Show filters
175 Total Results
Displaying 61-70 of 175
Sort by:
Attacker Value
Unknown
CVE-2020-11998
Disclosure Date: September 10, 2020 (last updated November 08, 2023)
A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html "A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code." Mitigation: Upgrade to Apache ActiveMQ 5.15.13
0
Attacker Value
Unknown
CVE-2020-13920
Disclosure Date: September 10, 2020 (last updated February 22, 2025)
Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.
0
Attacker Value
Unknown
CVE-2020-24616
Disclosure Date: August 25, 2020 (last updated February 22, 2025)
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
0
Attacker Value
Unknown
CVE-2020-8622
Disclosure Date: August 21, 2020 (last updated February 22, 2025)
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
0
Attacker Value
Unknown
CVE-2020-11994
Disclosure Date: July 08, 2020 (last updated February 21, 2025)
Server-Side Template Injection and arbitrary file disclosure on Camel templating components
0
Attacker Value
Unknown
CVE-2020-14195
Disclosure Date: June 16, 2020 (last updated February 21, 2025)
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
0
Attacker Value
Unknown
CVE-2020-14060
Disclosure Date: June 14, 2020 (last updated February 21, 2025)
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).
0
Attacker Value
Unknown
CVE-2020-14061
Disclosure Date: June 14, 2020 (last updated February 21, 2025)
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).
0
Attacker Value
Unknown
CVE-2020-14062
Disclosure Date: June 14, 2020 (last updated February 21, 2025)
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
0
Attacker Value
Unknown
CVE-2020-12723
Disclosure Date: June 05, 2020 (last updated February 21, 2025)
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
0