Searching CVE for "apache"
Apache ActiveMQ has an integer overflow vulnerability in MQTT packet handling that allows malformed packets to cause unexpected broker behavior. This affects ActiveMQ versions before 5.19.2, 6.0.0 to ...
This vulnerability allows authenticated users to upload .htaccess or .user.ini files to FreeScout help desk systems, enabling remote code execution on Apache servers with AllowOverride All configurati...
Authenticated users in Apache Superset can exploit a disabled-by-default tagging feature to retrieve sensitive user data including password hashes and email addresses. This affects all Apache Superset...
This SQL injection vulnerability in Apache Superset allows authenticated users with read access to execute arbitrary SQL commands through the sqlExpression or where parameters. The vulnerability enabl...
This vulnerability allows DAG authors with existing permissions to manipulate Airflow's database to execute arbitrary code in the web-server context when users view historical task information. This l...
The CVE-2026-23552 vulnerability allows attackers to bypass tenant isolation in Apache Camel Keycloak component by using JWT tokens from unauthorized Keycloak realms. This affects Apache Camel users r...
This vulnerability in Apache Airflow allows authenticated users with DAG view permissions to potentially see sensitive information like secrets when a DAG fails during parsing. The error-reporting UI ...
This vulnerability allows unauthorized authentication in Strimzi Kafka clusters when using custom CA certificates with multi-stage chains. Attackers with certificates signed by any CA in the chain can...
This vulnerability in Strimzi allows Kafka Connect or Kafka MirrorMaker 2 operands to incorrectly trust all certificates in a CA chain when connecting to Kafka brokers, rather than only trusting the f...
This vulnerability in Apache Tomcat Native and Apache Tomcat allows attackers to bypass certificate revocation checks when using OCSP responders. Improper input validation means OCSP responses aren't ...
This vulnerability allows attackers to bypass client certificate authentication in Apache Tomcat when multiple virtual hosts are configured with different TLS authentication requirements. By sending m...
A Use After Free vulnerability in Apache Arrow C++ allows memory corruption when reading Arrow IPC files with pre-buffering enabled. This affects C++ applications using Arrow versions 15.0.0 through 2...
This vulnerability allows remote code execution when Apache Avro Java SDK processes untrusted Avro schemas. Attackers can inject malicious code that gets executed during specific record generation. Al...
This vulnerability in the Galaxy FDS Android SDK disables TLS hostname verification, allowing man-in-the-middle attackers to intercept and modify communications between Android apps and Xiaomi's cloud...
CVE-2026-25999 is an improper access control vulnerability in Klaw (Apache Kafka management portal) that allows unauthorized users to reset or delete metadata for any tenant by sending crafted request...
This CVE describes an observable timing discrepancy vulnerability in Apache Shiro authentication. Attackers can use timing differences to distinguish between non-existent users and incorrect passwords...
This authentication bypass vulnerability in Apache Druid allows attackers to gain unauthorized access by exploiting LDAP anonymous bind configurations. Organizations using Druid with basic security ex...
This XPath injection vulnerability in Apache HertzBeat allows attackers to manipulate XPath queries by injecting malicious data, potentially accessing or modifying sensitive information. It affects al...
This CVE describes an information disclosure vulnerability in Apache Airflow where authenticated users with access to specific DAGs can view import errors from other DAGs they shouldn't have access to...
Apache Airflow versions 3.1.0 through 3.1.6 contain an authorization flaw where authenticated users with custom permissions limited to task access can view task logs without proper authorization. This...
This CVE describes an authentication bypass vulnerability in Apache Shiro where attackers can access protected static files by changing the case of filenames in requests. It affects Apache Shiro versi...
An unauthenticated API endpoint in Apache Answer exposes full revision history for deleted content, allowing unauthorized users to retrieve sensitive information. This affects all Apache Answer instal...
This reflected XSS vulnerability in Apache Syncope's Enduser Login page allows attackers to steal user credentials by tricking legitimate users into clicking malicious links. It affects Apache Syncope...
This CVE describes an XXE vulnerability in Apache Syncope Console that allows administrators with Keymaster parameter privileges to inject malicious XML. Successful exploitation could lead to sensitiv...
This CVE describes a code injection vulnerability in the quick-media library's SVG plugin when processing PNG files. Attackers can execute arbitrary code by crafting malicious PNG images. This affects...
