Vulnerabilities > Apache

DATE CVE VULNERABILITY TITLE RISK
2023-06-14 CVE-2023-34396 Unspecified vulnerability in Apache Struts
Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater
network
low complexity
apache
7.5
2023-06-12 CVE-2023-34212 Deserialization of Untrusted Data vulnerability in Apache Nifi
The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location. The resolution validates the JNDI URL and restricts locations to a set of allowed schemes. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
network
low complexity
apache CWE-502
6.5
2023-06-12 CVE-2023-34468 Unspecified vulnerability in Apache Nifi
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
network
low complexity
apache
8.8
2023-06-07 CVE-2023-30575 Unspecified vulnerability in Apache Guacamole
Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.
network
low complexity
apache
7.5
2023-06-07 CVE-2023-30576 Unspecified vulnerability in Apache Guacamole
Apache Guacamole 0.9.10 through 1.5.1 may continue to reference a freed RDP audio input buffer.
network
high complexity
apache
8.1
2023-05-30 CVE-2023-33234 Unspecified vulnerability in Apache Airflow Cncf Kubernetes
Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection. In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner.  Operators should upgrade to provider version 7.0.0 which has removed the vulnerability.
network
low complexity
apache
7.2
2023-05-30 CVE-2023-30601 Unspecified vulnerability in Apache Cassandra
Privilege escalation when enabling FQL/Audit logs allows user with JMX access to run arbitrary commands as the user running Apache Cassandra This issue affects Apache Cassandra: from 4.0.0 through 4.0.9, from 4.1.0 through 4.1.1. WORKAROUND The vulnerability requires nodetool/JMX access to be exploitable, disable access for any non-trusted users. MITIGATION Upgrade to 4.0.10 or 4.1.2 and leave the new FQL/Auditlog configuration property allow_nodetool_archive_command as false.
local
low complexity
apache
7.8
2023-05-25 CVE-2022-46907 Unspecified vulnerability in Apache Jspwiki
A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
network
low complexity
apache
6.1
2023-05-24 CVE-2023-33246 Unspecified vulnerability in Apache Rocketmq
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as.
network
low complexity
apache
critical
9.8
2023-05-22 CVE-2023-31062 Unspecified vulnerability in Apache Inlong
Improper Privilege Management Vulnerabilities in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0.  When the attacker has access to a valid (but unprivileged) account, the exploit can be executed using Burp Suite by sending a login request and following it with a subsequent HTTP request using the returned cookie. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 to solve it.
network
low complexity
apache
critical
9.8