Apache

Geode

21 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.31%
  • Veröffentlicht 25.10.2022 17:15:53
  • Zuletzt bearbeitet 09.05.2025 19:15:54

Apache Geode versions up to 1.15.0 are vulnerable to a Cross-Site Scripting (XSS) via data injection when using Pulse web application to view Region entries.

  • EPSS 0.61%
  • Veröffentlicht 31.08.2022 07:15:07
  • Zuletzt bearbeitet 21.11.2024 07:14:18

Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode ...

  • EPSS 0.24%
  • Veröffentlicht 31.08.2022 07:15:07
  • Zuletzt bearbeitet 21.11.2024 07:14:18

Apache Geode versions up to 1.12.2 and 1.13.2 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 11. Any user wishing to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geo...

  • EPSS 0.76%
  • Veröffentlicht 31.08.2022 07:15:07
  • Zuletzt bearbeitet 21.11.2024 07:14:18

Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 8. Any user still on Java 8 who wishes to protect against deserialization attacks involving JMX or RMI sh...

  • EPSS 0.37%
  • Veröffentlicht 04.01.2022 09:15:07
  • Zuletzt bearbeitet 21.11.2024 06:11:13

Apache Geode versions up to 1.12.4 and 1.13.4 are vulnerable to a log file redaction of sensitive information flaw when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix "syspr...

  • EPSS 0.1%
  • Veröffentlicht 16.03.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:23

When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a ma...

  • EPSS 0.87%
  • Veröffentlicht 02.03.2020 17:15:17
  • Zuletzt bearbeitet 21.11.2024 04:27:37

A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to ex...

Warnung Exploit
  • EPSS 94.47%
  • Veröffentlicht 24.02.2020 22:15:12
  • Zuletzt bearbeitet 28.03.2025 17:15:49

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available t...

  • EPSS 3.32%
  • Veröffentlicht 02.01.2020 17:15:10
  • Zuletzt bearbeitet 21.11.2024 02:01:14

An issue was found in Docker before 1.6.0. Some programs and scripts in Docker are downloaded via HTTP and then executed or used in unsafe ways.

Warnung Exploit
  • EPSS 44.57%
  • Veröffentlicht 28.08.2019 21:15:10
  • Zuletzt bearbeitet 14.03.2025 17:32:41

Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or s...