Filtered by vendor Apache
Subscribe
Total
1977 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-36372 | 1 Apache | 1 Ozone | 2021-11-19 | 7.5 HIGH | 9.8 CRITICAL |
In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked. | |||||
CVE-2021-39234 | 1 Apache | 1 Ozone | 2021-11-19 | 4.9 MEDIUM | 6.8 MEDIUM |
In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL. | |||||
CVE-2021-39235 | 1 Apache | 1 Ozone | 2021-11-19 | 4.0 MEDIUM | 6.5 MEDIUM |
In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block. | |||||
CVE-2021-27578 | 1 Apache | 1 Zeppelin | 2021-11-18 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts. This issue affects Apache Zeppelin Apache Zeppelin versions prior to 0.9.0. | |||||
CVE-2016-5017 | 1 Apache | 1 Zookeeper | 2021-11-17 | 6.8 MEDIUM | 8.1 HIGH |
Buffer overflow in the C cli shell in Apache Zookeeper before 3.4.9 and 3.5.x before 3.5.3, when using the "cmd:" batch mode syntax, allows attackers to have unspecified impact via a long command string. | |||||
CVE-2021-37580 | 1 Apache | 1 Shenyu | 2021-11-17 | 7.5 HIGH | 9.8 CRITICAL |
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0 | |||||
CVE-2021-26558 | 1 Apache | 1 Shardingsphere-ui | 2021-11-16 | 5.0 MEDIUM | 7.5 HIGH |
Deserialization of Untrusted Data vulnerability of Apache ShardingSphere-UI allows an attacker to inject outer link resources. This issue affects Apache ShardingSphere-UI Apache ShardingSphere-UI version 4.1.1 and later versions; Apache ShardingSphere-UI versions prior to 5.0.0. | |||||
CVE-2021-43082 | 1 Apache | 1 Traffic Server | 2021-11-05 | 7.5 HIGH | 9.8 CRITICAL |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the stats-over-http plugin of Apache Traffic Server allows an attacker to overwrite memory. This issue affects Apache Traffic Server 9.1.0. | |||||
CVE-2021-41585 | 1 Apache | 1 Traffic Server | 2021-11-05 | 5.0 MEDIUM | 7.5 HIGH |
Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0. | |||||
CVE-2021-27644 | 1 Apache | 1 Dolphinscheduler | 2021-11-02 | 6.0 MEDIUM | 8.8 HIGH |
In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password) | |||||
CVE-2021-40865 | 1 Apache | 1 Storm | 2021-10-28 | 7.5 HIGH | 9.8 CRITICAL |
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4 | |||||
CVE-2021-41971 | 1 Apache | 1 Superset | 2021-10-22 | 6.0 MEDIUM | 8.8 HIGH |
Apache Superset up to and including 1.3.0 when configured with ENABLE_TEMPLATE_PROCESSING on (disabled by default) allowed SQL injection when a malicious authenticated user sends an http request with a custom URL. | |||||
CVE-2021-32609 | 1 Apache | 1 Superset | 2021-10-22 | 3.5 LOW | 5.4 MEDIUM |
Apache Superset up to and including 1.1 does not sanitize titles correctly on the Explore page. This allows an attacker with Explore access to save a chart with a malicious title, injecting html (including scripts) into the page. | |||||
CVE-2021-38295 | 1 Apache | 1 Couchdb | 2021-10-20 | 6.0 MEDIUM | 7.3 HIGH |
In Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2 | |||||
CVE-2014-0107 | 2 Apache, Oracle | 2 Xalan-java, Webcenter Sites | 2021-10-20 | 7.5 HIGH | N/A |
The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function. | |||||
CVE-2021-41830 | 1 Apache | 1 Openoffice | 2021-10-19 | 5.0 MEDIUM | 7.5 HIGH |
It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25633 for the LibreOffice advisory. | |||||
CVE-2021-41831 | 1 Apache | 1 Openoffice | 2021-10-19 | 5.0 MEDIUM | 5.3 MEDIUM |
It is possible for an attacker to manipulate the timestamp of signed documents. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25634 for the LibreOffice advisory. | |||||
CVE-2021-41832 | 1 Apache | 1 Openoffice | 2021-10-19 | 5.0 MEDIUM | 7.5 HIGH |
It is possible for an attacker to manipulate documents to appear to be signed by a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25635 for the LibreOffice advisory. | |||||
CVE-2021-42009 | 1 Apache | 1 Traffic Control | 2021-10-18 | 4.0 MEDIUM | 4.3 MEDIUM |
An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3. | |||||
CVE-2021-40439 | 1 Apache | 1 Openoffice | 2021-10-15 | 4.3 MEDIUM | 6.5 MEDIUM |
Apache OpenOffice has a dependency on expat software. Versions prior to 2.1.0 were subject to CVE-2013-0340 a "Billion Laughs" entity expansion denial of service attack and exploit via crafted XML files. ODF files consist of a set of XML files. All versions of Apache OpenOffice up to 4.1.10 are subject to this issue. expat in version 4.1.11 is patched. |