Vulnerabilities > Apache > Critical

DATE CVE VULNERABILITY TITLE RISK
2023-07-17 CVE-2023-26512 Unspecified vulnerability in Apache Eventmesh 1.7.0/1.8.0
CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g.
network
low complexity
apache
critical
9.8
2023-07-12 CVE-2023-37582 Unspecified vulnerability in Apache Rocketmq
The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1.
network
low complexity
apache
critical
9.8
2023-07-03 CVE-2023-35797 Unspecified vulnerability in Apache Apache-Airflow-Providers-Apache-Hive
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider. This issue affects Apache Airflow Apache Hive Provider: before 6.1.1. Before version 6.1.1 it was possible to bypass the security check to RCE via principal parameter.
network
low complexity
apache
critical
9.8
2023-06-21 CVE-2023-34340 Unspecified vulnerability in Apache Accumulo 2.1.0
Improper Authentication vulnerability in Apache Software Foundation Apache Accumulo. This issue affects Apache Accumulo: 2.1.0. Accumulo 2.1.0 contains a defect in the user authentication process that may succeed when invalid credentials are provided.
network
low complexity
apache
critical
9.8
2023-05-24 CVE-2023-33246 Unspecified vulnerability in Apache Rocketmq
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as.
network
low complexity
apache
critical
9.8
2023-05-22 CVE-2023-31062 Unspecified vulnerability in Apache Inlong
Improper Privilege Management Vulnerabilities in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0.  When the attacker has access to a valid (but unprivileged) account, the exploit can be executed using Burp Suite by sending a login request and following it with a subsequent HTTP request using the returned cookie. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 to solve it.
network
low complexity
apache
critical
9.8
2023-05-22 CVE-2023-31065 Unspecified vulnerability in Apache Inlong 1.4.0/1.5.0/1.6.0
Insufficient Session Expiration vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.  An old session can be used by an attacker even after the user has been deleted or the password has been changed. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 , https://github.com/apache/inlong/pull/7884 https://github.com/apache/inlong/pull/7884 to solve it.
network
low complexity
apache
critical
9.1
2023-05-22 CVE-2023-31066 Unspecified vulnerability in Apache Inlong 1.4.0/1.5.0/1.6.0
Files or Directories Accessible to External Parties vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.
network
low complexity
apache
critical
9.1
2023-05-22 CVE-2023-31098 Weak Password Requirements vulnerability in Apache Inlong
Weak Password Requirements vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.6.0.  When users change their password to a simple password (with any character or symbol), attackers can easily guess the user's password and access the account. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7805 https://github.com/apache/inlong/pull/7805 to solve it.
network
low complexity
apache CWE-521
critical
9.8
2023-05-15 CVE-2022-47937 Unspecified vulnerability in Apache Sling Commons Json
Improper input validation in the Apache Sling Commons JSON bundle allows an attacker to trigger unexpected errors by supplying specially-crafted input. The org.apache.sling.commons.json bundle has been deprecated as of March 2017 and should not be used anymore.
network
low complexity
apache
critical
9.8