Vulnerabilites related to jfree - jfreechart
Vulnerability from fkie_nvd
Published
2024-04-10 19:15
Modified
2025-05-27 14:20
Severity ?
Summary
JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the component /chart/plot/CompassPlot.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jfree | jfreechart | 1.5.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jfree:jfreechart:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4DC9D75E-294E-44D6-BDA5-7D6BC240BBE0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the component /chart/plot/CompassPlot.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", "value": "Se descubri\u00f3 que JFreeChart v1.5.4 era vulnerable a ArrayIndexOutOfBounds a trav\u00e9s del componente /chart/plot/CompassPlot.java. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad. Es posible que la presentaci\u00f3n se haya basado en una herramienta que no es lo suficientemente s\u00f3lida para la identificaci\u00f3n de vulnerabilidades." } ], "id": "CVE-2024-23077", "lastModified": "2025-05-27T14:20:31.357", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-04-10T19:15:49.020", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://jfreechart.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/jfree/jfreechart" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://jfreechart.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/jfree/jfreechart" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-10 19:15
Modified
2025-05-27 14:20
Severity ?
Summary
JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the 'setSeriesNeedle(int index, int type)' method. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jfreechart.com | Broken Link | |
cve@mitre.org | http://jfreeorg.com | Broken Link | |
cve@mitre.org | https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jfreechart.com | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://jfreeorg.com | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jfree | jfreechart | 1.5.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jfree:jfreechart:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4DC9D75E-294E-44D6-BDA5-7D6BC240BBE0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the \u0027setSeriesNeedle(int index, int type)\u0027 method. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", "value": "Se descubri\u00f3 que JFreeChart v1.5.4 era vulnerable a ArrayIndexOutOfBounds mediante el m\u00e9todo \u0027setSeriesNeedle(int index, int type)\u0027. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad. Es posible que la presentaci\u00f3n se haya basado en una herramienta que no es lo suficientemente s\u00f3lida para la identificaci\u00f3n de vulnerabilidades." } ], "id": "CVE-2023-52070", "lastModified": "2025-05-27T14:20:46.280", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-04-10T19:15:48.973", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://jfreechart.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://jfreeorg.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://jfreechart.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://jfreeorg.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-10 12:15
Modified
2025-05-27 13:29
Severity ?
Summary
JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /labels/BubbleXYItemLabelGenerator.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jfree | jfreechart | 1.5.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jfree:jfreechart:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4DC9D75E-294E-44D6-BDA5-7D6BC240BBE0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /labels/BubbleXYItemLabelGenerator.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", "value": "Se descubri\u00f3 que FreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /labels/BubbleXYItemLabelGenerator.java." } ], "id": "CVE-2024-23076", "lastModified": "2025-05-27T13:29:49.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-04-10T12:15:09.190", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://jfreechart.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/LLM4IG/115de1f7c3051403f0301cee0d293518" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/jfree/jfreechart" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://jfreechart.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/LLM4IG/115de1f7c3051403f0301cee0d293518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/jfree/jfreechart" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-11 21:46
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the image map feature in JFreeChart 1.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) chart name or (2) chart tool tip text; or the (3) href, (4) shape, or (5) coords attribute of a chart area.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jfree | jfreechart | 1.0.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:jfree:jfreechart:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E3972FA8-57E2-4C8B-B8F3-4130FF78D4D2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the image map feature in JFreeChart 1.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) chart name or (2) chart tool tip text; or the (3) href, (4) shape, or (5) coords attribute of a chart area." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la caracter\u00edstica de trazo de plano de una imagen en JFreeChart 1.0.8 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de (1) un nombre de traza o (2) herramienta de texto gr\u00e1fico; o los atributos (3) href, (4) shape, o (5) coords de un \u00e1rea de traza." } ], "id": "CVE-2007-6306", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-11T21:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/branches/jfreechart-1.0.8-security/NEWS?r1=679\u0026r2=680" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/entity/ChartEntity.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/imagemap/ImageMapUtilities.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/41843" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/41844" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/41845" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27959" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31493" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3430" }, { "source": "cve@mitre.org", "url": "http://www.rapid7.com/advisories/R7-0031.jsp" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0151.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0158.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0213.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/484709/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26752" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/branches/jfreechart-1.0.8-security/NEWS?r1=679\u0026r2=680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/entity/ChartEntity.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/imagemap/ImageMapUtilities.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27959" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rapid7.com/advisories/R7-0031.jsp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0151.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0158.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0213.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/484709/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38922" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-08 23:15
Modified
2025-05-27 14:20
Severity ?