This vulnerability allows attackers to bypass cryptographic signature verification in the quick-media library's SVG processing module. Attackers could potentially inject malicious content into process...
An integer overflow vulnerability in the Apache Commons Compress TarUtils module used by AppManager allows attackers to cause denial of service or potentially execute arbitrary code by crafting malici...
Apache Karaf Decanter's log socket collector has a deserialization vulnerability on port 4560 without authentication. Attackers can bypass allowed classes configuration to send malicious data, potenti...
This CVE describes an out-of-bounds write vulnerability in Apache Hadoop HDFS native client that could allow attackers to execute arbitrary code or cause denial of service. It affects Hadoop installat...
Apache Solr deployments using RuleBasedAuthorizationPlugin with specific configurations are vulnerable to unauthorized API access. Attackers can bypass authorization controls to read sensitive configu...
This vulnerability in Apache Solr allows attackers to bypass path restrictions and read unauthorized files from the filesystem when creating new cores. On Windows systems, this can lead to NTLM hash d...
The Kafka Connect BigQuery Connector prior to version 2.11.0 has an arbitrary file read vulnerability in credential configuration processing. Attackers can exploit this by providing malicious credenti...
This vulnerability in Apache Airflow exposes sensitive values like passwords and API keys in cleartext in the Rendered Templates UI when template fields exceed maximum length. It affects Airflow users...
Apache Airflow versions before 3.1.6 expose proxy credentials in logs when connections contain proxy URLs with embedded authentication. This allows attackers with log access to steal credentials. All ...
This CVE describes a remote command injection vulnerability in Apache bRPC's heap profiler service. Attackers can execute arbitrary commands by injecting malicious parameters into the /pprof/heap endp...
CVE-2026-22265 is a command injection vulnerability in Roxy-WI web interface versions prior to 8.2.8.2 that allows authenticated users to execute arbitrary system commands through the log viewing func...
This CVE describes a Cypher Injection vulnerability in Apache Camel's camel-neo4j component, allowing attackers to execute arbitrary Cypher queries against Neo4j databases. Affected users are those ru...
This CVE describes a Missing XML Validation vulnerability in Apache Struts that allows attackers to inject malicious XML content. It affects Apache Struts versions from 2.0.0 through 6.1.0, potentiall...
This vulnerability in Apache NimBLE allows an attacker to downgrade encrypted Bluetooth Low Energy connections to unencrypted state after a Pause Encryption procedure, enabling eavesdropping on subseq...
An out-of-bounds read vulnerability in Apache NimBLE's HCI H4 driver allows a malicious or malfunctioning Bluetooth controller to trigger invalid memory reads. This affects all Apache NimBLE versions ...
A NULL pointer dereference vulnerability in Apache NimBLE's Bluetooth stack occurs when HCI connection completion or command transmission buffers lack proper validation. This could cause crashes or in...
This vulnerability allows attackers to bypass authentication in Apache NimBLE by sending specially crafted Security Request packets. An attacker can remove existing secure bonds and force re-bonding w...
This vulnerability allows clients accessing Apache Kyuubi Server to bypass the server-side configuration that restricts which local directories can be accessed. Attackers can read arbitrary local file...
This vulnerability allows remote code execution on Apache NiFi systems through unsafe Java deserialization in the GetAsanaObject Processor. Attackers can exploit it by injecting malicious objects into...
This vulnerability in Apache Log4j Core allows man-in-the-middle attackers to intercept or redirect encrypted log traffic when TLS hostname verification fails, even when configured to verify. It affec...
Open OnDemand versions 4.0.8 and earlier have a vulnerability where the Apache proxy passes sensitive headers to origin servers. This allows malicious users to set up servers on compute nodes that can...
This vulnerability allows authenticated DAG authors in Apache Airflow 2 to perform remote code execution in the webserver context via an improperly exposed Edge3 provider API. Only systems running Air...
This vulnerability in Apache Airflow allows authenticated users with UI access to view secret values in rendered templates due to improper redaction. This exposes sensitive secrets like passwords, API...
Apache StreamPark versions 2.0.0 through 2.1.6 use user passwords as JWT signing keys, allowing attackers who capture tokens to brute-force passwords offline or forge tokens if passwords are known. Th...
Apache StreamPark versions 2.0.0 through 2.1.6 use a hard-coded encryption key, allowing attackers to decrypt sensitive data or forge encrypted information through reverse engineering. This affects al...
