Apache

Pluto

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 15.93%
  • Veröffentlicht 06.01.2022 09:15:07
  • Zuletzt bearbeitet 21.11.2024 06:13:59

The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact

  • EPSS 15.93%
  • Veröffentlicht 06.01.2022 09:15:07
  • Zuletzt bearbeitet 21.11.2024 06:13:59

The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact

  • EPSS 15.93%
  • Veröffentlicht 06.01.2022 09:15:07
  • Zuletzt bearbeitet 22.05.2025 19:15:24

The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 12.10.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:05:11

In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, whe...

Exploit
  • EPSS 6.78%
  • Veröffentlicht 26.04.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:26

The input fields of the Apache Pluto "Chat Room" demo portlet 3.0.0 and 3.0.1 are vulnerable to Cross-Site Scripting (XSS) attacks. Mitigation: * Uninstall the ChatRoomDemo war file - or - * migrate to version 3.1.0 of the chat-room-demo war file

Exploit
  • EPSS 69.81%
  • Veröffentlicht 27.06.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:35

The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An atta...