Summary
JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jfree | jfreechart | 1.5.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jfree:jfreechart:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4DC9D75E-294E-44D6-BDA5-7D6BC240BBE0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", "value": "Se descubri\u00f3 que JFreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /chart/annotations/CategoryLineAnnotation." } ], "id": "CVE-2024-22949", "lastModified": "2025-05-27T14:20:22.080", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-04-08T23:15:07.647", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://jfreechart.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/LLM4IG/35c46e009b205ef6acd0e290e80fb876" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/jfree/jfreechart" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://jfreechart.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/LLM4IG/35c46e009b205ef6acd0e290e80fb876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/jfree/jfreechart" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-11 21:46
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in clickstats.php in wwwstats 3.21 allow remote attackers to inject arbitrary web script or HTML via (1) the link parameter or (2) the User-Agent HTTP header.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jfree | jfreechart | 1.0.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:jfree:jfreechart:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E3972FA8-57E2-4C8B-B8F3-4130FF78D4D2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in clickstats.php in wwwstats 3.21 allow remote attackers to inject arbitrary web script or HTML via (1) the link parameter or (2) the User-Agent HTTP header." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en clickstats.php en wwwstats 3.21 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro (1) link o (2) la cabecera HTTP de agente-usuario." } ], "id": "CVE-2007-6307", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-11T21:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28002" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3431" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/484727/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/26759" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.timeprog.com/wwwstats/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/484727/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/26759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.timeprog.com/wwwstats/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38925" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2007-6307 (GCVE-0-2007-6307)
Vulnerability from cvelistv5
Published
2007-12-11 21:00
Modified
2024-08-07 16:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in clickstats.php in wwwstats 3.21 allow remote attackers to inject arbitrary web script or HTML via (1) the link parameter or (2) the User-Agent HTTP header.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:02:36.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20071207 [ISecAuditors Security Advisories] wwwstats is vulnerable to Persistent XSS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/484727/100/0/threaded" }, { "name": "26759", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26759" }, { "name": "wwwstats-clickstats-xss(38925)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38925" }, { "name": "28002", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28002" }, { "name": "3431", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3431" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.timeprog.com/wwwstats/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in clickstats.php in wwwstats 3.21 allow remote attackers to inject arbitrary web script or HTML via (1) the link parameter or (2) the User-Agent HTTP header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20071207 [ISecAuditors Security Advisories] wwwstats is vulnerable to Persistent XSS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/484727/100/0/threaded" }, { "name": "26759", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26759" }, { "name": "wwwstats-clickstats-xss(38925)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38925" }, { "name": "28002", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28002" }, { "name": "3431", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3431" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.timeprog.com/wwwstats/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in clickstats.php in wwwstats 3.21 allow remote attackers to inject arbitrary web script or HTML via (1) the link parameter or (2) the User-Agent HTTP header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20071207 [ISecAuditors Security Advisories] wwwstats is vulnerable to Persistent XSS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/484727/100/0/threaded" }, { "name": "26759", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26759" }, { "name": "wwwstats-clickstats-xss(38925)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38925" }, { "name": "28002", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28002" }, { "name": "3431", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3431" }, { "name": "http://www.timeprog.com/wwwstats/", "refsource": "CONFIRM", "url": "http://www.timeprog.com/wwwstats/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6307", "datePublished": "2007-12-11T21:00:00", "dateReserved": "2007-12-11T00:00:00", "dateUpdated": "2024-08-07T16:02:36.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6306 (GCVE-0-2007-6306)
Vulnerability from cvelistv5
Published
2007-12-11 21:00
Modified
