Skip to content

Commit

Permalink
Update known vulnerabilities
Browse files Browse the repository at this point in the history
  • Loading branch information
piotr-yuxuan committed Apr 29, 2024
1 parent 1df2ec8 commit 4671b19
Showing 1 changed file with 0 additions and 5 deletions.
5 changes: 0 additions & 5 deletions doc/known-vulnerabilities.csv
Original file line number Diff line number Diff line change
@@ -1,6 +1 @@
DependencyName,DependencyPath,Description,License,Md5,Sha1,Identifiers,CPE,CVE,CWE,Vulnerability,Source,CVSSv2_Severity,CVSSv2_Score,CVSSv2,CVSSv3_BaseSeverity,CVSSv3_BaseScore,CVSSv3,CPE Confidence,Evidence Count,VendorProject,Product,Name,DateAdded,ShortDescription,RequiredAction,DueDate,Notes
core.rrb-vector-0.1.2.jar,/home/runner/.m2/repository/org/clojure/core.rrb-vector/0.1.2/core.rrb-vector-0.1.2.jar,RRB-Trees for Clojure(Script) -- see Bagwell & Rompf,Eclipse Public License 1.0: http://opensource.org/licenses/eclipse-1.0.php,71316d1ec86fe71e51819402d9a1d6af,0404feea925608b921b56acd11d3b187a0d33fe4,pkg:maven/org.clojure/[email protected],cpe:2.3:a:clojure:clojure:0.1.2:*:*:*:*:*:*:*,CVE-2017-20189,CWE-502 Deserialization of Untrusted Data,"In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.",NVD,,,,CRITICAL,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A,HIGH,15,,,,,,,,
core.specs.alpha-0.2.62.jar,/home/runner/.m2/repository/org/clojure/core.specs.alpha/0.2.62/core.specs.alpha-0.2.62.jar,Specs for clojure.core,Eclipse Public License 1.0: http://opensource.org/licenses/eclipse-1.0.php,b1e37e6e8efdade6b7c2a4dd17c0d437,a2a7ea21a695561924bc8506f3feb5d8c8f894d5,pkg:maven/org.clojure/[email protected],cpe:2.3:a:clojure:clojure:0.2.62:*:*:*:*:*:*:*,CVE-2017-20189,CWE-502 Deserialization of Untrusted Data,"In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.",NVD,,,,CRITICAL,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A,HIGH,17,,,,,,,,
spec.alpha-0.3.218.jar,/home/runner/.m2/repository/org/clojure/spec.alpha/0.3.218/spec.alpha-0.3.218.jar,Specification of data and functions,Eclipse Public License 1.0: http://opensource.org/licenses/eclipse-1.0.php,ecdbb58e7a95163c1369ef9fa054013d,a7dad492f8d6cf657d82dcd6b31bda0899f1ac0e,pkg:maven/org.clojure/[email protected],cpe:2.3:a:clojure:clojure:0.3.218:*:*:*:*:*:*:*,CVE-2017-20189,CWE-502 Deserialization of Untrusted Data,"In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.",NVD,,,,CRITICAL,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A,HIGH,26,,,,,,,,
test.check-1.1.1.jar,/home/runner/.m2/repository/org/clojure/test.check/1.1.1/test.check-1.1.1.jar,A QuickCheck inspired property-based testing library,Eclipse Public License 1.0: http://opensource.org/licenses/eclipse-1.0.php,76e2b4dfa05a4d04c4f191204021252e,f33d988fd57bc9c11af1952db81c10f319c91416,pkg:maven/org.clojure/[email protected],cpe:2.3:a:clojure:clojure:1.1.1:*:*:*:*:*:*:*,CVE-2017-20189,CWE-502 Deserialization of Untrusted Data,"In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.",NVD,,,,CRITICAL,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A,HIGH,19,,,,,,,,
tools.reader-1.3.4.jar,/home/runner/.m2/repository/org/clojure/tools.reader/1.3.4/tools.reader-1.3.4.jar,A Clojure reader in Clojure,Eclipse Public License 1.0: http://opensource.org/licenses/eclipse-1.0.php,bf0ee7a4b8c6307b2e76135c46ff5b46,edd15ac0f3bbd862106bb6ba74797f0cdf57b655,pkg:maven/org.clojure/[email protected],cpe:2.3:a:clojure:clojure:1.3.4:*:*:*:*:*:*:*,CVE-2017-20189,CWE-502 Deserialization of Untrusted Data,"In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.",NVD,,,,CRITICAL,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A,HIGH,19,,,,,,,,

0 comments on commit 4671b19

Please sign in to comment.