CVE-2021-36737
- EPSS 15.93%
- Veröffentlicht 06.01.2022 09:15:07
- Zuletzt bearbeitet 21.11.2024 06:13:59
The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact
CVE-2021-36738
- EPSS 15.93%
- Veröffentlicht 06.01.2022 09:15:07
- Zuletzt bearbeitet 21.11.2024 06:13:59
The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
CVE-2021-36739
- EPSS 15.93%
- Veröffentlicht 06.01.2022 09:15:07
- Zuletzt bearbeitet 22.05.2025 19:15:24
The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.
CVE-2020-15250
- EPSS 0.06%
- Veröffentlicht 12.10.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 05:05:11
In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, whe...
CVE-2019-0186
- EPSS 6.78%
- Veröffentlicht 26.04.2019 16:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:26
The input fields of the Apache Pluto "Chat Room" demo portlet 3.0.0 and 3.0.1 are vulnerable to Cross-Site Scripting (XSS) attacks. Mitigation: * Uninstall the ChatRoomDemo war file - or - * migrate to version 3.1.0 of the chat-room-demo war file
CVE-2018-1306
- EPSS 69.81%
- Veröffentlicht 27.06.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:35
The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An atta...