This vulnerability in Apache StreamPark uses weak encryption (AES-ECB mode) and a weak random number generator for encrypting sensitive data like JWT tokens. Attackers could potentially decrypt authen...
This CVE describes a remote code execution vulnerability in Apache HugeGraph's PD store where a malicious Raft node can exploit insecure Hessian deserialization. Attackers can execute arbitrary code o...
CVE-2025-58130 is an insufficiently protected credentials vulnerability in Apache Fineract that could allow attackers to access sensitive authentication data. This affects all Apache Fineract installa...
This CVE describes an authorization bypass vulnerability in Apache Fineract where attackers can manipulate user-controlled keys to access unauthorized resources. It affects all Apache Fineract install...
Apache Fineract versions through 1.10.1 have weak password requirements that allow attackers to set or maintain easily guessable passwords. This affects all organizations using vulnerable Fineract ins...
This CVE describes a Denial of Service vulnerability in Apache Struts where specially crafted multipart requests can cause file leaks leading to disk exhaustion. Attackers can exploit this to fill up ...
This vulnerability in Strimzi Kafka Operator versions 0.47.0 through 0.49.0 creates an overly permissive Kubernetes Role that grants Kafka Connect and Kafka MirrorMaker 2 pods GET access to all Secret...
This vulnerability in Apache HTTP Server allows remote code execution when Server Side Includes (SSI) is enabled with mod_cgid. Attackers can inject shell commands through improperly escaped query str...
This SSRF vulnerability in Apache HTTP Server on Windows allows attackers to force the server to make requests to malicious servers, potentially leaking NTLM authentication hashes. It affects Windows ...
This vulnerability allows attackers to manipulate CGI program behavior by injecting malicious environment variables through Apache configuration. It affects Apache HTTP Server versions 2.4.0 through 2...
This vulnerability allows users with htaccess file access to bypass mod_userdir+suexec restrictions via the RequestHeader directive, potentially causing CGI scripts to execute under unintended user ID...
An integer overflow in Apache HTTP Server's ACME certificate renewal process causes the backoff timer to reset to zero after approximately 30 days of consecutive renewal failures. This leads to immedi...
This critical XXE vulnerability in Apache Tika allows attackers to perform XML External Entity injection via crafted XFA files within PDF documents. It affects all platforms running vulnerable version...
The SureMail WordPress plugin allows unauthenticated attackers to upload malicious PHP files through public forms that email attachments, leading to remote code execution. This affects WordPress sites...
This vulnerability in Apache Struts allows attackers to cause a denial of service through disk exhaustion by exploiting a file leak in multipart request processing. It affects all Apache Struts instal...
The CVE-2025-59792 vulnerability in Apache Kvrocks allows attackers to obtain plaintext credentials through the MONITOR command. This affects all Apache Kvrocks deployments running versions 1.0.0 thro...
CVE-2025-59790 is an improper privilege management vulnerability in Apache Kvrocks that could allow authenticated users to escalate privileges beyond their intended permissions. This affects Apache Kv...
This CVE describes a cross-site scripting (XSS) vulnerability in Apache SkyWalking where malicious script tags can be injected into web pages. It affects all Apache SkyWalking installations running ve...
Apache CloudStack contains a code injection vulnerability in six administrative APIs that allows authenticated administrators to execute arbitrary JavaScript code. This affects CloudStack versions 4.1...
This CVE describes an information disclosure vulnerability in Apache CloudStack where authorized users could occasionally access data beyond their intended permissions through specific APIs. The vulne...
Apache Druid's Kerberos authenticator uses a weak random fallback secret when cookieSignatureSecret isn't explicitly configured, allowing attackers to potentially forge authentication cookies and bypa...
This SQL injection vulnerability in Apache Hive Metastore Server allows authorized users to execute arbitrary SQL commands when calling Thrift APIs to delete column statistics. It affects Hive version...
Apache Syncope versions before 3.0.15 and 4.0.3 use a hard-coded AES encryption key for password storage when configured to encrypt passwords in the database. This allows attackers who gain database a...
Apache OpenOffice versions through 4.1.15 have an authorization vulnerability where specially crafted documents can automatically load external links without user permission. This allows attackers to ...
This vulnerability allows attackers to upload malicious files to Apache OFBiz servers, potentially leading to remote code execution or server compromise. It affects all Apache OFBiz installations befo...
This CVE describes a reflected cross-site scripting (XSS) vulnerability in Apache OFBiz that allows attackers to inject malicious scripts into web pages. The vulnerability affects users of Apache OFBi...
Apache OpenOffice versions through 4.1.15 have a missing authorization vulnerability where documents containing OLE objects with external links can automatically load those external files without user...
Apache OpenOffice Calc has a missing authorization vulnerability that allows attackers to craft documents with external data source links that load without user prompts. This affects all Apache OpenOf...
Apache OpenOffice versions through 4.1.15 have a missing authorization vulnerability that allows attackers to craft documents that automatically load external files without user permission. This occur...
Apache OpenOffice versions through 4.1.15 have a missing authorization vulnerability where specially crafted Calc spreadsheets containing DDE links can automatically load external files without user c...
An out-of-bounds write vulnerability in Apache OpenOffice allows attackers to craft malicious documents that could crash the program or corrupt memory. This affects all users running Apache OpenOffice...
Apache OpenOffice versions through 4.1.15 contain a missing authorization vulnerability where documents with floating frames linked to external files can load those external resources without user con...
This vulnerability in Apache APISIX exposes basic authentication credentials (usernames and passwords) in plaintext within error logs when log levels are set to INFO or DEBUG. Any system using APISIX ...
Nagios Log Server versions before 2024R1.0.2 contain a local privilege escalation vulnerability. An attacker who can execute commands as the Apache web user or backend shell user can escalate privileg...
Nagios XI versions before 5.8.7 use insecure permissions on a temporary directory for Highcharts exports, allowing local or co-hosted processes to read, modify, or delete exported files. This vulnerab...
This CVE describes an OS command injection vulnerability in Apache Airflow's example_dag_decorator where unvalidated parameters could allow UI users to redirect to malicious servers and execute code o...
This vulnerability allows authenticated API users to execute arbitrary Dag code in the context of the api-server when deployed in environments where Dag files are accessible. It affects Apache Airflow...
This vulnerability allows authenticated users with CREATE privilege but no UPDATE privilege for Pools, Connections, and Variables to modify existing records through the bulk create API with overwrite ...
A path traversal vulnerability in Apache Tomcat allows attackers to bypass security constraints protecting sensitive directories like /WEB-INF/ and /META-INF/. This affects Tomcat versions 9.0.0.M11 t...
Apache Tomcat fails to escape ANSI escape sequences in log messages, allowing attackers to inject malicious sequences when Tomcat runs in a console supporting ANSI escape sequences (primarily Windows)...
Apache Geode's Management and Monitoring REST API is vulnerable to Cross-Site Request Forgery (CSRF) attacks via GET requests. An attacker who obtains a user's Geode session credentials can execute ma...
This CVE describes an Inefficient Regular Expression Complexity (ReDoS) vulnerability in Apache Traffic Control's Traffic Router management interface. Attackers with access to this interface can craft...
A deserialization vulnerability in Apache ActiveMQ NMS AMQP Client allows malicious AMQP servers to execute arbitrary code on client systems when connecting to untrusted servers. This affects all vers...
Apache Spark versions before 3.4.4, 3.5.2, and 4.0.0 use an insecure default cipher (AES/CTR/NoPadding) for RPC encryption when spark.network.crypto.enabled is true, allowing man-in-the-middle attacke...
ZTE's ZXCDN product has a critical Apache Struts vulnerability allowing unauthenticated remote code execution. Attackers can execute arbitrary commands with non-root privileges on affected systems. Th...
Apache Flink CDC 3.4.0 contains a SQL injection vulnerability that allows authenticated database users to execute arbitrary SQL commands by crafting malicious database or table names. This affects org...
This vulnerability in Apache Kylin allows unauthorized external parties to access sensitive files or directories if administrative access controls are insufficient. It affects Apache Kylin versions 4....
This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin that allows attackers to make unauthorized requests from the server to internal or external systems. It affects Ap...
This CVE describes an authentication bypass vulnerability in Apache Kylin that allows attackers to access protected functionality without proper credentials. It affects all Apache Kylin deployments ru...
This vulnerability allows remote attackers to execute arbitrary code on Knowage servers by exploiting unsafe JXPathContext usage in MetaService.java. It affects all Knowage deployments running version...