2024-08-07 16:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the image map feature in JFreeChart 1.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) chart name or (2) chart tool tip text; or the (3) href, (4) shape, or (5) coords attribute of a chart area.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:02:36.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0630", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "name": "RHSA-2008:0213", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0213.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/advisories/R7-0031.jsp" }, { "name": "31493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31493" }, { "name": "27959", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27959" }, { "name": "RHSA-2008:0151", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0151.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/branches/jfreechart-1.0.8-security/NEWS?r1=679\u0026r2=680" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/entity/ChartEntity.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "name": "26752", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26752" }, { "name": "20071206 R7-0031: JFreeChart Image Map Cross-Site Scripting Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/484709/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/imagemap/ImageMapUtilities.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "name": "41843", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41843" }, { "name": "41844", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41844" }, { "name": "3430", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3430" }, { "name": "41845", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41845" }, { "name": "RHSA-2008:0158", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0158.html" }, { "name": "RHSA-2008:0261", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "name": "jfreechart-imagemap-xss(38922)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38922" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the image map feature in JFreeChart 1.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) chart name or (2) chart tool tip text; or the (3) href, (4) shape, or (5) coords attribute of a chart area." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2008:0630", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "name": "RHSA-2008:0213", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0213.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/advisories/R7-0031.jsp" }, { "name": "31493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31493" }, { "name": "27959", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27959" }, { "name": "RHSA-2008:0151", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0151.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/branches/jfreechart-1.0.8-security/NEWS?r1=679\u0026r2=680" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/entity/ChartEntity.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "name": "26752", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26752" }, { "name": "20071206 R7-0031: JFreeChart Image Map Cross-Site Scripting Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/484709/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/imagemap/ImageMapUtilities.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "name": "41843", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41843" }, { "name": "41844", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41844" }, { "name": "3430", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3430" }, { "name": "41845", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41845" }, { "name": "RHSA-2008:0158", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0158.html" }, { "name": "RHSA-2008:0261", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "name": "jfreechart-imagemap-xss(38922)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38922" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the image map feature in JFreeChart 1.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) chart name or (2) chart tool tip text; or the (3) href, (4) shape, or (5) coords attribute of a chart area." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0630", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "name": "RHSA-2008:0213", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0213.html" }, { "name": "http://www.rapid7.com/advisories/R7-0031.jsp", "refsource": "MISC", "url": "http://www.rapid7.com/advisories/R7-0031.jsp" }, { "name": "31493", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31493" }, { "name": "27959", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27959" }, { "name": "RHSA-2008:0151", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0151.html" }, { "name": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/branches/jfreechart-1.0.8-security/NEWS?r1=679\u0026r2=680", "refsource": "CONFIRM", "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/branches/jfreechart-1.0.8-security/NEWS?r1=679\u0026r2=680" }, { "name": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/entity/ChartEntity.java?r1=662\u0026r2=661\u0026pathrev=662", "refsource": "MISC", "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/entity/ChartEntity.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "name": "26752", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26752" }, { "name": "20071206 R7-0031: JFreeChart Image Map Cross-Site Scripting Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/484709/100/0/threaded" }, { "name": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/imagemap/ImageMapUtilities.java?r1=662\u0026r2=661\u0026pathrev=662", "refsource": "MISC", "url": "http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/trunk/source/org/jfree/chart/imagemap/ImageMapUtilities.java?r1=662\u0026r2=661\u0026pathrev=662" }, { "name": "41843", "refsource": "OSVDB", "url": "http://osvdb.org/41843" }, { "name": "41844", "refsource": "OSVDB", "url": "http://osvdb.org/41844" }, { "name": "3430", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3430" }, { "name": "41845", "refsource": "OSVDB", "url": "http://osvdb.org/41845" }, { "name": "RHSA-2008:0158", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0158.html" }, { "name": "RHSA-2008:0261", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "name": "jfreechart-imagemap-xss(38922)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38922" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6306", "datePublished": "2007-12-11T21:00:00", "dateReserved": "2007-12-11T00:00:00", "dateUpdated": "2024-08-07T16:02:36.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52070 (GCVE-0-2023-52070)
Vulnerability from cvelistv5
Published
2024-04-10 00:00
Modified
2024-08-16 15:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the 'setSeriesNeedle(int index, int type)' method. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://jfreechart.com" }, { "tags": [ "x_transferred" ], "url": "http://jfreeorg.com" }, { "tags": [ "x_transferred" ], "url": "https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:jfree:jfreechart:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jfreechart", "vendor": "jfree", "versions": [ { "status": "affected", "version": "1.5.4" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52070", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T19:34:05.407897Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-16T15:10:09.538Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the \u0027setSeriesNeedle(int index, int type)\u0027 method. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-11T18:58:08.870303", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://jfreechart.com" }, { "url": "http://jfreeorg.com" }, { "url": "https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b" } ], "tags": [ "disputed" ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-52070", "datePublished": "2024-04-10T00:00:00", "dateReserved": "2023-12-26T00:00:00", "dateUpdated": "2024-08-16T15:10:09.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23077 (GCVE-0-2024-23077)
Vulnerability from cvelistv5
Published
2024-04-10 00:00
Modified
2024-08-21 13:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the component /chart/plot/CompassPlot.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:51:11.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://jfreechart.com" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jfree/jfreechart" }, { "tags": [ "x_transferred" ], "url": "https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:jfree:jfreechart:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jfreechart", "vendor": "jfree", "versions": [ { "status": "affected", "version": "1.5.4" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23077", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-21T13:38:08.905536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-21T13:40:15.595Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the component /chart/plot/CompassPlot.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-11T19:01:24.740382", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://jfreechart.com" }, { "url": "https://github.com/jfree/jfreechart" }, { "url": "https://gist.github.com/LLM4IG/f55de46e65fb5a19b7815adb36fd858b" } ], "tags": [ "disputed" ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-23077", "datePublished": "2024-04-10T00:00:00", "dateReserved": "2024-01-11T00:00:00", "dateUpdated": "2024-08-21T13:40:15.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22949 (GCVE-0-2024-22949)
Vulnerability from cvelistv5
Published
2024-04-08 00:00
Modified
2024-10-28 13:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:51:11.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://jfreechart.com" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jfree/jfreechart" }, { "tags": [ "x_transferred" ], "url": "https://gist.github.com/LLM4IG/35c46e009b205ef6acd0e290e80fb876" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:jfree:jfreechart:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jfreechart", "vendor": "jfree", "versions": [ { "status": "affected", "version": "1.5.4" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-22949", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T19:08:36.486190Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T13:53:37.036Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-11T18:57:22.406961", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://jfreechart.com" }, { "url": "https://github.com/jfree/jfreechart" }, { "url": "https://gist.github.com/LLM4IG/35c46e009b205ef6acd0e290e80fb876" } ], "tags": [ "disputed" ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-22949", "datePublished": "2024-04-08T00:00:00", "dateReserved": "2024-01-11T00:00:00", "dateUpdated": "2024-10-28T13:53:37.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23076 (GCVE-0-2024-23076)
Vulnerability from cvelistv5
Published
2024-04-10 00:00
Modified
2024-10-25 20:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /labels/BubbleXYItemLabelGenerator.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:51:11.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://jfreechart.com" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jfree/jfreechart" }, { "tags": [ "x_transferred" ], "url": "https://gist.github.com/LLM4IG/115de1f7c3051403f0301cee0d293518" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:jfree:jfreechart:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jfreechart", "vendor": "jfree", "versions": [ { "status": "affected", "version": "1.5.4" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23076", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-11T16:51:09.885636Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-25T20:17:57.300Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /labels/BubbleXYItemLabelGenerator.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-11T19:11:21.710988", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://jfreechart.com" }, { "url": "https://github.com/jfree/jfreechart" }, { "url": "https://gist.github.com/LLM4IG/115de1f7c3051403f0301cee0d293518" } ], "tags": [ "disputed" ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-23076", "datePublished": "2024-04-10T00:00:00", "dateReserved": "2024-01-11T00:00:00", "dateUpdated": "2024-10-25T20:17:57.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }