Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Apache Software Foundation — Vulnerabilities & Security Advisories 1725

Browse all 1725 CVE security advisories affecting Apache Software Foundation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Apache Software Foundation develops and maintains open-source software, primarily known for the widely deployed Apache HTTP Server and foundational Java frameworks. Its extensive portfolio exposes a significant attack surface, evidenced by the 1717 recorded CVEs. Historically, vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from complex configuration errors or input validation failures in legacy components. While the foundation enforces rigorous security review processes, the sheer volume of projects increases the likelihood of undiscovered flaws. Notable incidents include critical flaws in Log4j, which allowed remote code execution via crafted log messages, highlighting risks in dependency management. The organization relies on community-driven patching, requiring administrators to promptly apply updates to mitigate exploitation. This model ensures transparency but demands active vigilance from users to maintain system integrity against evolving threat vectors.

CVE IDTitleCVSSSeverityPublished
CVE-2024-38286 Apache Tomcat: Denial of Service — Apache TomcatCWE-770 8.6 High2024-11-07
CVE-2024-23590 Apache Kylin: Session fixation in web interface — Apache KylinCWE-384 9.8AICriticalAI2024-11-04
CVE-2024-43383 Apache Lucene.Net.Replicator: Remote Code Execution in Lucene.Net.Replicator — Apache Lucene.Net.ReplicatorCWE-502 8.0 High2024-10-31
CVE-2024-45477 Apache NiFi: Improper Neutralization of Input in Parameter Description — Apache NiFiCWE-79 4.6 Medium2024-10-29
CVE-2024-45031 Apache Syncope: Stored XSS in Console and Enduser — Apache SyncopeCWE-79 5.4AIMediumAI2024-10-24
CVE-2024-45219 Apache CloudStack: Uploaded and registered templates and volumes can be used to abuse KVM-based infrastructure — Apache CloudStackCWE-20 8.5 High2024-10-16
CVE-2024-45461 Apache CloudStack Quota plugin: Access checks not enforced in Quota — Apache CloudStack Quota pluginCWE-862 5.7 Medium2024-10-16
CVE-2024-45462 Apache CloudStack: Incomplete session invalidation on web interface logout — Apache CloudStackCWE-613 6.3 Medium2024-10-16
CVE-2024-45693 Apache CloudStack: Request origin validation bypass makes account takeover possible — Apache CloudStackCWE-352 8.0 High2024-10-16
CVE-2024-45217 Apache Solr: ConfigSets created during a backup restore command are trusted implicitly — Apache SolrCWE-1188 8.8 -2024-10-16
CVE-2024-45216 Apache Solr: Authentication bypass possible using a fake URL Path ending — Apache SolrCWE-287 9.8 -2024-10-16
CVE-2023-50780 Apache ActiveMQ Artemis: Authenticated users could perform RCE via Jolokia MBeans — Apache ActiveMQ ArtemisCWE-285 8.8AIHighAI2024-10-14
CVE-2024-46911 Apache Roller: Weakness in CSRF protection allows privilege escalation — Apache RollerCWE-352 8.8AIHighAI2024-10-14
CVE-2024-45720 Apache Subversion: Command line argument injection on Windows platforms — Apache SubversionCWE-78 8.2 High2024-10-09
CVE-2024-28168 Apache XML Graphics FOP: XML External Entity (XXE) Processing — Apache XML Graphics FOPCWE-611 7.5AIHighAI2024-10-09
CVE-2024-47554 Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader — Apache Commons IOCWE-400 7.5 -2024-10-03
CVE-2024-47561 Apache Avro Java SDK: Arbitrary Code Execution when reading Avro schema (Java SDK) — Apache Avro Java SDKCWE-502 9.8 -2024-10-03
CVE-2024-45772 Apache Lucene Replicator: Security Vulnerability in Lucene Replicator - Deserialization Issue — Apache Lucene ReplicatorCWE-502 5.1 Medium2024-09-30
CVE-2024-47197 Maven Archetype Plugin: Maven Archetype integration-test may package local settings into the published artifact, possibly containing credentials — Maven Archetype PluginCWE-200 7.5AIHighAI2024-09-26
CVE-2024-23454 Apache Hadoop: Temporary File Local Information Disclosure — Apache HadoopCWE-378 5.5AIMediumAI2024-09-25
CVE-2024-40761 Apache Answer: Avatar URL leaked user email addresses — Apache AnswerCWE-326 7.5AIHighAI2024-09-25
CVE-2024-39928 Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability — Apache Linkis Spark EngineConnCWE-326 5.3AIMediumAI2024-09-24
CVE-2024-46544 Apache Tomcat Connectors: mod_jk: local users can view and modify configuration — Apache Tomcat ConnectorsCWE-276 7.8AIHighAI2024-09-23
CVE-2024-42323 Apache HertzBeat: RCE by snakeYaml deser load malicious xml — Apache HertzBeatCWE-502 8.8 -2024-09-21
CVE-2024-45537 Apache Druid: Users can provide MySQL JDBC properties not on allow list — Apache DruidCWE-20 6.5 -2024-09-17
CVE-2024-45384 Apache Druid: Padding oracle in druid-pac4j extension that allows an attacker to manipulate a pac4j session cookie via Padding Oracle Attack — Apache Druid 7.5 -2024-09-17
CVE-2024-22399 Apache Seata: Remote Code Execution vulnerability via Hessian Deserialization in Apache Seata Server — Apache SeataCWE-502 9.8 -2024-09-16
CVE-2024-45034 Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes — Apache AirflowCWE-250 7.8 -2024-09-07
CVE-2024-45498 Apache Airflow: Command Injection in an example DAG — Apache AirflowCWE-116 8.8 -2024-09-07
CVE-2024-45195 Apache OFBiz: Confused controller-view authorization logic (forced browsing) — Apache OFBizCWE-425 9.1AICriticalAI2024-09-04

This page lists every published CVE security advisory associated with Apache Software Foundation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.