Skip to content

Commit 74b2d1a

Browse files
authored
Merge branch 'main' into 7510-improve-error-message
2 parents dbf8e67 + f77ac80 commit 74b2d1a

File tree

14 files changed

+44
-24
lines changed

14 files changed

+44
-24
lines changed

CHANGELOG.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,39 @@
11
# Change Log
22

3+
## [Version 12.1.1](https://github.com/dependency-check/DependencyCheck/releases/tag/v12.1.1) (2025-04-05)
4+
5+
- fix: resolve NVD data Parse error `com.fasterxml.jackson.core.JsonParseException: Unexpected character (']' (code 93))`
6+
- bump open-vulnerability-client from 7.3.1 to 7.3.2 (#7577)
7+
- fix: update links for repository move from `jeremylong` to the `dependency-check` organization (#7373)
8+
- fix: resolve NPE when processing CVE-2025-2682 (#7558)
9+
- fix: prevent rogue base suppression files (#7544)
10+
- fix: #6819 handle invalid toml file (#7548)
11+
- fix: Use unscored severity only in absence of any CVSS baseScore (#7530)
12+
- fix: protect against exotic version number of yarn (#7525)
13+
- fix: Ignore require-bundle MANIFEST.MF entry for evidence (#7523)
14+
- fix: avoid error on yarn berry audit when no vulnerability found (#7501)
15+
- fix: improve null checks in Downloader (#7493)
16+
- fix: improve null checks resolves https://github.com/dependency-check/dependency-check-gradle/issues/441
17+
- fix: Avoid FPs when Composer product name has php (#7486)
18+
- fix: cli not honoring window paths correctly (#7470)
19+
- fix: Also apply muteNoisyLoggers to UpdateMojo (#7469)
20+
- fix: Make HC5 Downloader honor the connection- and readTimeout settings that the old URLConnectionFactory based downloads observed (#7437)
21+
- docs: sync the supported Maven version with the one stated in the system requirement section (#7570)
22+
- docs: update proxy config documentation (#7550)
23+
- docs: Remove copyright as requested by the Apache foundation
24+
- docs: drop redundant text in the Internet Access Required section (#7521)
25+
- docs: correct gradle documentation (#7511)
26+
27+
See the full listing of [changes](https://github.com/dependency-check/DependencyCheck/milestone/95?closed=1)
28+
329
## [Version 12.1.0](https://github.com/dependency-check/DependencyCheck/releases/tag/v12.1.0) (2025-02-16)
430

531
- build(deps): bump open-vulnerability-client to 7.2.2 (#7407)
632
- resolves issue with downloading data from the NVD (#7406)
733
- fix: Improve thread safety issue #7338 alternative (#7367)
834
- feat: Implement Yarn Berry Analyser (#7319)
935

10-
See the full listing of [changes](https://github.com/dependency-check/DependencyCheck/milestone/94?closed=1
36+
See the full listing of [changes](https://github.com/dependency-check/DependencyCheck/milestone/94?closed=1)
1137

1238
## [Version 12.0.2](https://github.com/dependency-check/DependencyCheck/releases/tag/v12.0.2) (2025-01-29)
1339

ant/pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Copyright (c) 2013 - Jeremy Long. All Rights Reserved.
2020
<parent>
2121
<groupId>org.owasp</groupId>
2222
<artifactId>dependency-check-parent</artifactId>
23-
<version>12.1.1-SNAPSHOT</version>
23+
<version>12.1.2-SNAPSHOT</version>
2424
</parent>
2525

2626
<artifactId>dependency-check-ant</artifactId>

archetype/pom.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,14 +20,14 @@ Copyright (c) 2017 Jeremy Long. All Rights Reserved.
2020
<parent>
2121
<groupId>org.owasp</groupId>
2222
<artifactId>dependency-check-parent</artifactId>
23-
<version>12.1.1-SNAPSHOT</version>
23+
<version>12.1.2-SNAPSHOT</version>
2424
</parent>
2525
<artifactId>dependency-check-plugin</artifactId>
2626
<name>Dependency-Check Plugin Archetype</name>
2727
<packaging>jar</packaging>
2828
<properties>
2929
<!--reproducible build-->
30-
<project.build.outputTimestamp>2025-02-16T14:08:32Z</project.build.outputTimestamp>
30+
<project.build.outputTimestamp>2025-04-05T11:25:33Z</project.build.outputTimestamp>
3131
</properties>
3232
<scm>
3333
<connection>scm:git:https://github.com/dependency-check/DependencyCheck.git</connection>

cli/pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Copyright (c) 2012 - Jeremy Long. All Rights Reserved.
2020
<parent>
2121
<groupId>org.owasp</groupId>
2222
<artifactId>dependency-check-parent</artifactId>
23-
<version>12.1.1-SNAPSHOT</version>
23+
<version>12.1.2-SNAPSHOT</version>
2424
</parent>
2525

2626
<artifactId>dependency-check-cli</artifactId>

core/pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
2020
<parent>
2121
<groupId>org.owasp</groupId>
2222
<artifactId>dependency-check-parent</artifactId>
23-
<version>12.1.1-SNAPSHOT</version>
23+
<version>12.1.2-SNAPSHOT</version>
2424
</parent>
2525

