Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
commons vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-2098
Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress prior to 1.4.1 allows remote malicious users to cause a denial of service (CPU consumption) via a file with many repeating inputs.
Apache Commons Compress
2 Github repositories
7.5
CVSSv3
CVE-2018-1294
If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should up...
Apache Commons Email
NA
CVE-2012-6153
http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient prior to 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle maliciou...
Apache Commons-httpclient
9.8
CVSSv3
CVE-2017-12621
During Jelly (xml) file parsing with Apache Xerces, if a custom doctype entity is declared with a "SYSTEM" entity with a URL and that entity is used in the body of the Jelly file, during parser instantiation the parser will attempt to connect to said URL. This could lea...
Apache Commons Jelly
2 Github repositories
NA
CVE-2013-1908
The Commons Wikis module prior to 7.x-3.1 for Drupal, as used in the Commons module prior to 7.x-3.1, does not properly restrict access to groups, which allows remote malicious users to post arbitrary content to groups via unspecified vectors.
Commons Wikis Project Commons Wikis
Acquia Commons 7.x-3.x
Commons Wikis Project Commons Wikis 7.x-3.x
Acquia Commons
10
CVSSv3
CVE-2020-1953
Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this libr...
Apache Commons Configuration 2.3
Apache Commons Configuration 2.4
Apache Commons Configuration 2.5
Apache Commons Configuration 2.6
Apache Commons Configuration 2.2
Oracle Database Server 12.1.0.2
Oracle Database Server 11.2.0.4
Oracle Database Server 12.2.0.1
Oracle Database Server 18c
Oracle Database Server 19c
Oracle Healthcare Foundation 7.2.0
Oracle Healthcare Foundation 7.2.1
Oracle Healthcare Foundation 7.3.0
Oracle Healthcare Foundation 7.1.1
6.1
CVSSv3
CVE-2022-28820
ACS Commons version 5.1.x (and previous versions) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in /apps/acs-commons/content/page-compare.html endpoint via the a and b GET parameters. User input submitted via these parameters is not validated or sanitised. An ...
Adobe Acs Aem Commons
8.1
CVSSv3
CVE-2022-46664
A vulnerability has been identified in Mendix Workflow Commons (All versions < V2.4.0), Mendix Workflow Commons V2.1 (All versions < V2.1.4), Mendix Workflow Commons V2.3 (All versions < V2.3.2). Affected versions of the module improperly handle access control for some m...
Siemens Mendix Workflow Commons
7.5
CVSSv3
CVE-2018-17201
Certain input files could make the code hang when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.
Apache Commons Imaging 0.97
7.5
CVSSv3
CVE-2018-17202
Certain input files could make the code to enter into an infinite loop when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.
Apache Commons Imaging 0.97
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »