NVD List

Id Name Description Reject CVSS Version CVSS Score Severity Pub Date Modified Date Actions
88084  CVE-2017-7663  Both global and Room chat are vulnerable to XSS attack in Apache OpenMeetings 3.2.0.          2017-07-18  2017-07-17  View
86043  CVE-2017-7662  Apache CXF Fediz ships with an OpenId Connect (OIDC) service which has a Client Registration Service, which is a simple web application that allows clients to be created, deleted, etc. A CSRF (Cross Style Request Forgery) style vulnerability has been found in this web application in Apache CXF Fediz prior to 1.4.0 and 1.3.2, meaning that a malicious web application could create new clients, or reset secrets, etc, after the admin user has logged on to the client registration service and the session is still active.    6.8  Medium  2017-07-18  2017-07-07  View
86042  CVE-2017-7661  Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3, Jetty 8 and Jetty 9 plugins in Apache CXF Fediz prior to 1.4.0, 1.3.2 and 1.2.4.    6.8  Medium  2017-07-18  2017-07-07  View
88083  CVE-2017-7660  Apache Solr uses a PKI based mechanism to secure inter-node communication when security is enabled. It is possible to create a specially crafted node name that does not exist as part of the cluster and point it to a malicious node. This can trick the nodes in cluster to believe that the malicious node is a member of the cluster. So, if Solr users have enabled BasicAuth authentication mechanism using the BasicAuthPlugin or if the user has implemented a custom Authentication plugin, which does not implement either HttpClientInterceptorPlugin or HttpClientBuilderPlugin, his/her servers are vulnerable to this attack. Users who only use SSL without basic authentication or those who use Kerberos are not affected.    Medium  2017-07-18  2017-07-17  View
84921  CVE-2017-7648  Foscam networked devices use the same hardcoded SSL private key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.    4.3  Medium  2017-04-27  2017-04-17  View

Page 239 of 17672, showing 5 records out of 88360 total, starting on record 1191, ending on 1195

Actions