2626
<artifactId>dependency-check-core</artifactId>

core/src/main/java/org/owasp/dependencycheck/analyzer/OssIndexAnalyzer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -359,7 +359,7 @@ private Vulnerability transform(final ComponentReport report, final ComponentRep
359359
availabilityImpact = CvssV2Data.CiaType.fromValue(tmp);
360360
}
361361
final String severity = Cvss2Severity.of((float) cvssScore).name().toUpperCase();
362-
final CvssV2Data cvssData = new CvssV2Data("2.0", source.getCvssVector(), accessVector,
362+
final CvssV2Data cvssData = new CvssV2Data(CvssV2Data.Version._2_0, source.getCvssVector(), accessVector,
363363
accessComplexity, authentication, confidentialityImpact,
364364
integrityImpact, availabilityImpact, cvssScore,
365365
severity, null, null, null, null, null, null, null, null, null, null);

core/src/main/java/org/owasp/dependencycheck/data/nvdcve/CveDB.java

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -741,12 +741,7 @@ public Vulnerability getVulnerability(String cve, Connection conn) throws Databa
741741
integrityImpact == null ? "" : integrityImpact.value().substring(0, 1),
742742
availabilityImpact == null ? "" : availabilityImpact.value().substring(0, 1));
743743

744-
//some older test data may not correctly have the version set.
745-
String cveVersion = "2.0";
746-
if (rsV.getString(18) != null) {
747-
cveVersion = rsV.getString(18);
748-
}
749-
final CvssV2Data cvssData = new CvssV2Data(cveVersion, vector, accessVector,
744+
final CvssV2Data cvssData = new CvssV2Data(CvssV2Data.Version._2_0, vector, accessVector,
750745
accessComplexity, authentication, confidentialityImpact,
751746
integrityImpact, availabilityImpact, rsV.getDouble(11), rsV.getString(3),
752747
null, null, null, null, null, null, null, null, null, null);

core/src/main/java/org/owasp/dependencycheck/processing/BundlerAuditProcessor.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ private void addCriticalityToVulnerability(String parentName, Vulnerability vuln
242242
score = 2.0;
243243
}
244244
LOGGER.debug("bundle-audit vulnerability missing CVSS data: {}", vulnerability.getName());
245-
final CvssV2Data cvssData = new CvssV2Data("2.0", null, null, null, null, null, null, null, score, criticality.toUpperCase(),
245+
final CvssV2Data cvssData = new CvssV2Data(CvssV2Data.Version._2_0, null, null, null, null, null, null, null, score, criticality.toUpperCase(),
246246
null, null, null, null, null, null, null, null, null, null);
247247
final CvssV2 cvssV2 = new CvssV2(null, null, cvssData, criticality.toUpperCase(), null, null, null, null, null, null, null);
248248
vulnerability.setCvssV2(cvssV2);

core/src/main/java/org/owasp/dependencycheck/utils/CvssUtil.java

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,6 @@ public static CvssV2 vectorToCvssV2(String vectorString, Double baseScore) {
115115
vectorString));
116116
}
117117

118-
final String version = CvssV2Data.Version._2_0.value();
119118
//"AV:L/AC:L/Au:N/C:N/I:N/A:C"
120119
final CvssV2Data.AccessVectorType accessVector = CvssV2Data.AccessVectorType.fromValue(metrics.get("AV"));
121120
final CvssV2Data.AccessComplexityType attackComplexity = CvssV2Data.AccessComplexityType.fromValue(metrics.get("AC"));
@@ -125,7 +124,7 @@ public static CvssV2 vectorToCvssV2(String vectorString, Double baseScore) {
125124
final CvssV2Data.CiaType availabilityImpact = CvssV2Data.CiaType.fromValue(metrics.get("A"));
126125

127126
final String baseSeverity = cvssV2ScoreToSeverity(baseScore);
128-
final CvssV2Data data = new CvssV2Data(version, vectorString, accessVector, attackComplexity,
127+
final CvssV2Data data = new CvssV2Data(CvssV2Data.Version._2_0, vectorString, accessVector, attackComplexity,
129128
authentication, confidentialityImpact, integrityImpact, availabilityImpact, baseScore, baseSeverity,
130129
null, null, null, null, null, null, null, null, null, null);
131130
final CvssV2 cvss = new CvssV2(null, null, data, baseSeverity, null, null, null, null, null, null, null);

core/src/test/java/org/owasp/dependencycheck/data/nvd/ecosystem/UrlEcosystemMapperTest.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ public void testGetEcosystemMustHandleNullCveReferences() {
3838
// Given
3939
UrlEcosystemMapper mapper = new UrlEcosystemMapper();
4040

41-
CveItem cveItem = new CveItem();
41+
CveItem cveItem = new CveItem(null,null,null,null,null);
4242
DefCveItem defCveItem = new DefCveItem(cveItem);
4343

4444
// When
@@ -53,7 +53,7 @@ public void testGetEcosystemMustHandleNullCve() {
5353
// Given
5454
UrlEcosystemMapper mapper = new UrlEcosystemMapper();
5555

56-
DefCveItem cveItem = new DefCveItem();
56+
DefCveItem cveItem = new DefCveItem(null);
5757

5858
// When
5959
String output = mapper.getEcosystem(cveItem);

0 commit comments

Comments
 (0)