229f3fc777171578
Referenced In Project/Scope:kodexa-java:compile

Identifiers

logback-core-1.4.6.jar

Description:

logback-core module

License:

http://www.eclipse.org/legal/epl-v10.html, http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
File Path: /home/runner/.m2/repository/ch/qos/logback/logback-core/1.4.6/logback-core-1.4.6.jar
MD5: 4ab481af4f93588f5a1a2eddea6cce80
SHA1: c4eb386f0fe83d61c2e8a91df50bb07e7ea95140
SHA256:f19cbd234b3f7d4e1292c62cb49e9090ee12a80e72891431076cbbc7df2d694c
Referenced In Project/Scope:kodexa-java:compile

Identifiers

slf4j-api-2.0.5.jar

Description:

The slf4j API

File Path: /home/runner/.m2/repository/org/slf4j/slf4j-api/2.0.5/slf4j-api-2.0.5.jar
MD5: 0f3fd4e1dccb6fa50f60b849594bc51a
SHA1: 3a759df277e854f7c4ca951e5899bcec0dbdca73
SHA256:f4a2974509291acc49fda4a79b0d59e15e2b524095d6421c66391b92387af4c9
Referenced In Project/Scope:kodexa-java:compile

Identifiers

commons-io-2.11.0.jar

Description:

The Apache Commons IO library contains utility classes, stream implementations, file filters,
file comparators, endian transformation classes, and much more.
  

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/commons-io/commons-io/2.11.0/commons-io-2.11.0.jar
MD5: 3b4b7ccfaeceeac240b804839ee1a1ca
SHA1: a2503f302b11ebde7ebc3df41daebe0e4eea3689
SHA256:961b2f6d87dbacc5d54abf45ab7a6e2495f89b75598962d8c723cea9bc210908
Referenced In Project/Scope:kodexa-java:compile

Identifiers

CVE-2021-37533  

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
CWE-20 Improper Input Validation

CVSSv3:
  • Base Score: MEDIUM (6.5)
  • Vector: /AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

References:

Vulnerable Software & Versions:

jdbi3-core-3.39.1.jar (shaded: org.antlr:antlr4-runtime:4.13.0)

Description:

The ANTLR 4 Runtime

File Path: /home/runner/.m2/repository/org/jdbi/jdbi3-core/3.39.1/jdbi3-core-3.39.1.jar/META-INF/maven/org.antlr/antlr4-runtime/pom.xml
MD5: f16817c1f4c33149ab516295328e3447
SHA1: bd7a583a403c741d7b33674d693a7d3787a41519
SHA256:198e34fb5ac7597b1a3c31930301e08ce941e5ca504116dd54a3a75378914a7f
Referenced In Project/Scope:kodexa-java:compile

Identifiers



This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the NPM Public Advisories.
This report may contain data retrieved from RetireJS.
This report may contain data retrieved from the Sonatype OSS Index.