In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
Max CVSS
6.1
EPSS Score
0.07%
Published
2017-07-12
Updated
2017-07-26
Apache OpenMeetings 1.0.0 is vulnerable to Cross-Site Request Forgery (CSRF) attacks, XSS attacks, click-jacking, and MIME based attacks.
Max CVSS
8.8
EPSS Score
0.07%
Published
2017-07-17
Updated
2017-07-19
Both global and Room chat are vulnerable to XSS attack in Apache OpenMeetings 3.2.0.
Max CVSS
6.1
EPSS Score
0.07%
Published
2017-07-17
Updated
2017-07-19
In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.
Max CVSS
9.8
EPSS Score
0.10%
Published
2017-07-19
Updated
2017-07-25
In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vulnerabilities.
Max CVSS
6.1
EPSS Score
0.07%
Published
2017-07-19
Updated
2020-07-01
5 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!