Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkstyle checkstyle vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2019-10782
All versions of com.puppycrawl.tools:checkstyle prior to 8.29 are vulnerable to XML External Entity (XXE) Injection due to an incomplete fix for CVE-2019-9658.
Checkstyle Checkstyle
3 Github repositories
5.3
CVSSv3
CVE-2019-9658
Checkstyle prior to 8.18 loads external DTDs by default.
Checkstyle Checkstyle
Debian Debian Linux 8.0
Fedoraproject Fedora 28
Fedoraproject Fedora 29
8.8
CVSSv3
CVE-2018-1000009
Jenkins Checkstyle Plugin 3.49 and previous versions processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-...
Jenkins Checkstyle
NA
CVE-2024-5273
Jenkins Report Info Plugin 1.2 and previous versions does not perform path validation of the workspace directory while serving report files, allowing attackers with Item/Configure permission to retrieve Surefire failures, PMD violations, Findbugs bugs, and Checkstyle errors on th...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
client side
CVE-2021-47601
deserialization
CVE-2024-34994
encryption
CVE-2021-47609
CVE-2024-37079
CVE-2024-38608
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started