org.fitnesse:fitnesse@20130530 vulnerabilities
-
latest version
20240219
-
first published
17 years ago
-
latest version published
2 months ago
-
licenses detected
- [20111025,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.fitnesse:fitnesse package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization passed into a certain parameter. An attacker can inject and execute arbitrary script code in the context of the user's browser session by crafting a link containing a malicious parameter and convincing the user to click on it. How to fix Cross-site Scripting (XSS)? Upgrade |
[,20220319)
|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Command Injection. An authenticated attacker can execute arbitrary OS commands by sending crafted requests. Note: It is recommended to use FitNesse Safely as decribed in the Security Policy . How to fix Command Injection? There is no fixed version for |
[0,)
|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Improper Restriction of XML External Entity Reference allowing an attacker to obtain sensitive information, alter data or cause a denial-of-service condition. How to fix Improper Restriction of XML External Entity Reference? There is no fixed version for |
[0,)
|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). This may allow a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is using the product and accessing a link with specially crafted multiple parameters. Note: It is recommended to use FitNesse Safely as decribed in the Security Policy . How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Arbitrary Command Execution. FitNesse Wiki 20131110, 20140201, and earlier allows remote attackers to execute arbitrary commands by defining a How to fix Arbitrary Command Execution? Upgrade |
[0,20140201)
|