You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.beust/jcommander/1.48/bfcb96281ea3b59d626704f74bc6d625ff51cbce/jcommander-1.48.jar
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
WS-2019-0490
Vulnerable Library - jcommander-1.48.jar
A Java framework to parse command line options with annotations.
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.beust/jcommander/1.48/bfcb96281ea3b59d626704f74bc6d625ff51cbce/jcommander-1.48.jar
Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS.
mend-for-github-combot
changed the title
pmd-java-6.48.0.jar: 1 vulnerabilities (highest severity is: 8.1)
pmd-java-6.48.0.jar: 1 vulnerabilities (highest severity is: 8.1) - autoclosed
May 1, 2023
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-for-github-combot
changed the title
pmd-java-6.48.0.jar: 1 vulnerabilities (highest severity is: 8.1) - autoclosed
pmd-java-6.48.0.jar: 1 vulnerabilities (highest severity is: 8.1)
May 31, 2023
Vulnerable Library - pmd-java-6.48.0.jar
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.beust/jcommander/1.48/bfcb96281ea3b59d626704f74bc6d625ff51cbce/jcommander-1.48.jar
Found in HEAD commit: b1d425f7f670e9accfabbe00c0be1cb2af0300f9
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
WS-2019-0490
Vulnerable Library - jcommander-1.48.jar
A Java framework to parse command line options with annotations.
Library home page: http://beust.com/
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.beust/jcommander/1.48/bfcb96281ea3b59d626704f74bc6d625ff51cbce/jcommander-1.48.jar
Dependency Hierarchy:
Found in HEAD commit: b1d425f7f670e9accfabbe00c0be1cb2af0300f9
Found in base branch: master
Vulnerability Details
Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS.
Publish Date: 2019-02-19
URL: WS-2019-0490
CVSS 3 Score Details (8.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2019-02-19
Fix Resolution: com.beust:jcommander:1.75
The text was updated successfully, but these errors were encountered: