However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. ![]() Users should upgrade to 0.13.3 which addresses this issue or use a later version of Java to avoid it.Īn improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability in Sling App CMS version 1.1.0 and prior may allow an authenticated remote attacker to perform a reflected cross site scripting (XSS) attack in the taxonomy management feature.Īpache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. In Apache Airflow versions prior to 2.4.2, the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument.Īpache IoTDB version 0.12.2 to 0.12.6, 0.13.0 to 0.13.2 are vulnerable to a Denial of Service attack when accepting untrusted patterns for REGEXP queries with Java 8. In Apache Airflow versions prior to 2.4.2, there was an open redirect in the webserver's `/confirm` endpoint.
0 Comments
Leave a Reply. |