Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown

CVE-2024-38379

Disclosure Date: June 22, 2024 (last updated September 20, 2024)
Apache Allura's neighborhood settings are vulnerable to a stored XSS attack.  Only neighborhood admins can access these settings, so the scope of risk is limited to configurations where neighborhood admins are not fully trusted. This issue affects Apache Allura: from 1.4.0 through 1.17.0. Users are recommended to upgrade to version 1.17.1, which fixes the issue.
Attacker Value
Unknown

CVE-2024-36471

Disclosure Date: June 10, 2024 (last updated June 11, 2024)
Import functionality is vulnerable to DNS rebinding attacks between verification and processing of the URL.  Project administrators can run these imports, which could cause Allura to read from internal services and expose them. This issue affects Apache Allura from 1.0.1 through 1.16.0. Users are recommended to upgrade to version 1.17.0, which fixes the issue. If you are unable to upgrade, set "disable_entry_points.allura.importers = forge-tracker, forge-discussion" in your .ini config file.
0
Attacker Value
Unknown

CVE-2023-46851

Disclosure Date: November 07, 2023 (last updated November 16, 2023)
Allura Discussion and Allura Forum importing does not restrict URL values specified in attachments. Project administrators can run these imports, which could cause Allura to read local files and expose them.  Exposing internal files then can lead to other exploits, like session hijacking, or remote code execution. This issue affects Apache Allura from 1.0.1 through 1.15.0. Users are recommended to upgrade to version 1.16.0, which fixes the issue.  If you are unable to upgrade, set "disable_entry_points.allura.importers = forge-tracker, forge-discussion" in your .ini config file.
Attacker Value
Unknown

CVE-2022-1561

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
Lura and KrakenD-CE versions older than v2.0.2 and KrakenD-EE versions older than v2.0.0 do not sanitize URL parameters correctly, allowing a malicious user to alter the backend URL defined for a pipe when remote users send crafty URL requests. The vulnerability does not affect KrakenD itself, but the consumed backend might be vulnerable.
Attacker Value
Unknown

CVE-2015-7810

Disclosure Date: November 22, 2019 (last updated November 27, 2024)
libbluray MountManager class has a time-of-check time-of-use (TOCTOU) race when expanding JAR files
Attacker Value
Unknown

CVE-2019-10085

Disclosure Date: June 19, 2019 (last updated November 08, 2023)
In Apache Allura prior to 1.11.0, a vulnerability exists for stored XSS on the user dropdown selector when creating or editing tickets. The XSS executes when a user engages with that dropdown on that page.
0
Attacker Value
Unknown

CVE-2018-1319

Disclosure Date: March 15, 2018 (last updated November 08, 2023)
In Apache Allura prior to 1.8.1, attackers may craft URLs that cause HTTP response splitting. If a victim goes to a maliciously crafted URL, unwanted results may occur including XSS or service denial for the victim's browsing session.
0
Attacker Value
Unknown

CVE-2018-1299

Disclosure Date: February 06, 2018 (last updated November 08, 2023)
In Apache Allura before 1.8.0, unauthenticated attackers may retrieve arbitrary files through the Allura web application. Some webservers used with Allura, such as Nginx, Apache/mod_wsgi or paster may prevent the attack from succeeding. Others, such as gunicorn do not prevent it and leave Allura vulnerable.
0
Attacker Value
Unknown

CVE-2012-0978

Disclosure Date: February 02, 2012 (last updated October 04, 2023)
Stack-based buffer overflow in npjp2.dll in LuraWave JP2 Browser Plug-In 1.1.1.11 and other versions before 2.1.1.11 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment.
0
Attacker Value
Unknown

CVE-2012-0977

Disclosure Date: February 02, 2012 (last updated October 04, 2023)
Stack-based buffer overflow in jp2_x.dll in LuraWave JP2 ActiveX Control 2.1.5.5 and other versions before 2.1.5.11 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment.
0