Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Apache Software Foundation — Vulnerabilities & Security Advisories 1725

Browse all 1725 CVE security advisories affecting Apache Software Foundation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Apache Software Foundation develops and maintains open-source software, primarily known for the widely deployed Apache HTTP Server and foundational Java frameworks. Its extensive portfolio exposes a significant attack surface, evidenced by the 1717 recorded CVEs. Historically, vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from complex configuration errors or input validation failures in legacy components. While the foundation enforces rigorous security review processes, the sheer volume of projects increases the likelihood of undiscovered flaws. Notable incidents include critical flaws in Log4j, which allowed remote code execution via crafted log messages, highlighting risks in dependency management. The organization relies on community-driven patching, requiring administrators to promptly apply updates to mitigate exploitation. This model ensures transparency but demands active vigilance from users to maintain system integrity against evolving threat vectors.

CVE IDTitleCVSSSeverityPublished
CVE-2024-45507 Apache OFBiz: Prevent use of URLs in files when loading them from Java or Groovy, leading to a RCE — Apache OFBizCWE-918 9.8AICriticalAI2024-09-04
CVE-2023-49582 Apache Portable Runtime (APR): Unexpected lax shared memory permissions — Apache Portable Runtime (APR)CWE-732 3.3AILowAI2024-08-26
CVE-2024-41937 Apache Airflow: Stored XSS Vulnerability on provider link — Apache AirflowCWE-79 6.1AIMediumAI2024-08-21
CVE-2023-49198 Apache SeaTunnel Web: Arbitrary file read vulnerability — Apache SeaTunnel WebCWE-552 7.5AIHighAI2024-08-21
CVE-2024-22281 Apache Helix Front (UI): Helix front hard-coded secret in the express-session — Apache Helix Front (UI)CWE-668 9.1AICriticalAI2024-08-20
CVE-2024-43202 Apache DolphinScheduler: Remote Code Execution Vulnerability — Apache DolphinSchedulerCWE-94 9.8AICriticalAI2024-08-20
CVE-2024-41909 Apache MINA SSHD: integrity check bypass — Apache MINA SSHDCWE-354--AI2024-08-12
CVE-2024-41888 Apache Answer: The link for resetting user password is not Single-Use — Apache AnswerCWE-772 7.5AIHighAI2024-08-09
CVE-2024-41890 Apache Answer: The link to reset the user's password will remain valid after sending a new link — Apache AnswerCWE-772 7.5AIHighAI2024-08-09
CVE-2024-30188 Apache DolphinScheduler: Resource File Read And Write Vulnerability — Apache DolphinSchedulerCWE-20 8.1AIHighAI2024-08-09
CVE-2024-29831 Apache DolphinScheduler: RCE by arbitrary js execution — Apache DolphinSchedulerCWE-20 8.2AIHighAI2024-08-09
CVE-2024-42062 Apache CloudStack: User Key Exposure to Domain Admins — Apache CloudStackCWE-863 7.2AIHighAI2024-08-07
CVE-2024-42222 Apache CloudStack: Unauthorised Network List Access — Apache CloudStackCWE-200 4.3AIMediumAI2024-08-07
CVE-2024-36448 Apache IoTDB Workbench: SSRF Vulnerability (EOL) — Apache IoTDB WorkbenchCWE-918 9.8AICriticalAI2024-08-05
CVE-2024-38856 Apache OFBiz: Unauthenticated endpoint could allow execution of screen rendering code — Apache OFBizCWE-863 5.6AIMediumAI2024-08-05
CVE-2024-42447 Apache Airflow Providers FAB: FAB provider 1.2.1 and 1.2.0 did not let user to logout for Airflow — Apache Airflow Providers FABCWE-613 9.1AICriticalAI2024-08-05
CVE-2024-36268 Apache InLong TubeMQ Client: Remote Code Execution vulnerability — Apache InLong TubeMQ ClientCWE-94 9.8AICriticalAI2024-08-02
CVE-2024-27182 Apache Linkis Basic management services: Engine material management Arbitrary file deletion vulnerability — Apache Linkis Basic management servicesCWE-552 6.5AIMediumAI2024-08-02
CVE-2024-27181 Apache Linkis Basic management services: Privilege Escalation Attack vulnerability — Apache Linkis Basic management servicesCWE-269 6.5AIMediumAI2024-08-02
CVE-2023-48396 Apache SeaTunnel Web: Authentication bypass — Apache SeaTunnel WebCWE-290 9.8AICriticalAI2024-07-30
CVE-2023-38522 Apache Traffic Server: Incomplete field name check allows request smuggling — Apache Traffic ServerCWE-444 5.3 -2024-07-26
CVE-2024-35296 Apache Traffic Server: Invalid Accept-Encoding can force forwarding requests — Apache Traffic ServerCWE-20 5.3 -2024-07-26
CVE-2024-35161 Apache Traffic Server: Incomplete check for chunked trailer section allows request smuggling — Apache Traffic ServerCWE-444 5.3 -2024-07-26
CVE-2024-25090 Apache Roller: Insufficient input validation for some user profile and bookmark fields when Roller in untested-users mode — Apache RollerCWE-20 5.4 -2024-07-26
CVE-2023-48362 Apache Drill: XXE Vulnerability in XML Format Reader — Apache DrillCWE-611 8.8AIHighAI2024-07-24
CVE-2024-39676 Apache Pinot: Unauthorized endpoint exposed sensitive information — Apache PinotCWE-200 5.3AIMediumAI2024-07-24
CVE-2024-41178 Apache Arrow Rust Object Store: AWS WebIdentityToken exposure in log files — Apache Arrow Rust Object StoreCWE-532 8.1AIHighAI2024-07-23
CVE-2024-29070 Apache StreamPark: session not invalidated after logout — Apache StreamParkCWE-613 6.5AIMediumAI2024-07-23
CVE-2024-34457 Apache StreamPark IDOR Vulnerability — Apache StreamParkCWE-639 6.5AIMediumAI2024-07-22
CVE-2024-38503 Apache Syncope: HTML tags can be injected into Console or Enduser text fields — Apache SyncopeCWE-79 5.4AIMediumAI2024-07-22

This page lists every published CVE security advisory associated with Apache Software Foundation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.