Vulnerable Library - mapdb-3.0.8.jar
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Vulnerabilities
| CVE |
Severity |
CVSS |
Dependency |
Type |
Fixed in (mapdb version) |
Remediation Available |
| CVE-2019-10101 |
High |
8.1 |
detected in multiple dependencies |
Transitive |
N/A* |
❌ |
| CVE-2019-10103 |
High |
8.1 |
detected in multiple dependencies |
Transitive |
N/A* |
❌ |
| CVE-2019-10102 |
High |
8.1 |
detected in multiple dependencies |
Transitive |
N/A* |
❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
CVE-2019-10101
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- kotlin-stdlib-1.2.71.jar
- ❌ kotlin-stdlib-common-1.2.71.jar (Vulnerable Library)
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
JetBrains Kotlin versions before 1.3.30 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack.
Publish Date: 2019-07-03
URL: CVE-2019-10101
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10101
Release Date: 2019-07-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
CVE-2019-10103
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- kotlin-stdlib-1.2.71.jar
- ❌ kotlin-stdlib-common-1.2.71.jar (Vulnerable Library)
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
JetBrains IntelliJ IDEA projects created using the Kotlin (JS Client/JVM Server) IDE Template were resolving Gradle artifacts using an http connection, potentially allowing an MITM attack. This issue, which was fixed in Kotlin plugin version 1.3.30, is similar to CVE-2019-10101.
Publish Date: 2019-07-03
URL: CVE-2019-10103
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10103
Release Date: 2019-07-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
CVE-2019-10102
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- kotlin-stdlib-1.2.71.jar
- ❌ kotlin-stdlib-common-1.2.71.jar (Vulnerable Library)
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.
Publish Date: 2019-07-03
URL: CVE-2019-10102
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10102
Release Date: 2019-07-03
Fix Resolution: io.ktor:ktor:1.1.0,org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
JetBrains Kotlin versions before 1.3.30 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack.
Publish Date: 2019-07-03
URL: CVE-2019-10101
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10101
Release Date: 2019-07-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
JetBrains IntelliJ IDEA projects created using the Kotlin (JS Client/JVM Server) IDE Template were resolving Gradle artifacts using an http connection, potentially allowing an MITM attack. This issue, which was fixed in Kotlin plugin version 1.3.30, is similar to CVE-2019-10101.
Publish Date: 2019-07-03
URL: CVE-2019-10103
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10103
Release Date: 2019-07-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /Users/alexmaybaum/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.
Publish Date: 2019-07-03
URL: CVE-2019-10102
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10102
Release Date: 2019-07-03
Fix Resolution: io.ktor:ktor:1.1.0,org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30