Max CVSS | 7.5 | Min CVSS | 4.7 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-8088 | 7.5 |
org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.
|
27-12-2023 - 15:15 | 20-03-2018 - 16:29 | |
CVE-2018-1320 | 5.0 |
Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed co
|
16-08-2023 - 14:17 | 07-01-2019 - 17:29 | |
CVE-2018-1258 | 6.5 |
Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted
|
11-04-2022 - 17:18 | 11-05-2018 - 20:29 | |
CVE-2018-10899 | 6.8 |
A flaw was found in Jolokia versions from 1.2 to before 1.6.1. Affected versions are vulnerable to a system-wide CSRF. This holds true for properly configured instances with strict checking for origin and referrer headers. This could result in a Remo
|
04-08-2021 - 17:14 | 01-08-2019 - 14:15 | |
CVE-2019-0192 | 7.5 |
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trig
|
09-12-2020 - 11:15 | 07-03-2019 - 21:29 | |
CVE-2019-3805 | 4.7 |
A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss
|
16-10-2020 - 16:04 | 03-05-2019 - 20:29 | |
CVE-2018-15758 | 6.8 |
Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or a
|
03-10-2019 - 00:03 | 18-10-2018 - 22:29 | |
CVE-2016-10750 | 6.8 |
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, t
|
08-08-2019 - 13:15 | 22-05-2019 - 14:29 |