CVE-2021-26296
- EPSS 0.32%
- Veröffentlicht 19.02.2021 09:15:13
- Zuletzt bearbeitet 21.11.2024 05:56:02
In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, i...
CVE-2011-4343
- EPSS 0.86%
- Veröffentlicht 08.08.2017 21:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Information disclosure vulnerability in Apache MyFaces Core 2.0.1 through 2.0.10 and 2.1.0 through 2.1.4 allows remote attackers to inject EL expressions via crafted parameters.
- EPSS 86.32%
- Veröffentlicht 19.06.2014 14:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) ln parameter to faces/javax....
- EPSS 0.8%
- Veröffentlicht 20.10.2010 18:00:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
shared/util/StateUtils.java in Apache MyFaces 1.1.x before 1.1.8, 1.2.x before 1.2.9, and 2.0.x before 2.0.1 uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful mo...
- EPSS 1.3%
- Veröffentlicht 27.05.2010 19:00:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary E...