We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Checkstyle is a development tool to help programmers write Java code that adheres to a coding standard
Library home page: http://checkstyle.sourceforge.net/
Path to dependency file: hadoop-crypto/hadoop-crypto/build.gradle
Path to vulnerable library: 20200729164840_WMHNNU/downloadResource_RHQTXV/20200729165122/checkstyle-8.13.jar
Dependency Hierarchy:
Found in HEAD commit: c87ffc6b57551c0ce1c2ffa481dbff77be9b0e38
Checkstyle before 8.18 loads external DTDs by default.
Publish Date: 2019-03-11
URL: CVE-2019-9658
Base Score Metrics:
Type: Upgrade version
Origin: checkstyle/checkstyle#6474
Release Date: 2019-03-11
Fix Resolution: checkstyle-8.18
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered:
No branches or pull requests
CVE-2019-9658 - Medium Severity Vulnerability
Vulnerable Library - checkstyle-8.13.jar
Checkstyle is a development tool to help programmers write Java code that adheres to a coding standard
Library home page: http://checkstyle.sourceforge.net/
Path to dependency file: hadoop-crypto/hadoop-crypto/build.gradle
Path to vulnerable library: 20200729164840_WMHNNU/downloadResource_RHQTXV/20200729165122/checkstyle-8.13.jar
Dependency Hierarchy:
Found in HEAD commit: c87ffc6b57551c0ce1c2ffa481dbff77be9b0e38
Vulnerability Details
Checkstyle before 8.18 loads external DTDs by default.
Publish Date: 2019-03-11
URL: CVE-2019-9658
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: checkstyle/checkstyle#6474
Release Date: 2019-03-11
Fix Resolution: checkstyle-8.18
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: