The Javascript method Sling.evalString() in Apache Sling Servlets Post before 2.3.22 uses the javascript 'eval' function to parse input strings, which allows for XSS attacks by passing specially crafted input strings.
Max CVSS
6.1
EPSS Score
0.24%
Published
2017-08-14
Updated
2018-10-09
In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
Max CVSS
6.1
EPSS Score
0.07%
Published
2017-07-12
Updated
2017-07-26
Apache OpenMeetings 1.0.0 is vulnerable to Cross-Site Request Forgery (CSRF) attacks, XSS attacks, click-jacking, and MIME based attacks.
Max CVSS
8.8
EPSS Score
0.07%
Published
2017-07-17
Updated
2017-07-19
In Apache NiFi before 0.7.4 and 1.x before 1.3.0, there are certain user input components in the UI which had been guarding for some forms of XSS issues but were insufficient.
Max CVSS
6.1
EPSS Score
0.07%
Published
2017-06-12
Updated
2017-06-19
Both global and Room chat are vulnerable to XSS attack in Apache OpenMeetings 3.2.0.
Max CVSS
6.1
EPSS Score
0.07%
Published
2017-07-17
Updated
2017-07-19
The HDFS web UI in Apache Hadoop before 2.7.0 is vulnerable to a cross-site scripting (XSS) attack through an unescaped query parameter.
Max CVSS
6.1
EPSS Score
0.20%
Published
2017-04-26
Updated
2021-07-03
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to cross frame scripting.
Max CVSS
6.1
EPSS Score
0.21%
Published
2017-08-29
Updated
2017-09-06
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Reflected XSS in the search functionality.
Max CVSS
6.1
EPSS Score
0.20%
Published
2017-08-29
Updated
2017-09-03
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to DOM XSS in the edit-tag functionality.
Max CVSS
6.1
EPSS Score
0.20%
Published
2017-08-29
Updated
2017-09-03
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Stored Cross-Site Scripting in the edit-tag functionality.
Max CVSS
6.1
EPSS Score
0.07%
Published
2017-08-29
Updated
2019-12-11
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating use cookies that could be accessible to client-side script.
Max CVSS
6.1
EPSS Score
0.07%
Published
2017-08-29
Updated
2017-09-01

CVE-2016-6816

Public exploit
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
Max CVSS
7.1
EPSS Score
0.26%
Published
2017-03-20
Updated
2023-12-08
The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client.
Max CVSS
6.1
EPSS Score
0.16%
Published
2017-08-10
Updated
2021-06-16
The default configuration of the Apache OFBiz framework offers a blog functionality. Different users are able to operate blogs which are related to specific parties. In the form field for the creation of new blog articles the user input of the summary field as well as the article field is not properly sanitized. It is possible to inject arbitrary JavaScript code in these form fields. This code gets executed from the browser of every user who is visiting this article. Mitigation: Upgrade to Apache OFBiz 16.11.01.
Max CVSS
6.1
EPSS Score
0.11%
Published
2017-08-30
Updated
2019-10-16
In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.
Max CVSS
9.8
EPSS Score
0.10%
Published
2017-07-19
Updated
2017-07-25
In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vulnerabilities.
Max CVSS
6.1
EPSS Score
0.07%
Published
2017-07-19
Updated
2020-07-01
Cross-site scripting (XSS) vulnerability in Apache Struts before 2.3.20.
Max CVSS
6.1
EPSS Score
0.48%
Published
2017-09-25
Updated
2018-11-23
Cross-site scripting (XSS) vulnerability in Apache Wicket 1.4.x before 1.4.22, 1.5.x before 1.5.10, and 6.x before 6.4.0 might allow remote attackers to inject arbitrary web script or HTML via vectors related to <script> tags in a rendered response.
Max CVSS
6.1
EPSS Score
0.66%
Published
2017-10-30
Updated
2017-11-18
Cross-site scripting (XSS) vulnerability in Apache jUDDI before 2.0 allows remote attackers to inject arbitrary web script or HTML via the dsname parameter to happyjuddi.jsp.
Max CVSS
6.1
EPSS Score
0.14%
Published
2017-10-30
Updated
2017-11-17
19 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!