CVE-2020-27218
- EPSS 0.6%
- Veröffentlicht 28.11.2020 01:15:11
- Zuletzt bearbeitet 21.11.2024 05:20:52
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if a...
CVE-2020-13954
- EPSS 8.03%
- Veröffentlicht 12.11.2020 13:15:11
- Zuletzt bearbeitet 21.11.2024 05:02:13
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to ...
- EPSS 0.02%
- Veröffentlicht 23.10.2020 13:15:16
- Zuletzt bearbeitet 21.11.2024 05:20:52
In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can obser...
CVE-2020-5421
- EPSS 63.83%
- Veröffentlicht 19.09.2020 04:15:11
- Zuletzt bearbeitet 21.11.2024 05:34:08
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jses...
CVE-2020-12723
- EPSS 0.21%
- Veröffentlicht 05.06.2020 15:15:10
- Zuletzt bearbeitet 21.11.2024 05:00:08
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
CVE-2020-10878
- EPSS 0.11%
- Veröffentlicht 05.06.2020 14:15:10
- Zuletzt bearbeitet 21.11.2024 04:56:16
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
CVE-2020-7656
- EPSS 1.11%
- Veröffentlicht 19.05.2020 21:15:10
- Zuletzt bearbeitet 21.11.2024 05:37:33
jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be...
CVE-2020-10683
- EPSS 6.96%
- Veröffentlicht 01.05.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 04:55:50
dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any a...
CVE-2020-11022
- EPSS 18.04%
- Veröffentlicht 29.04.2020 22:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:36
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This prob...
CVE-2020-11023
- EPSS 32.3%
- Veröffentlicht 29.04.2020 21:15:11
- Zuletzt bearbeitet 07.11.2025 19:32:52
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may ex...