- EPSS 0.8%
- Veröffentlicht 01.03.2021 12:15:14
- Zuletzt bearbeitet 21.11.2024 05:54:45
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnera...
CVE-2021-25122
- EPSS 2.56%
- Veröffentlicht 01.03.2021 12:15:13
- Zuletzt bearbeitet 21.11.2024 05:54:23
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and use...
- EPSS 0.98%
- Veröffentlicht 23.02.2021 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:49:31
Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause th...
CVE-2021-23841
- EPSS 0.67%
- Veröffentlicht 16.02.2021 17:15:13
- Zuletzt bearbeitet 21.11.2024 05:51:55
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while...
CVE-2020-17530
- EPSS 94.36%
- Veröffentlicht 11.12.2020 02:15:10
- Zuletzt bearbeitet 03.04.2025 16:07:29
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
CVE-2020-17527
- EPSS 11.07%
- Veröffentlicht 03.12.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 05:08:17
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request asso...
CVE-2020-26237
- EPSS 0.5%
- Veröffentlicht 24.11.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 05:19:37
Highlight.js is a syntax highlighter written in JavaScript. Highlight.js versions before 9.18.2 and 10.1.2 are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's ...
CVE-2020-5421
- EPSS 63.83%
- Veröffentlicht 19.09.2020 04:15:11
- Zuletzt bearbeitet 21.11.2024 05:34:08
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jses...
CVE-2019-0233
- EPSS 7.78%
- Veröffentlicht 14.09.2020 17:15:09
- Zuletzt bearbeitet 21.11.2024 04:16:33
An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.
CVE-2019-0230
- EPSS 93.84%
- Veröffentlicht 14.09.2020 17:15:09
- Zuletzt bearbeitet 21.11.2024 04:16:32
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.