Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-3529

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-04 Sep, 2014 | 17:00
Updated At-06 Aug, 2024 | 10:50
Rejected At-
Credits

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:04 Sep, 2014 | 17:00
Updated At:06 Aug, 2024 | 10:50
Rejected At:
â–¼CVE Numbering Authority (CNA)

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-01.ibm.com/support/docview.wss?uid=swg21996759
x_refsource_CONFIRM
http://poi.apache.org/changes.html
x_refsource_CONFIRM
http://www.securityfocus.com/bid/78018
vdb-entry
x_refsource_BID
http://secunia.com/advisories/61766
third-party-advisory
x_refsource_SECUNIA
https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations
x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/95770
vdb-entry
x_refsource_XF
http://rhn.redhat.com/errata/RHSA-2014-1370.html
vendor-advisory
x_refsource_REDHAT
http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
x_refsource_CONFIRM
http://secunia.com/advisories/60419
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2014-1400.html
vendor-advisory
x_refsource_REDHAT
http://www.securityfocus.com/bid/69647
vdb-entry
x_refsource_BID
http://rhn.redhat.com/errata/RHSA-2014-1398.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/59943
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2014-1399.html
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21996759
Resource:
x_refsource_CONFIRM
Hyperlink: http://poi.apache.org/changes.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/78018
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/61766
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations
Resource:
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/95770
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1370.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60419
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1400.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.securityfocus.com/bid/69647
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1398.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/59943
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1399.html
Resource:
vendor-advisory
x_refsource_REDHAT
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-01.ibm.com/support/docview.wss?uid=swg21996759
x_refsource_CONFIRM
x_transferred
http://poi.apache.org/changes.html
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/78018
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/61766
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations
x_refsource_CONFIRM
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/95770
vdb-entry
x_refsource_XF
x_transferred
http://rhn.redhat.com/errata/RHSA-2014-1370.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60419
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2014-1400.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.securityfocus.com/bid/69647
vdb-entry
x_refsource_BID
x_transferred
http://rhn.redhat.com/errata/RHSA-2014-1398.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/59943
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2014-1399.html
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21996759
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://poi.apache.org/changes.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/78018
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/61766
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/95770
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1370.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60419
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1400.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.securityfocus.com/bid/69647
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1398.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/59943
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1399.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:04 Sep, 2014 | 17:55
Updated At:12 Apr, 2025 | 10:46

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

The Apache Software Foundation
apache
>>poi>>Versions up to 3.10(inclusive)
cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.1
cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.2
cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.3
cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.4
cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.5
cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.6
cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.7
cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.10.0
cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.11.0
cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.12.0
cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.13.0
cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>0.14.0
cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.0.0
cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.0.1
cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.0.2
cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.1.0
cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.2.0
cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.5
cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.5.1
cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.7
cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.8
cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>1.10
cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>2.0
cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>2.0
cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>2.0
cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>2.0
cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>2.0
cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>2.0
cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>2.5
cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>2.5.1
cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.0
cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.0
cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.0
cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.0
cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.0.1
cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.0.2
cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.0.2
cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.0.2
cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.1
cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.1
cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.1
cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.2
cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.5
cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.5
cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.5
cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.5
cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.5
cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.5
cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*
The Apache Software Foundation
apache
>>poi>>3.5
cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

CWE-611: Improper Restriction of XML External Entity Reference ('XXE')
Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://poi.apache.org/changes.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2014-1370.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2014-1398.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2014-1399.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2014-1400.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/59943secalert@redhat.com
N/A
http://secunia.com/advisories/60419secalert@redhat.com
N/A
http://secunia.com/advisories/61766secalert@redhat.com
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21996759secalert@redhat.com
N/A
http://www.apache.org/dist/poi/release/RELEASE-NOTES.txtsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/69647secalert@redhat.com
N/A
http://www.securityfocus.com/bid/78018secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/95770secalert@redhat.com
N/A
https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installationssecalert@redhat.com
Vendor Advisory
http://poi.apache.org/changes.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2014-1370.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2014-1398.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2014-1399.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2014-1400.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59943af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60419af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61766af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21996759af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.apache.org/dist/poi/release/RELEASE-NOTES.txtaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/69647af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/78018af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/95770af854a3a-2127-422b-91ae-364da2661108
N/A
https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installationsaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: http://poi.apache.org/changes.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1370.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1398.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1399.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1400.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/59943
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60419
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/61766
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21996759
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/69647
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/78018
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/95770
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://poi.apache.org/changes.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1370.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1398.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1399.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-1400.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59943
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60419
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61766
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21996759
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/69647
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/78018
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/95770
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

64Records found

CVE-2014-0035
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.96% / 76.23%
||
7 Day CHG~0.00%
Published-07 Jul, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SymmetricBinding in Apache CXF before 2.6.13 and 2.7.x before 2.7.10, when EncryptBeforeSigning is enabled and the UsernameToken policy is set to an EncryptedSupportingToken, transmits the UsernameToken in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.

Action-Not Available
Vendor-n/aThe Apache Software FoundationRed Hat, Inc.
Product-cxfjboss_enterprise_application_platformn/a
CVE-2014-0033
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-16.23% / 94.71%
||
7 Day CHG~0.00%
Published-26 Feb, 2014 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-tomcatn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-0096
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-5.79% / 90.39%
||
7 Day CHG~0.00%
Published-31 May, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-tomcatn/a
CVE-2014-0119
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-7.06% / 91.38%
||
7 Day CHG~0.00%
Published-31 May, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-tomcatn/a
CVE-2013-6397
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-93.01% / 99.78%
||
7 Day CHG~0.00%
Published-07 Dec, 2013 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-solrn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2013-4590
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.92% / 75.78%
||
7 Day CHG~0.00%
Published-26 Feb, 2014 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Action-Not Available
Vendor-n/aThe Apache Software FoundationDebian GNU/LinuxOracle Corporation
Product-debian_linuxtomcatsolarisn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2013-2137
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-3.81% / 87.93%
||
7 Day CHG~0.00%
Published-15 Aug, 2013 | 16:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the "View Log" screen in the Webtools application in Apache Open For Business Project (aka OFBiz) 10.04.01 through 10.04.05, 11.04.01 through 11.04.02, and 12.04.01 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-ofbizn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2015-4928
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.86% / 74.85%
||
7 Day CHG~0.00%
Published-08 Nov, 2015 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Ambari before 2.1, as used in IBM Infosphere BigInsights 4.x before 4.1, includes cleartext passwords on a Configs screen, which allows physically proximate attackers to obtain sensitive information by reading password fields.

Action-Not Available
Vendor-n/aThe Apache Software FoundationIBM Corporation
Product-ambariinfosphere_biginsightsn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-4551
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-8.71% / 92.36%
||
7 Day CHG-0.89%
Published-10 Nov, 2015 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 uses the stored LinkUpdateMode configuration information in OpenDocument Format files and templates when handling links, which might allow remote attackers to obtain sensitive information via a crafted document, which embeds data from local files into (1) Calc or (2) Writer.

Action-Not Available
Vendor-libreofficen/aThe Apache Software FoundationDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxubuntu_linuxlibreofficeopenofficen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-13946
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.47% / 64.37%
||
7 Day CHG~0.00%
Published-01 Sep, 2020 | 20:49
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Apache Cassandra, all versions prior to 2.1.22, 2.2.18, 3.0.22, 3.11.8 and 4.0-beta2, it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely.

Action-Not Available
Vendor-n/aNetApp, Inc.The Apache Software Foundation
Product-cassandraoncommand_insightApache Cassandra
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2020-13955
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.78% / 73.55%
||
7 Day CHG~0.00%
Published-09 Oct, 2020 | 12:33
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-calciteApache Calcite
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-13920
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.30% / 53.18%
||
7 Day CHG+0.15%
Published-10 Sep, 2020 | 00:00
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.

Action-Not Available
Vendor-n/aThe Apache Software FoundationDebian GNU/LinuxOracle Corporation
Product-communications_diameter_signaling_routerflexcube_private_bankingdebian_linuxactivemqApache ActiveMQ
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-17516
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.85% / 74.73%
||
7 Day CHG~0.00%
Published-03 Feb, 2021 | 16:40
Updated-04 Aug, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Cassandra versions 2.1.0 to 2.1.22, 2.2.0 to 2.2.19, 3.0.0 to 3.0.23, and 3.11.0 to 3.11.9, when using 'dc' or 'rack' internode_encryption setting, allows both encrypted and unencrypted internode connections. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the same rack or dc, and bypass mutual TLS requirement.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-cassandraApache Cassandra
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2019-10099
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.54% / 67.43%
||
7 Day CHG~0.00%
Published-07 Aug, 2019 | 16:18
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs.

Action-Not Available
Vendor-The Apache Software Foundation
Product-sparkApache Spark
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
  • Previous
  • 1
  • 2
  • Next
Details not found