org.fitnesse:fitnesse@20150814 vulnerabilities
-
latest version
20241026
-
first published
18 years ago
-
latest version published
a month ago
-
licenses detected
- [20111025,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.fitnesse:fitnesse package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper HTML escaping of user-supplied input. An attacker can execute arbitrary scripts in the context of the user's browser session by injecting malicious scripts into input fields that are improperly sanitized. How to fix Cross-site Scripting (XSS)? Upgrade |
[,20241026)
|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Directory Traversal due to the improper handling of file paths. An attacker can determine the presence of specific files and potentially access file contents under certain conditions. How to fix Directory Traversal? Upgrade |
[,20241026)
|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization passed into a certain parameter. An attacker can inject and execute arbitrary script code in the context of the user's browser session by crafting a link containing a malicious parameter and convincing the user to click on it. How to fix Cross-site Scripting (XSS)? Upgrade |
[,20220319)
|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Command Injection. An authenticated attacker can execute arbitrary OS commands by sending crafted requests. Note: It is recommended to use FitNesse Safely as decribed in the Security Policy . How to fix Command Injection? There is no fixed version for |
[0,)
|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Improper Restriction of XML External Entity Reference allowing an attacker to obtain sensitive information, alter data or cause a denial-of-service condition. How to fix Improper Restriction of XML External Entity Reference? There is no fixed version for |
[0,)
|
org.fitnesse:fitnesse is a web server, a wiki and an automated testing tool for software. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). This may allow a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is using the product and accessing a link with specially crafted multiple parameters. Note: It is recommended to use FitNesse Safely as decribed in the Security Policy . How to fix Cross-site Scripting (XSS)? Upgrade |
[,20220319)
|