Filtered by vendor Apache
Subscribe
Total
1977 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2016-8749 | 1 Apache | 1 Camel | 2019-05-24 | 7.5 HIGH | 9.8 CRITICAL |
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks. | |||||
CVE-2017-12633 | 1 Apache | 1 Camel | 2019-05-24 | 7.5 HIGH | 9.8 CRITICAL |
The camel-hessian component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws. | |||||
CVE-2017-3159 | 1 Apache | 1 Camel | 2019-05-24 | 7.5 HIGH | 9.8 CRITICAL |
Apache Camel's camel-snakeyaml component is vulnerable to Java object de-serialization vulnerability. De-serializing untrusted data can lead to security flaws. | |||||
CVE-2017-12634 | 1 Apache | 1 Camel | 2019-05-24 | 7.5 HIGH | 9.8 CRITICAL |
The camel-castor component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws. | |||||
CVE-2018-8041 | 1 Apache | 1 Camel | 2019-05-24 | 5.0 MEDIUM | 5.3 MEDIUM |
Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal. | |||||
CVE-2015-5348 | 1 Apache | 1 Camel | 2019-05-24 | 6.8 MEDIUM | 8.1 HIGH |
Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request. | |||||
CVE-2015-0264 | 1 Apache | 1 Camel | 2019-05-24 | 5.0 MEDIUM | N/A |
Multiple XML external entity (XXE) vulnerabilities in builder/xml/XPathBuilder.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allow remote attackers to read arbitrary files via an external entity in an invalid XML (1) String or (2) GenericFile object in an XPath query. | |||||
CVE-2018-8027 | 1 Apache | 1 Camel | 2019-05-24 | 7.5 HIGH | 9.8 CRITICAL |
Apache Camel 2.20.0 to 2.20.3 and 2.21.0 Core is vulnerable to XXE in XSD validation processor. | |||||
CVE-2017-5643 | 1 Apache | 1 Camel | 2019-05-24 | 5.8 MEDIUM | 7.4 HIGH |
Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE. | |||||
CVE-2019-10078 | 1 Apache | 1 Jspwiki | 2019-05-23 | 4.3 MEDIUM | 6.1 MEDIUM |
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable. | |||||
CVE-2019-10077 | 1 Apache | 1 Jspwiki | 2019-05-23 | 4.3 MEDIUM | 6.1 MEDIUM |
A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. | |||||
CVE-2019-10076 | 1 Apache | 1 Jspwiki | 2019-05-23 | 4.3 MEDIUM | 6.1 MEDIUM |
A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. | |||||
CVE-2019-0224 | 1 Apache | 1 Jspwiki | 2019-05-19 | 4.3 MEDIUM | 6.1 MEDIUM |
In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser. | |||||
CVE-2018-20242 | 1 Apache | 1 Jspwiki | 2019-05-19 | 4.3 MEDIUM | 6.1 MEDIUM |
A carefully crafted URL could trigger an XSS vulnerability on Apache JSPWiki, from versions up to 2.10.5, which could lead to session hijacking. | |||||
CVE-2018-8034 | 4 Apache, Canonical, Debian and 1 more | 4 Tomcat, Ubuntu Linux, Debian Linux and 1 more | 2019-05-14 | 5.0 MEDIUM | 7.5 HIGH |
The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88. | |||||
CVE-2018-8007 | 1 Apache | 1 Couchdb | 2019-05-13 | 9.0 HIGH | 7.2 HIGH |
Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2. | |||||
CVE-2017-12636 | 1 Apache | 1 Couchdb | 2019-05-13 | 9.0 HIGH | 7.2 HIGH |
CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet. | |||||
CVE-2017-3157 | 3 Apache, Debian, Redhat | 8 Openoffice, Debian Linux, Enterprise Linux Desktop and 5 more | 2019-05-08 | 4.3 MEDIUM | 5.5 MEDIUM |
By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to send the document back to the attacker. The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back. | |||||
CVE-2014-0030 | 1 Apache | 1 Roller | 2019-05-06 | 7.5 HIGH | 9.8 CRITICAL |
The XML-RPC protocol support in Apache Roller before 5.0.3 allows attackers to conduct XML External Entity (XXE) attacks via unspecified vectors. | |||||
CVE-2016-6793 | 1 Apache | 1 Wicket | 2019-05-06 | 6.4 MEDIUM | 9.1 CRITICAL |
The DiskFileItem class in Apache Wicket 6.x before 6.25.0 and 1.5.x before 1.5.17 allows remote attackers to cause a denial of service (infinite loop) and write to, move, and delete files with the permissions of DiskFileItem, and if running on a Java VM before 1.3.1, execute arbitrary code via a crafted serialized Java object. |